Discover the secrets of successful carbon capture and storage (CCS) project risk management through EnergyEdge's virtual instructor-led training (VILT). Join us and become an expert today!
Circles of adults is a process that ‘listens deeper’ to generate reflective problem solving that can create lasting behaviour change and effective behaviour intervention plans. This is a particularly valuable process for those looking to enhance their leadership and facilitation skills or to build such processes into their school or team approach to complex pupils. ‘The question is not should they be here anymore. Now it’s how can we figure out how best to include them?’ In this practical workshop session we will explore ways of problem solving around complex situations. The session will be practical and will aim to allow the sharing of experiences and good practice as well promoting innovative approaches to problem solving around systemic, organisational as well as individual inclusion issues. Behaviour problems, relationship challenges and personnel dilemmas can all be worked on with these team oriented problem solving processes. We will introduce participants to a powerful and effective approach. The ‘Circles of Adults’ approach addresses the need for a problem solving process that is able to take an in-depth look at meeting the emotional needs that commonly underlie challenging behaviour in schools. The approach is co-facilitated and is designed to enable the participation of teacher teams to reach a deeper understanding of a young person and to evolve a set of hypotheses and emerging strategies that better accommodate to unmet emotional and learning needs. The approach takes at least 90 minutes and is intended for use with the most challenging young people, those at high risk of being permanently excluded from the regular school system. Learning Objectives Increased confidence regarding problem solving around inclusion in mainstream settings Access to a wider range of practical strategies and techniques to impact on communication, realtionship, learning and behaviour issues Learn new problem solving processes Course Content The course answers the questions : How to set up and run a Circle of Adults process How can we work out how to include this child best? How can we understand what lies beneath their behaviour? Is there a more structured way to run this meeting? Can we explore the emotional impact the person is having on us and still agree strategies? How can I get unstuck from this problem?
This two-day course is a must for anyone who is considering or already working in a role with supervisory responsibilities. This course provides an understanding of health, safety, welfare, and environmental issues. It highlights legal responsibilities and the need to promote health and safety to supervise effectively. It is endorsed by Build UK as the standard training for all supervisors working on Build UK sites. Aims To give a clear understanding of health, safety, welfare, and environmental legislation that affects your supervisory role. To help you fulfil your responsibilities regarding health, safety, welfare, and the environment. To help you implement new guidance and industry best practice affected by changes. Course Content • Health and safety law and how it will apply to supervisors. • Your supervisory responsibilities in controlling site safety. • Risk assessments and the need for method statements. • Effective site inductions, toolbox talks and method statement briefings. • Monitoring site activities effectively. • Timely intervention when bad practice is identified. Prerequisites This course is for you if you are considering, or already have, supervisory responsibilities. Assessment At the end of this course, all delegates will have a clear understanding of controlling health and safety on site from a supervisor’s role. Certificate This certification for this course is valid for 5 years and is endorsed by Build UK as a standard training for all supervisors. To remain certified in this area, you will need to take a refresher course before the expiry date on your certificate, otherwise the full course will need to be retaken. Instructions Please note all Site Supervisor Training courses with the venue “Remote Learning” will be delivered by a tutor over a video call. This training will be delivered and assessed in English language; therefore, a good standard is required to complete the course. Further attendee information will be sent in a separate email, please check your inbox
Kubernetes for engineers training course description This course covers how Kubernetes addresses the challenges of distributed systems. Hands on sessions follow all the major theory chapters. What will you learn Explain what Kubernetes is and how it works. Create and run containers on Kubernetes using the Docker image format and container runtime. Kubernetes for engineers training course details Who will benefit: Anyone working with Docker or Kubernetes. Prerequisites: Definitive Docker for engineers. Duration 2 days Kubernetes for engineers training course contents Introduction Velocity, Scaling your service and your teams, Abstracting your infrastructure. Creating and running containers Container images, Building application images with Docker, Storing images in a remote registry, The Docker container runtime. Deploying a Kubernetes cluster Installing Kubernetes on a public cloud provider, Installing Kubernetes locally using minikube, Running Kubernetes on Raspberry Pi, The Kubernetes client, Cluster components. Common kubectl Commands Namespaces, Contexts, Viewing Kubernetes API objects, Creating, Updating, and Destroying Kubernetes objects, Labelling and annotating objects, Debugging commands. Pods Pods in Kubernetes, Thinking with pods, The pod manifest, Running pods, Accessing your pod, Health checks, Resource management, Persisting data with volumes, Putting It all together. Labels and Annotations Labels, Annotations. Service Discovery What Is Service discovery? The service object, Looking beyond the cluster, Cloud integration, Advanced details. ReplicaSets Reconciliation loops, Relating pods and ReplicaSets, Designing with ReplicaSets, ReplicaSet Spec, Creating a ReplicaSet, Inspecting a ReplicaSet, Scaling ReplicaSets, Deleting ReplicaSets. DaemonSets DaemonSet scheduler, Creating DaemonSets, Limiting DaemonSets to specific nodes, Updating a DaemonSet, Deleting a DaemonSet. Jobs The job object, Job patterns. ConfigMaps and secrets ConfigMaps, Secrets, Naming constraints, Managing ConfigMaps and secrets. Deployments Your first deployment, Creating deployments, Managing deployments, Updating deployments, Deployment strategies, Deleting a deployment. Integrating storage solutions and Kubernetes Importing external services, Running reliable singletons, Kubernetes-native storage with StatefulSets. Deploying real-world applications Parse, Ghost, Redis.
HTTP streaming training course description This course looks at the delivery of video streams using HTTP adaptive streaming. Both MPEG DASH and HLS are investigated. Hands on sessions primarily involve using Wireshark to analyse streams. What will you learn Use Wireshark to analyse and troubleshoot HTTP video streams. Explain HTTP adaptive streaming works. Evaluate and compare MPEG DASH and HLS. Use tools to create HTTP adaptive streams. HTTP streaming training course details Who will benefit: Anyone working in the broadcast industry. Prerequisites: TCP/IP foundation for engineers Duration 2 days HTTP streaming training course contents What is HTTP streaming? The old way. Progressive downloads versus streaming. Why not UDP and RTP for delivery? Adaptive bit rate streaming. Standards. Hands on Base network setup. Using WireShark for HTTP streams. HTTP protocol stack IP, TCP, IPv6. HTTP. HTTP 1.0, HTTP 1.1, HTTP 2.0, HTTP header fields. HTML 5. Hands on Analysing HTTP. Adaptive bitrate streaming principles Chunks, fragments, segments. Manifest files. Encoding, resolution, bitrates. Addressing, relative and absolute URLs, redirection. When does the client switch streams? Switch points. Hands on Walk through of client behaviours on a stream. HTTP streaming architecture Server components, distribution components, client software. CDN, caching, multiple servers. Hands on Analysing CDN and Internet delivery. TCP and HTTP streaming interactions TCP ACK, TCP connections, unicast only. TCP flow control, TCP and performance. Hands on TCP window sizes. MPEG DASH Stakeholders, DASH architecture and model, codec agnostic, XML, Media Presentation Description, Media Presentation, segment formats. Hands on MPEG DASH analysis. HTTP Live Streaming and others Stakeholders. Media segments, media playlists, master playlists. Adobe HTTP dynamic streaming, Microsoft smooth streaming. Hands on Analysing HLS. Tools mp4dash, mp4fragment, libdash. Apple developer tools for HLS. Hands on Creating segmented content. Security HTTPS, encryption, content protection. Hands on Encryption analysis. Summary Choosing a streaming method. Impact of live versus VoD. Web sockets.
Total SIPp course description SIPp is a robust performance testing tool designed for evaluating the SIP protocol. This comprehensive course takes you on a journey from the initial installation of SIPp to mastering fundamental scenarios, exploring diverse architectures, delving into statistics analysis, and crafting XML scenario files. What will you learn Monitor SIP traffic with SIPp. Use SIPp for performance testing. Use the standard SIPp scenarios. Create custom scenarios in XML for SIPp. Total SIPp course details Who will benefit: Those working with SIP. Prerequisites: Definitive SIP for engineers Duration 2 days Total SIPp course contents Introduction What is SIPp? SIP review: UAC, UAS, INVITE, BYE. Sample SIP call flows. Hands on Wireshark, SIP call flow. Installing SIPp Getting SIPp, installing SIPp. Using SIPp Running sipp. sipp with uas scenario, sipp with uac scenario. The integrated scenarios. Online help. Hands on uac, uas. Controlling SIPp Hot keys, commands, UDP socket. Running SIPp in the background. Traffic control. SIPp performance testing. Hands on Changing call rates, remote control, pausing traffic. Monitoring SIP traffic Scenario screen, statistics. Response times, counters. Hands on Monitoring SIP traffic. More integrated scenarios SIPp and media and RTP. 3PCC. 3PCC extended. Transport modes: UDP, TCP, TLS, SCTP, IPv6 mono and multi socket. Hands on Third Party Call Control. XML What is XML? Content, markup, elements, attributes. Start tags, end tags. Hands on Displaying embedded scenarios, looking at the XML files of the integrated scenarios. Creating your own XML scenarios scenario, message commands, send, recv, nop, pause, sendCmd, recvCmd, common sipp scenario attributes, command specific sipp scenario attributes. XML DTD, jEdit. Hands on uac and uas scenario XML files. Recv actions Log and warning, exec, variables, variable types, variable scope. External variables. Hands on RTP streaming, Change a calls network destination, injection files. Regular expressions What is an RE. POSIX 1003.2. Re injection. Validation. Hands on regex example.
Firewalls training course description A technical hands on training course covering firewall technologies. This focuses on the whys and hows of firewall technology rather than looking at manufacturer specific issues. What will you learn Design secure firewall protected networks. Test firewalls. Evaluate firewalls Configure firewalls Firewalls training course details Who will benefit: Technical staff wanting to learn about Filrewalls including: Technical network staff. Technical security staff. Prerequisites: IP security foundation for engineers Duration 2 days Firewalls training course contents Firewall introduction Security review, what is a firewall? What do firewalls do? Firewall benefits, concepts. Hands on Configuring the network to be used in later labs, launching various attacks on a target. Firewall types Packet filtering, SPI, Proxy, Personal. Software firewalls, hardware firewalls, blade based firewalls, personal firewalls, which firewall should you use? Firewall products. Hands on Configuring a simple firewall. Packet filtering firewalls Things to filter in the IP header, stateless vs. stateful filtering. ACLs. Advantages of packet filtering. Hands on Configuring packet filtering firewalls. Stateful packet filtering Stateful algorithms, packet-by-packet inspection, application content filtering, tracks, special handling (fragments, IP options), sessions with TCP and UDP. Firewall hacking detection: SYN attacks, SSL, SSH interception. Hands on Stateful packet inspection firewalls. Proxy firewalls Circuit level, application level, SOCKS. Proxy firewall advantages and disadvantages. Hands on Proxy firewalls. Personal firewalls The role of personal firewalls, Windows XP, Zonealarm. Hands on Configuring a personal firewall. Firewall architectures Home based, small office, enterprise, service provider, what is a DMZ? DMZ architectures, bastion hosts, multi DMZ. Virtual firewalls, transparent firewalls. Dual firewall design, high availability, load balancing, VRRP. Hands on Resilient firewall architecture. Securing communications VPNs, IPsec. Firewall configuration of VPNs, integration of dedicated VPN devices and firewalls. Hands on IPSec VPN configuration. Testing firewalls Configuration checklist, testing procedure, monitoring firewalls, logging, syslog. Hands on Testing firewalls.
Learn how to upcycle furniture with Hannah from Tread Softly Furniture.
Learn to do keyword research for finding the best profitable and rank-able keywords for your site. Enrol the Keyword Research Course course and explore the ways of searching the best keywords for you. The starting of any business or websites should start with keyword research. No matter how good your content is, without proper keywords, your content will not appear to the reader's search list. The course helps you to find the best and profitable keywords. Inside the course, you will be taken to the journey of keyword research techniques and able to know the difference between short and long-tail keywords. You will also learn why a long-tail keyword is more profitable than short keywords. The course also introduces you with some of the free and paid keyword research tools and helps you to perform keyword research with Keyword planner and Longtail Pro. Finally, the course also explains a case study to understand the importance of keyword research. Upon completion, you will able to do keyword research for your business or other purposes. What you'll learn You will know how to utilize Google's Keyword Planner to identify niche keywords within your market You will know how to select high competition, medium competition & low competition keywords for your website You will know how to find the keyword's search volume You will know how to utilize long tail keyword research to your advantage You will know how to identify research vs buyer vs generic keywords & phrases You will know how to identify buying triggers for niche audiences You will know how to obtain keyword competition for both Organic & PPC keywords Requirements You should know how to use a PC at a beginner level Who is the target audience? Keyword Researchers Anyone with a product/service to sell Entrepreneurs Content Marketers Home Based Businesses Email Marketers Freelancers Online Businesses Affiliate Marketers Module: 01 Introduction 00:10:00 Difference Between Short & Longtail Keywords 00:05:00 What Are Local Keywords 00:02:00 Research vs Buyer Keywords 00:06:00 Google Auto Complete Search Engine 00:02:00 Module: 02 Free Software Walkthrough 00:03:00 Using Keyword Planner 00:05:00 Keyword Planner Sorting 00:10:00 LongTail Pro Keyword Research 00:10:00 KW Finder Keyword Research 00:05:00 Free Keyword Search Volume Tool 00:01:00 Mouse Recorder 00:04:00 Module: 03 How to Deliver Keyword Research as a Freelancer 00:10:00 Optimize an Article 00:20:00 Optimize Readability 00:08:00 WordPress Permalink Settings 00:01:00 Course Certification
Emotional Intelligence Training