Duration 4 Days 24 CPD hours This course is intended for Security engineers Security administrators Security architects Operations engineers Network engineers Network administrators Network or security technicians Network managers System designers Cisco integrators and partners Overview After taking this course, you should be able to: Describe and administer the Cisco Email Security Appliance (ESA) Control sender and recipient domains Control spam with Talos SenderBase and anti-spam Use anti-virus and outbreak filters Use mail policies Use content filters Use message filters to enforce email policies Prevent data loss Perform LDAP queries Authenticate Simple Mail Transfer Protocol (SMTP) sessions Authenticate email Encrypt email Use system quarantines and delivery methods Perform centralized management using clusters Test and troubleshoot This course shows you how to deploy and use Cisco© Email Security Appliance to establish protection for your email systems against phishing, business email compromise, and ransomware, and to help streamline email security policy management. This hands-on course provides you with the knowledge and skills to implement, troubleshoot, and administer Cisco Email Security Appliance, including key capabilities such as advanced malware protection, spam blocking, anti-virus protection, outbreak filtering, encryption, quarantines, and data loss prevention. This course helps you prepare to take the exam, Securing Email with Cisco Email Security Appliance (300-720 SESA). Describing the Cisco Email Security Appliance Cisco Email Security Appliance Overview Technology Use Case Cisco Email Security Appliance Data Sheet SMTP Overview Email Pipeline Overview Installation Scenarios Initial Cisco Email Security Appliance Configuration Centralizing Services on a Cisco Administering the Cisco Email Security Appliance Distributing Administrative Tasks System Administration Managing and Monitoring Using the Command Line Interface (CLI) Other Tasks in the GUI Advanced Network Configuration Using Email Security Monitor Tracking Messages Logging Controlling Sender and Recipient Domains Public and Private Listeners Configuring the Gateway to Receive Email Host Access Table Overview Recipient Access Table Overview Configuring Routing and Delivery Features Controlling Spam with Talos SenderBase and Anti-Spam SenderBase Overview Anti-Spam Managing Graymail Protecting Against Malicious or Undesirable URLs File Reputation Filtering and File Analysis Bounce Verification Using Anti-Virus and Outbreak Filters Anti-Virus Scanning Overview Sophos Anti-Virus Filtering McAfee Anti-Virus Filtering Configuring the Appliance to Scan for Viruses Outbreak Filters How the Outbreak Filters Feature Works Managing Outbreak Filters Using Mail Policies Email Security Manager Overview Mail Policies Overview Handling Incoming and Outgoing Messages Differently Matching Users to a Mail Policy Message Splintering Configuring Mail Policies Using Content Filters Content Filters Overview Content Filter Conditions Content Filter Actions Filter Messages Based on Content Text Resources Overview Using and Testing the Content Dictionaries Filter Rules Understanding Text Resources Text Resource Management Using Text Resources Using Message Filters to Enforce Email Policies Message Filters Overview Components of a Message Filter Message Filter Processing Message Filter Rules Message Filter Actions Attachment Scanning Examples of Attachment Scanning Message Filters Using the CLI to Manage Message Filters Message Filter Examples Configuring Scan Behavior Preventing Data Loss Overview of the Data Loss Prevention (DLP) Scanning Process Setting Up Data Loss Prevention Policies for Data Loss Prevention Message Actions Updating the DLP Engine and Content Matching Classifiers Using LDAP Overview of LDAP Working with LDAP Using LDAP Queries Authenticating End-Users of the Spam Quarantine Configuring External LDAP Authentication for Users Testing Servers and Queries Using LDAP for Directory Harvest Attack Prevention Spam Quarantine Alias Consolidation Queries Validating Recipients Using an SMTP Server SMTP Session Authentication Configuring AsyncOS for SMTP Authentication Authenticating SMTP Sessions Using Client Certificates Checking the Validity of a Client Certificate Authenticating User Using LDAP Directory Authenticating SMTP Connection Over Transport Layer Security (TLS) Using a Client Certificate Establishing a TLS Connection from the Appliance Updating a List of Revoked Certificates Email Authentication Email Authentication Overview Configuring DomainKeys and DomainKeys Identified Mail (DKIM) Signing Verifying Incoming Messages Using DKIM Overview of Sender Policy Framework (SPF) and SIDF Veri?cation Domain-based Message Authentication Reporting and Conformance (DMARC) Verification Forged Email Detection Email Encryption Overview of Cisco Email Encryption Encrypting Messages Determining Which Messages to Encrypt Inserting Encryption Headers into Messages Encrypting Communication with Other Message Transfer Agents (MTAs) Working with Certificates Managing Lists of Certificate Authorities Enabling TLS on a Listener?s Host Access Table (HAT) Enabling TLS and Certi?cate Verification on Delivery Secure/Multipurpose Internet Mail Extensions (S/MIME) Security Services Using System Quarantines and Delivery Methods Describing Quarantines Spam Quarantine Setting Up the Centralized Spam Quarantine Using Safelists and Blocklists to Control Email Delivery Based on Sender Configuring Spam Management Features for End Users Managing Messages in the Spam Quarantine Policy, Virus, and Outbreak Quarantines Managing Policy, Virus, and Outbreak Quarantines Working with Messages in Policy, Virus, or Outbreak Quarantines Delivery Methods Centralized Management Using Clusters Overview of Centralized Management Using Clusters Cluster Organization Creating and Joining a Cluster Managing Clusters Cluster Communication Loading a Configuration in Clustered Appliances Best Practices Testing and Troubleshooting Debugging Mail Flow Using Test Messages: Trace Using the Listener to Test the Appliance Troubleshooting the Network Troubleshooting the Listener Troubleshooting Email Delivery Troubleshooting Performance Web Interface Appearance and Rendering Issues Responding to Alerts Troubleshooting Hardware Issues Working with Technical Support References Model Specifications for Large Enterprises Model Specifications for Midsize Enterprises and Small-to-Midsize Enterprises or Branch O?ces Cisco Email Security Appliance Model Specifications for Virtual Appliances
ð Unlock Your Potential with Level 3 Health and Safety in the Workplace Course! ð Are you ready to elevate your career and become a safety champion in your workplace? Look no further! Our Level 3 Health and Safety in the Workplace course is designed to equip you with the essential knowledge and skills to ensure a safe and healthy working environment for yourself and your colleagues. ð Benefits of Taking Our Course ð Enhanced Safety Awareness: Gain a comprehensive understanding of occupational health and safety principles, regulations, and best practices. You'll learn how to identify and mitigate workplace hazards effectively. Reduced Risks: By mastering risk assessment techniques and emergency procedures, you'll be empowered to minimize workplace accidents and injuries, creating a safer environment for everyone. Legal Compliance: Stay ahead of the curve by staying updated on the latest health and safety legislation. Our course will ensure you understand your legal obligations as an employer or employee, helping you avoid costly penalties and legal issues. Improved Confidence: Armed with knowledge and expertise, you'll approach your work with confidence, knowing that you have the skills to handle any safety-related challenges that may arise. Career Advancement: Stand out in the job market and open doors to new opportunities. Employers highly value candidates with strong health and safety credentials, making you a desirable asset to any organization. Peace of Mind: Whether you're a seasoned professional or new to the field, our course provides you with the peace of mind that comes from knowing you're equipped to protect yourself and others in the workplace. Who is this for? ð¨âð¼ð©âð¼ Our Level 3 Health and Safety in the Workplace course is suitable for individuals across various industries and job roles, including: Managers and supervisors Human resources professionals Safety officers and representatives Health and safety consultants Workers in high-risk environments No matter your background or experience level, if you're committed to ensuring a safe and healthy workplace, this course is for you! Career Path ð¤ï¸ Completing our Level 3 Health and Safety in the Workplace course opens up a world of opportunities in the field of occupational health and safety. Here are just a few potential career paths you can pursue: Health and Safety Manager: Lead safety initiatives within organizations, develop policies and procedures, and oversee compliance efforts to ensure a safe working environment. Safety Consultant: Provide expert guidance to businesses on health and safety matters, conducting assessments, offering recommendations, and assisting with regulatory compliance. Risk Manager: Identify and assess potential risks within organizations, develop strategies to mitigate those risks, and ensure compliance with relevant safety standards and regulations. Occupational Health Specialist: Focus on preventing and managing workplace injuries and illnesses, promoting employee wellness, and advocating for safe working conditions. Safety Trainer: Educate workers on safety protocols, procedures, and best practices, empowering them to play an active role in maintaining a safe workplace culture. Don't miss out on the opportunity to take your career to new heights with our Level 3 Health and Safety in the Workplace course! Enroll today and embark on your journey towards becoming a safety leader in your industry. ð FAQ (Frequently Asked Questions) for Level 3 Health and Safety in the Workplace Q1: What is the significance of Level 3 Health and Safety in the Workplace? Level 3 Health and Safety in the Workplace course is designed to provide participants with advanced knowledge and skills necessary to ensure a safe and healthy work environment. It covers a wide range of topics including risk assessment, hazard identification, emergency procedures, and legal responsibilities. Achieving this level of certification demonstrates competence in managing workplace health and safety effectively, which is crucial for protecting employees, complying with regulations, and minimizing risks of accidents or injuries. Q2: Who should consider taking the Level 3 Health and Safety in the Workplace course? This course is suitable for individuals in various industries and roles, including managers, supervisors, health and safety representatives, and anyone responsible for overseeing health and safety practices within the workplace. It is beneficial for those seeking to enhance their understanding of health and safety regulations, improve risk management skills, and contribute to creating a safer work environment for themselves and their colleagues. Q3: What topics are covered in the Level 3 Health and Safety in the Workplace course? The course curriculum typically includes modules on risk assessment, hazard control measures, health and safety legislation, accident investigation, emergency procedures, and promoting a positive safety culture. Participants will also learn about the importance of communication, consultation, and training in maintaining effective health and safety practices within the workplace. Q4: How is the Level 3 Health and Safety in the Workplace course assessed? Assessment methods may vary depending on the training provider, but they often include a combination of written examinations, practical assessments, and/or project work. Participants are evaluated on their understanding of key concepts, ability to apply health and safety principles to real-world scenarios, and compliance with relevant regulations and best practices. Q5: What are the potential benefits of completing the Level 3 Health and Safety in the Workplace course? Earning a Level 3 Health and Safety in the Workplace certification can lead to various benefits, including improved job prospects, enhanced credibility in the field of health and safety, better risk management skills, increased awareness of legal responsibilities, and ultimately, a safer and healthier work environment for all employees. Additionally, organizations may benefit from reduced accident rates, improved compliance with regulations, and enhanced reputation for prioritizing health and safety. Course Curriculum Module 01 Health and Safety Management Health and Safety Management 00:00 Module 02 Engineering Safety Engineering Safety 00:00 Module 03 Fire and Electrical Safety Fire and Electrical Safety 00:00 Module 04 Occupational Health and Personal Protective Equipment Occupational Health and Personal Protective Equipment 00:00 Module 05 Mental Healthcare Mental Healthcare 00:00 Module 06 Public Health Public Health 00:00 Module 07 Working at Height - Hazards and Control Working at Height - Hazards and Control 00:00 Module 08 Work Equipment Hazards and Control Work Equipment Hazards and Control 00:00 Module 09 Electrical Hazards and Control Electrical Hazards and Control 00:00 Module 10 Chemical and Biological Health Hazards and Control Chemical and Biological Health Hazards and Control 00:00 Module 11 Reporting Accidents and Incidents at Work Reporting Accidents and Incidents at Work 00:00 Module 12 Legal Framework (UK) for Workplace First Aid Legal Framework (UK) for Workplace First Aid 00:00 Module 13 Practice of self-hygiene Practice of self-hygiene 00:00 Module 14 HACCP Food Safety HACCP Food Safety 00:00 Module 15 A Guide to Safe Manual Handling A Guide to Safe Manual Handling 00:00 Module 16 Work Equipment Maintenance Work Equipment Maintenance 00:00 Module 17 Occupational Diseases Occupational Diseases 00:00 Module 18 Exposure to Mutagens Biological Agents and Carcinogens Exposure to Mutagens Biological Agents and Carcinogens 00:00 Module 19 Dangerous Occurrences Dangerous Occurrences 00:00 Module 20 RIDDOR Report RIDDOR Report 00:00
The course 'Microsoft Excel' covers the latest features of Microsoft Excel 2019, introducing learners to CONCAT, IFS, MAXIFS, MINIFS, SWITCH, TEXTJOIN, Map Chart, Funnel Chart, and other enhancements. It also covers fundamental Excel skills, data analysis, visualization, pivot tables, workbook management, and automation using VBA. Learning Outcomes: Familiarize with the new features in Microsoft Excel 2019, including CONCAT, IFS, MAXIFS, MINIFS, SWITCH, and more. Gain proficiency in basic Excel tasks like navigating the user interface, entering data, and using Excel commands. Perform calculations, create formulas, and use functions to analyze and manipulate data effectively. Format worksheets, apply conditional formatting, and utilize templates to present data professionally. Understand data visualization using charts, sparklines, and mapping techniques in Excel. Work with PivotTables and PivotCharts for in-depth data analysis and presentation. Learn advanced Excel features such as data validation, scenarios, and Goal Seek. Automate workbook functionality using macros and Visual Basic for Applications (VBA). Collaborate on workbooks, protect data, and apply security measures in Excel. Create and work with Excel templates to streamline repetitive tasks and optimize workflow. Why buy this Microsoft Excel? Unlimited access to the course for forever PDF Certificate, Transcript, student ID all included in the price Absolutely no hidden fees Directly receive CPD accredited qualifications after course completion Receive one to one assistance on every weekday from professionals Immediately receive the PDF certificate after passing Receive the original copies of your certificate and transcript on the next working day Easily learn the skills and knowledge from the comfort of your home Certification After studying the course materials of the Microsoft Excel you will be able to take the MCQ test that will assess your knowledge. After successfully passing the test you will be able to claim the pdf certificate for £5.99. Original Hard Copy certificates need to be ordered at an additional cost of £9.60. Who is this course for? This Microsoft Excel does not require you to have any prior qualifications or experience. You can just enrol and start learning. Prerequisites This Microsoft Excel was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Career path As this course comes with multiple courses included as bonus, you will be able to pursue multiple occupations. This Microsoft Excel is a great way for you to gain multiple skills from the comfort of your home. Course Curriculum Microsoft Excel 2019 New Features Introduction to Microsoft Excel 2019 New Features 00:07:00 CONCAT 00:02:00 IFS 00:01:00 MAXIFS 00:01:00 MINIFS 00:01:00 SWITCH 00:02:00 TEXTJOIN 00:01:00 Map Chart 00:02:00 Funnel Chart 00:01:00 Better Visuals 00:06:00 Pivot Table Enhancements 00:02:00 Power Pivot Updates 00:01:00 Getting Started with Microsoft Office Excel Navigate the Excel User Interface 00:28:00 Use Excel Commands 00:10:00 Create and Save a Basic Workbook 00:19:00 Enter Cell Data 00:12:00 Use Excel Help 00:05:00 Performing Calculations Create Worksheet Formulas 00:15:00 Insert Functions 00:17:00 Reuse Formulas and Functions 00:17:00 Modifying a Worksheet Insert, Delete, and Adjust Cells, Columns, and Rows 00:10:00 Search for and Replace Data 00:09:00 Use Proofing and Research Tools 00:07:00 Formatting a Worksheet Apply Text Formats 00:16:00 Apply Number Format 00:08:00 Align Cell Contents 00:09:00 Apply Styles and Themes 00:12:00 Apply Basic Conditional Formatting 00:11:00 Create and Use Templates 00:08:00 Printing Workbooks Preview and Print a Workbook 00:10:00 Set Up the Page Layout 00:09:00 Configure Headers and Footers 00:07:00 Managing Workbooks Manage Worksheets 00:05:00 Manage Workbook and Worksheet Views 00:07:00 Manage Workbook Properties 00:06:00 Working with Functions Work with Ranges 00:18:00 Use Specialized Functions 00:11:00 Work with Logical Functions 00:23:00 Work with Date & Time Functions 00:08:00 Work with Text Functions 00:11:00 Working with Lists Sort Data 00:10:00 Filter Data 00:10:00 Query Data with Database Functions 00:09:00 Outline and Subtotal Data 00:09:00 Analyzing Data Apply Intermediate Conditional Formatting 00:07:00 Apply Advanced Conditional Formatting 00:05:00 Visualizing Data with Charts Create Charts 00:13:00 Modify and Format Charts 00:12:00 Use Advanced Chart Features 00:12:00 Using PivotTables and PivotCharts Create a PivotTable 00:13:00 Analyze PivotTable Data 00:12:00 Present Data with PivotCharts 00:07:00 Filter Data by Using Timelines and Slicers 00:11:00 Working with Multiple Worksheets and Workbooks Use Links and External References 00:12:00 Use 3-D References 00:06:00 Consolidate Data 00:05:00 Using Lookup Functions and Formula Auditing Use Lookup Functions 00:12:00 Trace Cells 00:09:00 Watch and Evaluate Formulas 00:08:00 Sharing and Protecting Workbooks Collaborate on a Workbook 00:19:00 Protect Worksheets and Workbooks 00:08:00 Automating Workbook Functionality Apply Data Validation 00:13:00 Search for Invalid Data and Formulas with Errors 00:04:00 Work with Macros 00:18:00 Creating Sparklines and Mapping Data Create Sparklines 00:07:00 MapData 00:07:00 Forecasting Data Determine Potential Outcomes Using Data Tables 00:08:00 Determine Potential Outcomes Using Scenarios 00:09:00 Use the Goal Seek Feature 00:04:00 Forecasting Data Trends 00:05:00 Excel VBA Data Management Create a Macro Using the Macro Recorder 01:00:00 Edit a Macro 01:00:00 Debug a Macro 00:30:00 Customize the Quick Access Toolbar and Hotkeys 00:30:00 Set Macro Security 01:00:00 Insert Text 00:30:00 Format Text 00:30:00 Sort Data 00:30:00 Duplicate Data 01:00:00 Generate a Report 01:00:00 Determine the Dialog Box Type 00:15:00 Capture User Input 01:00:00 Insert, Copy, and Delete Worksheets 00:30:00 Rename Worksheets 00:30:00 Modify the Order of Worksheets 00:15:00 Print Worksheets 00:30:00 Create User-Defined Functions 00:30:00 Automate SUM Functions 00:30:00 Activities and Exercise Files - Microsoft Excel 2016 and VBA 00:00:00 Excel Templates Excel Templates 00:00:00 Mock Exam Mock Exam - Microsoft Excel 00:20:00 Final Exam Final Exam - Microsoft Excel 00:20:00
About Course The Business and Communication Essentials Bundle on Xpert Learning is a comprehensive collection of courses designed to help you develop the essential skills and knowledge you need to succeed in the modern workplace. Whether you're a new graduate, a seasoned professional, or a business owner, this bundle will give you the tools you need to communicate effectively, manage documents efficiently, and navigate business etiquette confidently. The Bundle contains the following courses: Business Communication Business Etiquette for the Modern Workplace Business Ethics Document Management What Will You Learn? Communicate effectively in both written and verbal formats with a variety of audiences Manage documents efficiently and effectively using a variety of tools and technologies Navigate business etiquette in a variety of professional settings Understand and apply business communication best practices Course Content Business Communication A Comprehensive Course on Business Communication and Communication Skills In this Business Communication online course by Xpert Learning, you will learn how to adapt your communication style for different audience, how to nuance your communication in different situations and mediums, and in this process, maximize productivity. You will also learn the necessary skills to handle difficult conversations within the workplace. According to a LinkedIn survey, Communication is identified as the most sought-after soft skill among employers. Communication is an essential skill for every individual regardless of position in the hierarchy, industry, or location. For achieving organizational success, effective communication is crucial. Through precise and succinct communication, organizations can develop better strategies, enhance productivity, boost morale, and stimulate innovation. Because communication is so important in business, Organizations want and need people with good communication skills. However, most individuals do not communicate well and they are unaware of the fact. The communication shortcomings of employees and the importance of communication in business explain why you should work to improve your communication skills. Your ability to communicate effectively will determine how others perceive you, and largely, your performance and value in the organization. Business Communication is a Learned skill: you learn when and how to say or write the message that needs to be delivered. You can learn this skill from the comprehensive course developed by Xpert Learning. Through different learning mediums you will learn how to understand your audience and nuance your message accordingly, qualities of Effective Business Writing, how to write precise Business Reports, Emails, how to present a Steller Business presentation, and how to use these skills in your career development. Enroll today in this Business Communication Course and advance your career with Xpert Learning! Introduction to Business Communication Understanding your Audience and Deliver your Message Effective Business Writing Writing Business Reports and Emails Business Presentation Part 1 Business Presentation Part 2 Business Presentation Example Career Development: Job Searching, Resume/CV, Cover Letters, and Interview skills Conclusion Business Etiquette Business Etiquette is a crucial aspect of any professional career and is essential to make a lasting impression in the business world. This course provides a comprehensive guide to mastering business etiquette, covering all the critical aspects of professional behavior and communication. Whether you're starting a new job, seeking a promotion, or simply want to enhance your professional image, this course will provide you with the essential skills and knowledge to succeed. In this course, you will learn the fundamental principles of professional communication, including the art of conversation, effective writing, and active listening. You will also discover the importance of professionalism, including the proper use of social media, and the importance of showing up on time and being prepared for meetings. The business dress code and grooming section covers the best practices for dressing for success, including the appropriate attire for various occasions and events. You will also learn the dos and don'ts of networking manners and how to dress for a successful job interview. The business dining etiquette section teaches you how to make the most of your business meals, from selecting the right restaurant to making the perfect first impression. You will learn the etiquette of using utensils, making toasts, and much more. The meeting etiquette section covers the best practices for conducting successful meetings, including preparing an agenda, managing time effectively, and handling conflict. You will also learn the importance of following up after meetings and the proper use of technology in meetings. In conclusion, this course will provide you with the knowledge and skills to enhance your professional image and succeed in your career. With engaging lessons and practical tips, you'll be equipped with the business etiquette skills to make a lasting impression in any business setting. Whether you're a seasoned professional or just starting your career, this course is an investment in your personal and professional growth. Enroll now and take your professional skills to the next level! Introduction to Business Etiquette Professional communication Impression and Professional Image Business Dress code and Grooming part 1 Business Dress code and Grooming part 2 Business Dress code and Grooming part 3 Dressing and Networking Manners for Special Occasions and Events Dining etiquette Meeting etiquette Conclusion Business Ethics Ethical behaviour brings significant benefits to businesses such as attracting employees, customers and investors. But failure to manage it properly can create huge challenges. Suppose every employee knows the difference between correct or incorrect choices and how to handle various ethical dilemmas. This knowledge is likely to produce a work environment where moral transgressors are held accountable for their actions, ultimately building a healthier workplace for all involved. The course explores topics such as Ethical Decision-Making, Ethical culture in organizations, and Corporate Social Responsibilities .These provide practical information to help employees understand business issues and equip them with practical skills for success. Ethics will be formally defined, and the presenter will discuss the sources of ethical dilemmas and the stakeholder's importance when addressing a problem. Enrol now and strengthen yourself against Unethical practices in Business. Introduction to Business Ethics Ethical Decision-Making Ethical Culture in Organizations Business Ethics in the Digital Age Corporate Social Responsibility Conclusion Document Management Document Management: Develop and implement Document Management Strategy for productivity, security, and cost efficiency Are you tired of sifting through stacks of paper documents, losing important files, and dealing with security breaches? Our Introduction to Document Management course is here to help! In this course, you'll learn how to digitize paper documents and manage electronic files, and discover the benefits of implementing a Document Management System. We'll cover everything you need to know about protecting sensitive information, including implementing security measures, electronic signatures, access controls, and document destruction. You'll also learn how to create and edit digital documents, collaborate with others, and use version control to track changes. Compliance and regulatory considerations are crucial in Document Management, and we'll cover them in-depth. Additionally, we'll explore Document Workflow Management, including best practices for retrieval, archiving, and audit trails. The course will also cover emerging trends and developments in the field of Document Management, including content management, metadata, workflow automation, and electronic forms. You'll learn about information governance and information lifecycle management, and how these concepts impact Document Management. By the end of this course, you'll be able to troubleshoot and solve common Document Management issues, streamline your processes, and save valuable time and resources. This course is perfect for anyone looking to develop their skills in Document Management, from beginners to professionals. Join us today and revolutionize the way you manage documents! With our comprehensive curriculum and expert instructors, you'll gain the skills and knowledge you need to succeed in today's fast-paced digital world. Don't wait - sign up now and take the first step towards efficient and secure Document Management. Introduction to Document Management Digitizing paper documents and managing electronic files Document Management System Implementing security measures to protect sensitive information Document creation and editing Collaboration and Version Control Compliance and regulatory considerations for document management Document Workflow Management Troubleshooting and problem-solving for common document management issues Emerging trends and developments in the field of document management Conclusion A course by Xpert Learning Audience Administrative assistants Office managers Project managers Team leaders Sales professionals Customer service representatives Business owners Anyone who wants to advance their career in the workplace
Course overview Take a practical approach to enhance your Excel modelling skills with the Advanced Excel Models using Formulas, VBA & Power Query course. In this course, you will learn how to build robust Excel models using Formulas, VBA and Power Query. This Advanced Excel Models using Formulas, VBA & Power Query course offers a wide range of training modules to enhance your abilities to create better models. You will discover the advanced Excel formulas to prepare reports, forecast and perform mathematical calculations. We will introduce you to the three excel models and show the functions used to prepare these pro models. In addition, you will learn the Excel formulas for prepaid expenses and explore the steps to create dynamic dashboards based on Power Query and Pivot Table without any formula. Learning outcomes Familiarize yourself with the advanced Excel formulas Be able to manage prepaid expenses Deepen your understanding of the prepaid expense models Learn about the pro Excel models and formulas Strengthen your knowledge of Power Query and PowerPivot Learn how to create Power query and pivot table based dashboard without any formula Who Is This Course For? This Advanced Excel Models using Formulas, VBA & Power Query course is recommended to anyone interested in learning how to prepare robust Excel models using advanced formulas, Power Query and VBA. In addition, the skills gained from this training will provide excellent opportunities for career advancement. Entry Requirement This course is available to all learners of all academic backgrounds. Learners should be aged 16 or over. Good understanding of English language, numeracy and ICT skills are required to take this course. Certification After you have successfully completed the course, you will obtain an Accredited Certificate of Achievement. And, you will also receive a Course Completion Certificate following the course completion without sitting for the test. Certificates can be obtained either in hardcopy for £39 or in PDF format at the cost of £24. PDF certificate's turnaround time is 24 hours, and for the hardcopy certificate, it is 3-9 working days. Why Choose Us? Affordable, engaging & high-quality e-learning study materials; Tutorial videos and materials from the industry-leading experts; Study in a user-friendly, advanced online learning platform; Efficient exam systems for the assessment and instant result; United Kingdom & internationally recognized accredited qualification; Access to course content on mobile, tablet and desktop from anywhere, anytime; Substantial career advancement opportunities; 24/7 student support via email. Career Path The Advanced Excel Models using Formulas, VBA & Power Query Course provides essential skills that will make you more effective in your role. It would be beneficial for any related profession in the industry, such as: Data Analyst System Support and Reporting Analyst Introduction Course Outline and Introduction 00:04:00 Minimum Requirements for the Course 00:01:00 Prepayments Introduction 00:01:00 Prepaid Expenses Models: Resources Download Month End Date Prepaid Expenses Amortization Calculation 00:00:00 Exact Prepaid Expenses Payment Date Calculation 00:00:00 Accounting for Prepaid Expenses Prepaid Expenses Accounting Definition: Prepayments 00:03:00 Prepaid Expense Example: How Accounting works for Prepayments 00:03:00 Advantages and Disadvantages of Prepaid Expenses 00:03:00 Excel Formulas Detailed: Introduction to three Excel Models Introduction to PRO Excel Models and Formulas 00:06:00 Date Function 00:05:00 EOMONTH Function 00:04:00 DATEVALUE function 00:03:00 IF Function 00:08:00 IFS Function (Office 365 Only) 00:07:00 VLOOKUP Function 00:07:00 MATCH Function 00:05:00 INDIRECT Function 00:02:00 NAMED Ranges: Name Manager 00:03:00 Advanced Version of VLOOKUP Function 00:07:00 Formula Based Prepaid Expenses Model Introduction to Model and Control Panel Tab (Important Sheet Tab) 00:08:00 Formula Based Prepaid Expenses Model - Deep Dive (Part 1) 00:05:00 Formula Based Prepaid Expenses Model - Deep Dive (Part 2) 00:06:00 Formula Based Prepaid Expenses Model - Deep Dive (Part 3) 00:06:00 IFS Function - Month End date Prepayment calculation 00:04:00 Prepaid Expenses - Closing Balance Summary Tab (Formula Based Summary) 00:09:00 Protecting Formulas Cells and Fields in the Model 00:04:00 Calculate Prepaid Expenses Amortisation from Exact Start Date Exact Date Prepaid Amortisation calculation Intro 00:03:00 Formulas update and Model Changes for Exact Prepaid Exps Calculation 00:03:00 Formulas Update for Exact Date Prepaid Exps Amortisation (Part 1) 00:04:00 Formulas Update for Exact Date Prepaid Exps Amortisation (Part 2) 00:03:00 Formulas Update for Exact Date Prepaid Exps Amortisation (Part 3) 00:02:00 Formulas Update for Exact Date Prepaid Exps Amortisation (Part 4) 00:07:00 IFS Function - Exact Date Prepayments Amortisation 00:04:00 Data Validation Controls (Enhancing Data Input Controls with Protection) 00:10:00 Bonus: Prepayment Model with Opening Balance Calculation (Part 1) 00:08:00 Bonus: Prepayment Model with Opening Balance Calculation (Part 2) 00:09:00 Additional Material: Resources 00:00:00 Prepaid Expenses Summary with Power Query and Pivot Table Power Query and Pivot Table Prepayment Summary Table Intro 00:06:00 What is Power Query and Some Awesome Resources for Power Query learning 00:07:00 Power Query and Pivot Table Summary - Deep Dive (Part 1) 00:05:00 Power Query and Pivot Table Summary - Deep Dive (Part 2) 00:04:00 Power Query and Pivot Table Summary - Deep Dive (Part 3) 00:05:00 Power Query and Pivot Table Summary - Deep Dive (Part 4) 00:09:00 Using Array Formulas to Add Formula Protection 00:04:00 Bonus: Allocate Prepaid Expenditure Cost Centre Wise - 1 00:02:00 Bonus: Allocate Prepaid Expenditure Cost Centre Wise - 2 00:08:00 Bonus: Prepayment Model with Opening Balance Calculation (PQ and PT Version) 00:13:00 Advanced VBA Prepaid Expenses Amortisation Model Changing Macros Security in Excel 00:05:00 Complete Walkthrough - Advanced VBA Prepaid Expenses Amortisation Model 00:06:00 Bonus : New Version - Excel VBA Model for Prepayment Expenditure 00:08:00 BONUS: Dynamic Dashboard for Divisional Profit and Loss statements: Easy Way Dynamic Dashboard Overview 00:07:00 Importing Profit and Loss Statements Source Files and creating YTD P&L Sheets 00:08:00 Creating Dynamic Data Validation 00:02:00 Creating Named Ranges for Dynamic Table Arrays 00:03:00 Dynamic Date Column Headings for each Divisional PL Table 00:02:00 Dynamic Month and YTD Dashboard tables headings (PRO TIP) 00:03:00 Dynamic VLOOKUP Formula - Preparing First section of the Dashboard 00:04:00 Creating Rolling Dashboard with Dynamic VLOOKUP Function 00:08:00 IMPORTANT : Error Checking for your reports/Dashboard (PRO TIP) 00:03:00 Data Prep for Visualization: AREA Charts (Awesome trick using #NA Function) 00:05:00 Visualization: AREA Charts for Month - Revenue, Gross Profit and Net Profit 00:05:00 Visualization DONUT Charts Revenue, Gross Profit and Net Profit (Part 1) 00:03:00 Visualization DONUT Charts Revenue, Gross Profit and Net Profit (Part 2) 00:06:00 Power Query & Pivot Tables based Dashboard without any Formulas, Fully Dynamic Introduction - Formula-less Dashboard - Fully Dynamic and easily refreshed 00:05:00 Understanding the data files before building dashboard 00:02:00 Consolidating Reports with Power Query (Get & Transform) , How to install PQ 00:08:00 Dynamic File Path Trick in Power Query with Parameters (Amazing trick) 00:06:00 Conditional Cumulative totals with SUMIFS Function 00:04:00 Bonus: Conditional Cumulative totals with Power Query Custom Formula (M Code) 00:06:00 Dashboard Creation - Pivot Table showing Month and YTD KPIs division wise 00:06:00 Dashboard Creation Donuts Charts linked with Pivot Table (Replicate Charts fast) 00:08:00 Dashboard Creation - Line Charts 00:08:00 Update Dashboard with Additional Divisional Data with Few Click (Magical) 00:03:00 Thankyou Thank you 00:02:00 Ultimate Prepaid Expenditure Model (Super Bonus) 00:02:00 Resources Resources - Microsoft Excel: Automated Dashboard Using Advanced Formula, VBA, Power Query 00:00:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00
This comprehensive course is tailored to equip beginners with a solid understanding of cyber security awareness, social engineering, network security, and online self-defense. Regardless of your prior experience in IT or cyber security, you will gain confidence in securely managing emails, files, mobile phones, computers, and browsing the Internet.
Duration 5 Days 30 CPD hours This course is intended for This course is targeted towards the information technology (IT) professional that has a minimum 1 year IT Security and Networking experience. This course would be ideal for Information System Owners, Security Officers, Ethical Hackers, Information Owners, Penetration Testers, System Owner and Managers as well as Cyber Security Engineers. Overview Upon completion, the Certified Professional Ethical Hacker candidate will be able to competently take the CPEH exam. The CPEH certification training enables students to understand the importance of vulnerability assessments and how to implement counter response along with preventative measures when it comes to a network hack. Security Fundamentals Overview The Growth of Environments and Security Our Motivation? The Goal: Protecting Information! CIA Triad in Detail Approach Security Holistically Security Definitions Definitions Relationships Method: Ping The TCP/IP Stack Which Services Use Which Ports? TCP 3-Way Handshake TCP Flags Malware Types of Malware Types of Malware Cont... Types of Viruses More Malware: Spyware Trojan Horses Back Doors DoS DDoS Packet Sniffers Passive Sniffing Active Sniffing Firewalls, IDS and IPS Firewall ? First Line of Defense IDS ? Second Line of Defense IPS ? Last Line of Defense? Firewalls Firewall Types: (1) Packet Filtering Firewall Types: (2) Proxy Firewalls Firewall Types ? Circuit-Level Proxy Firewall Type of Circuit- Level Proxy ? SOCKS Firewall Types ? Application-Layer Proxy Firewall Types: (3) Stateful Firewall Types: (4) Dynamic Packet-Filtering Firewall Types: (5) Kernel Proxies Firewall Placement Firewall Architecture Types ? Screened Host Multi- or Dual-Homed Screened Subnet Wi-Fi Network Types Wi-Fi Network Types Widely Deployed Standards Standards Comparison 802.11n - MIMO Overview of Database Server Review Access Controls Overview Role of Access Control Definitions More Definitions Categories of Access Controls Physical Controls Logical Controls ?Soft? Controls Security Roles Steps to Granting Access Access Criteria Physical Access Control Mechanisms Biometric System Types Synchronous Token Asynchronous Token Device Memory Cards Smart Card Cryptographic Keys Logical Access Controls OS Access Controls Linux Access Controls Accounts and Groups Password & Shadow File Formats Accounts and Groups Linux and UNIX Permissions Set UID Programs Trust Relationships Review Protocols Protocols Overview OSI ? Application Layer OSI ? Presentation Layer OSI ? Session Layer Transport Layer OSI ? Network Layer OSI ? Data Link OSI ? Physical Layer Protocols at Each OSI Model Layer TCP/IP Suite Port and Protocol Relationship Conceptual Use of Ports UDP versus TCP Protocols ? ARP Protocols ? ICMP Network Service ? DNS SSH Security Protocol SSH Protocols ? SNMP Protocols ? SMTP Packet Sniffers Example Packet Sniffers Review Cryptography Overview Introduction Encryption Cryptographic Definitions Encryption Algorithm Implementation Symmetric Encryption Symmetric Downfalls Symmetric Algorithms Crack Times Asymmetric Encryption Public Key Cryptography Advantages Asymmetric Algorithm Disadvantages Asymmetric Algorithm Examples Key Exchange Symmetric versus Asymmetric Using the Algorithm Types Together Instructor Demonstration Hashing Common Hash Algorithms Birthday Attack Example of a Birthday Attack Generic Hash Demo Instructor Demonstration Security Issues in Hashing Hash Collisions MD5 Collision Creates Rogue Certificate Authority Hybrid Encryption Digital Signatures SSL/TLS SSL Connection Setup SSL Hybrid Encryption SSH IPSec - Network Layer Protection IPSec IPSec Public Key Infrastructure Quantum Cryptography Attack Vectors Network Attacks More Attacks (Cryptanalysis) Review Why Vulnerability Assessments? Overview What is a Vulnerability Assessment? Vulnerability Assessment Benefits of a Vulnerability Assessment What are Vulnerabilities? Security Vulnerability Life Cycle Compliance and Project Scoping The Project Overview Statement Project Overview Statement Assessing Current Network Concerns Vulnerabilities in Networks More Concerns Network Vulnerability Assessment Methodology Network Vulnerability Assessment Methodology Phase I: Data Collection Phase II: Interviews, Information Reviews, and Hands-On Investigation Phase III: Analysis Analysis cont. Risk Management Why Is Risk Management Difficult? Risk Analysis Objectives Putting Together the Team and Components What Is the Value of an Asset? Examples of Some Vulnerabilities that Are Not Always Obvious Categorizing Risks Some Examples of Types of Losses Different Approaches to Analysis Who Uses What? Qualitative Analysis Steps Quantitative Analysis ALE Values Uses ALE Example ARO Values and Their Meaning ALE Calculation Can a Purely Quantitative Analysis Be Accomplished? Comparing Cost and Benefit Countermeasure Criteria Calculating Cost/Benefit Cost of a Countermeasure Can You Get Rid of All Risk? Management?s Response to Identified Risks Liability of Actions Policy Review (Top-Down) Methodology Definitions Policy Types Policies with Different Goals Industry Best Practice Standards Components that Support the Security Policy Policy Contents When Critiquing a Policy Technical (Bottom-Up) Methodology Review Vulnerability Tools of the Trade Vulnerability Scanners Nessus SAINT ? Sample Report Tool: Retina Qualys Guard http://www.qualys.com/products/overview/ Tool: LANguard Microsoft Baseline Analyzer MBSA Scan Report Dealing with Assessment Results Patch Management Options Review Output Analysis and Reports Overview Staying Abreast: Security Alerts Vulnerability Research Sites Nessus SAINT SAINT Reports GFI Languard GFI Reports MBSA MBSA Reports Review Reconnaissance, Enumeration & Scanning Reconnaissance Overview Step One in the Hacking ?Life-Cycle? What Information is Gathered by the Hacker? Passive vs. Active Reconnaissance Footprinting Defined Social Access Social Engineering Techniques Social Networking Sites People Search Engines Internet Archive: The WayBack Machine Footprinting Tools Overview Maltego GUI Johnny.Ihackstuff.com Google (cont.) Domain Name Registration WHOIS Output DNS Databases Using Nslookup Traceroute Operation Web Server Info Tool: Netcraft Introduction to Port Scanning Which Services use Which Ports? Port Scan Tips Port Scans Shou
Duration 3 Days 18 CPD hours This course is intended for Developers who have some familiarity with serverless and experience with development in the AWS Cloud Overview In this course, you will learn to: Apply event-driven best practices to a serverless application design using appropriate AWS services Identify the challenges and trade-offs of transitioning to serverless development, and make recommendations that suit your development organization and environment Build serverless applications using patterns that connect AWS managed services together, and account for service characteristics, including service quotas, available integrations, invocation model, error handling, and event source payload Compare and contrast available options for writing infrastructure as code, including AWS CloudFormation, AWS Amplify, AWS Serverless Application Model (AWS SAM), and AWS Cloud Development Kit (AWS CDK) Apply best practices to writing Lambda functions inclusive of error handling, logging, environment re-use, using layers, statelessness, idempotency, and configuring concurrency and memory Apply best practices for building observability and monitoring into your serverless application Apply security best practices to serverless applications Identify key scaling considerations in a serverless application, and match each consideration to the methods, tools, or best practices to manage it Use AWS SAM, AWS CDK, and AWS developer tools to configure a CI/CD workflow, and automate deployment of a serverless application Create and actively maintain a list of serverless resources that will assist in your ongoing serverless development and engagement with the serverless community This course gives developers exposure to and practice with best practices for building serverless applications using AWS Lambda and other services in the AWS serverless platform. You will use AWS frameworks to deploy a serverless application in hands-on labs that progress from simpler to more complex topics. You will use AWS documentation throughout the course to develop authentic methods for learning and problem-solving beyond the classroom. Introduction Introduction to the application you will build Access to course resources (Student Guide, Lab Guide, and Online Course Supplement) Thinking Serverless Best practices for building modern serverless applications Event-driven design AWS services that support event-driven serverless applications API-Driven Development and Synchronous Event Sources Characteristics of standard request/response API-based web applications How Amazon API Gateway fits into serverless applications Try-it-out exercise: Set up an HTTP API endpoint integrated with a Lambda function High-level comparison of API types (REST/HTTP, WebSocket, GraphQL) Introduction to Authentication, Authorization, and Access Control Authentication vs. Authorization Options for authenticating to APIs using API Gateway Amazon Cognito in serverless applications Amazon Cognito user pools vs. federated identities Serverless Deployment Frameworks Overview of imperative vs. declarative programming for infrastructure as code Comparison of CloudFormation, AWS CDK, Amplify, and AWS SAM frameworks Features of AWS SAM and the AWS SAM CLI for local emulation and testing Using Amazon EventBridge and Amazon SNS to Decouple Components Development considerations when using asynchronous event sources Features and use cases of Amazon EventBridge Try-it-out exercise: Build a custom EventBridge bus and rule Comparison of use cases for Amazon Simple Notification Service (Amazon SNS) vs. EventBridge Try-it-out exercise: Configure an Amazon SNS topic with filtering Event-Driven Development Using Queues and Streams Development considerations when using polling event sources to trigger Lambda functions Distinctions between queues and streams as event sources for Lambda Selecting appropriate configurations when using Amazon Simple Queue Service (Amazon SQS) or Amazon Kinesis Data Streams as an event source for Lambda Try-it-out exercise: Configure an Amazon SQS queue with a dead-letter queue as a Lambda event source Writing Good Lambda Functions How the Lambda lifecycle influences your function code Best practices for your Lambda functions Configuring a function Function code, versions and aliases Try-it-out exercise: Configure and test a Lambda function Lambda error handling Handling partial failures with queues and streams Step Functions for Orchestration AWS Step Functions in serverless architectures Try-it-out exercise: Step Functions states The callback pattern Standard vs. Express Workflows Step Functions direct integrations Try-it-out exercise: Troubleshooting a Standard Step Functions workflow Observability and Monitoring The three pillars of observability Amazon CloudWatch Logs and Logs Insights Writing effective log files Try-it-out exercise: Interpreting logs Using AWS X-Ray for observability Try-it-out exercise: Enable X-Ray and interpret X-Ray traces CloudWatch metrics and embedded metrics format Try-it-out exercise: Metrics and alarms Try-it-out exercise: ServiceLens Serverless Application Security Security best practices for serverless applications Applying security at all layers API Gateway and application security Lambda and application security Protecting data in your serverless data stores Auditing and traceability Handling Scale in Serverless Applications Scaling considerations for serverless applications Using API Gateway to manage scale Lambda concurrency scaling How different event sources scale with Lambda Automating the Deployment Pipeline The importance of CI/CD in serverless applications Tools in a serverless pipeline AWS SAM features for serverless deployments Best practices for automation Course wrap-up Additional course details: Nexus Humans AWS Developing Serverless Solutions on AWS training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AWS Developing Serverless Solutions on AWS course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for The intended audience for this comprehensive course on Information Assurance and STIGs includes professionals with roles such as: IT professionals - System administrators, network engineers, and security analysts who are responsible for maintaining and securing IT infrastructure and web applications. Developers - Software engineers and web developers who design, implement, and maintain web applications, and need to integrate security best practices throughout the development process. Project teams - Cross-functional teams that collaborate on application development projects, including members from development, testing, and deployment teams. Technical leads - Senior software engineers or architects who oversee technical aspects of projects and ensure the implementation of secure design and coding practices. Project managers - Professionals responsible for planning, executing, and closing projects, ensuring that security requirements are met throughout the project lifecycle. Overview Working in an interactive learning environment, guided by our application security expert, you'll explore: The concepts and terminology behind defensive coding Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against meaningful assets The entire spectrum of threats and attacks that take place against software applications in today's world The role that static code reviews and dynamic application testing to uncover vulnerabilities in applications The vulnerabilities of programming languages as well as how to harden installations The basics of Cryptography and Encryption and where they fit in the overall security picture The requirements and best practices for program management as specified in the STIGS The processes and measures associated with the Secure Software Development (SSD) The basics of security testing and planning Understand the concepts and terminology behind defensive coding Understand Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against meaningful assets Learn the entire spectrum of threats and attacks that take place against software applications in today's world Discuss the role that static code reviews and dynamic application testing to uncover vulnerabilities in applications Understand the vulnerabilities of programming language as well as how to harden installations Understand the basics of Cryptography and Encryption and where they fit in the overall security picture Understand the fundamentals of XML Digital Signature and XML Encryption as well as how they are used within the web services arena Understand the requirements and best practices for program management as specified in the STIGS Understand the processes and measures associated with the Secure Software Development (SSD) Understand the basics of security testing and planning The Information Assurance (STIG) Overview is a comprehensive two-day course that delves into the realm of Information Assurance, empowering you to enhance your cybersecurity skills, understand the essentials of STIGs, and discover cutting-edge web application security practices. This immersive experience is tailored for IT professionals, developers, project teams, technical leads, project managers, testing/QA personnel, and other key stakeholders who seek to expand their knowledge and expertise in the evolving cybersecurity landscape. The course focuses on the intricacies of best practices for design, implementation, and deployment, inspired by the diverse and powerful STIGs, ultimately helping participants become more proficient in application security.The first half of the course covers the foundations of DISA's Security Technical Implementation Guides (STIGs) and learn the ethical approach to bug hunting, while exploring the language of cybersecurity and dissecting real-life case studies. Our expert instrtors will guide you through the importance of respecting privacy, working with bug bounty programs, and avoiding common mistakes in the field.The next half delves into the core principles of information security and application protection, as you learn how to identify and mitigate authentication failures, SQL injections, and cryptographic vulnerabilities. You?ll gain experience with STIG walkthroughs and discover the crucial steps for securing web applications.Throughout the course, you'll also explore the fundamentals of application security and development, including checklists, common practices, and secure development lifecycle (SDL) processes. You?ll learn from recent incidents and acquire actionable strategies to strengthen your project teams and IT organizations. You'll also have the opportunity to explore asset analysis and design review methodologies to ensure your organization is prepared to face future cybersecurity challenges. DISA's Security Technical Implementation Guides (STIGs) The motivations behind STIGs Requirements that the various software development roles must meet Implementing STIG requirements and guidelines Why Hunt Bugs? The Language of CyberSecurity The Changing Cybersecurity Landscape AppSec Dissection of SolarWinds The Human Perimeter Interpreting the 2021 Verizon Data Breach Investigation Report First Axiom in Web Application Security Analysis First Axiom in Addressing ALL Security Concerns Lab: Case Study in Failure Safe and Appropriate Bug Hunting/Hacking Working Ethically Respecting Privacy Bug/Defect Notification Bug Bounty Programs Bug Hunting Mistakes to Avoid Principles of Information Security Secuity Is a Lifecycle Issue Minimize Attack Surface Area Layers of Defense: Tenacious D Compartmentalize Consider All Application States Do NOT Trust the Untrusted Identification and Authentication Failures Applicable STIGs Quality and Protection of Authentication Data Proper hashing of passwords Handling Passwords on Server Side Session Management HttpOnly and Security Headers Lab: STIG Walk-Throughs Injection Applicable STIGs Injection Flaws SQL Injection Attacks Evolve Drill Down on Stored Procedures Other Forms of Server-Side Injection Minimizing Injection Flaws Client-side Injection: XSS Persistent, Reflective, and DOM-Based XSS Best Practices for Untrusted Data Lab: STIG Walk-Throughs Applications: What Next? Common Vulnerabilities and Exposures CWE/SANS Top 25 Most Dangerous SW Errors Strength Training: Project Teams/Developers Strength Training: IT Organizations Cryptographic Failures Applicable STIGs Identifying Protection Needs Evolving Privacy Considerations Options for Protecting Data Transport/Message Level Security Weak Cryptographic Processing Keys and Key Management Threats of Quantum Computing Steal Now, Crack Later Threat Lab: STIG Walk-Throughs Application Security and Development Checklists Checklist Overview, Conventions, and Best Practices Leveraging Common AppSec Practices and Control Actionable Application Security Additional Tools for the Toolbox Strength Training: Project Teams/Developers Strength Training: IT Organizations Lab: Recent Incidents SDL Overview Attack Phases: Offensive Actions and Defensive Controls Secure Software Development Processes Shifting Left Actionable Items Moving Forward Lab: Design Study Review Asset Analysis Asset Analysis Process Types of Application-Related Assets Adding Risk Escalators Discovery and Recon Design Review Asset Inventory and Design Assets, Dataflows, and Trust Boundaries Risk Escalators in Designs Risk Mitigation Options