• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

530 AI courses in Leeds

🔥 Limited Time Offer 🔥

Get a 10% discount on your first order when you use this promo code at checkout: MAY24BAN3X

 MODERNIZED SERVICES Introduction: In the rapidly evolving realm of dating, finding reliable advice can be a daunting task. However, Miss Date Doctor is revolutionizing the industry by harnessing the power of artificial intelligence (AI) to provide contemporary, personalized dating services. Through the utilization of ChatGPT, Miss Date Doctor [https://finance.yahoo.com/news/miss-date-doctor-launch-revolutionary-130000810.html?guccounter=1&guce_referrer=aHR0cHM6Ly93d3cuZ29vZ2xlLmNvLnVrLw&guce_referrer_sig=AQAAAIWKCTpbbhGqqg2cSSvFVugDq1z_g8O7A3ajlDcbaV055RSCNyaJOFC501gKdxi4lVFDkg8xqo8HiEyUnsX22Umb3N5SCZzkI-NtP3ReIEpcOLSXRRFSNYKef-OjxYWLo2rbNoEGF4fFWpIa0NOh4VyEqdCnnA-UfwudNOYe_yxX] combines human expertise with cutting-edge AI technology, [https://finance.yahoo.com/news/miss-date-doctor-launch-revolutionary-130000810.html] offering unrivaled support for individuals seeking dating advice. This article explores how ChatGPT’s AI-driven approach, integrated with Miss Date Doctor’s services, empowers customers with modernized strategies and a customized experience. https://relationshipsmdd.com/chatgpt-dating-advice/ [https://relationshipsmdd.com/chatgpt-dating-advice/]

M.D.D CHATGPT DATING ADVICE
Delivered in-person, on-request, onlineDelivered Online & In-Person in London & 2 more
Price on Enquiry

Mental Health First Aid - 2 day

5.0(1)

By Strongmind Resiliency Training Ltd

Mental Health First Aiders (MHFAiders®) are vital to helping boost employee wellbeing as we adjust to a completely changed workplace environment.

Mental Health First Aid - 2 day
Delivered in-person, on-requestDelivered In-Person in Andover & 1 more
£3800

Suicide First Aid

5.0(2)

By Changing Minds Training

This one-day Suicide First Aid training course gives learners the knowledge and tools to understand that suicide is one of the most preventable deaths and some basic skills can help someone with thoughts of suicide stay safe from their thoughts and stay alive.

Suicide First Aid
Delivered in-person, on-request, onlineDelivered Online & In-Person in London
£2495

Suicide First Aid Lite

5.0(2)

By Changing Minds Training

This half-day Suicide First Aid Lite training course gives learners the knowledge and tools to understand that suicide is one of the most preventable deaths and some basic skills can help someone with thoughts of suicide stay safe from their thoughts and stay alive.

Suicide First Aid Lite
Delivered in-person, on-request, onlineDelivered Online & In-Person in London
£1995

The Fundamentals of Ultra-Low Emission Road Transport

By Cenex (Centre of Excellence for Low Carbon & Fuel Cell Technologies)

In-house training courses on electric and hydrogen vehicle technologies, charging infrastructure and how they work.

The Fundamentals of Ultra-Low Emission Road Transport
Delivered in-person, on-requestDelivered In-Person in Internationally
Price on Enquiry

Private MHFA Refresher

5.0(2)

By Changing Minds Training

The course is a four-hour refresher session for those who have completed the Mental Health First Aid two day course. Just like physical first aid, we recommend you refresh your skills regularly and keep up-to-date.

Private MHFA Refresher
Delivered in-person, on-request, onlineDelivered Online & In-Person in London
£2995

Mental Health First Aid

5.0(2)

By Changing Minds Training

Mental Health First Aid
Delivered in-person, on-request, onlineDelivered Online & In-Person in London
£3995

How to identify and mitigate procurement fraud and corruption - IN PERSON

By Global Risk Alliance Ltd

Our training programme will provide those involved at any stage of the process for procuring goods and/or services within their organisations with the knowledge and skillset to identify and mitigate the threat posed by the breadth and multi-layered complexity of procurement fraud and corruption.

How to identify and mitigate procurement fraud and corruption - IN PERSON
Delivered in-person, on-requestDelivered In-Person in Internationally
£5000 to £7000

LTE airside

5.0(3)

By Systems & Network Training

LTE AIRSIDE TRAINING COURSE DESCRIPTION This course provides a concise insight into the LTE airside. Key parts of the course are detailed looks at the air interface protocol stack, cell acquisition, transmission and reception of data and of he layer 1 procedures along with layer 2 procedures. WHAT WILL YOU LEARN * Explain the RF optimisation flowchart. * Describe the importance of Reference Signal Received Power (RSRP). * List many of the 3GPP recommended KPIs. * Describe the concept of APN AMBR and UE AMBR within LTE. * Describe the use of planning and optimisation computer tools. LTE AIRSIDE TRAINING COURSE DETAILS * Who will benefit: Anyone working with LTE. * Prerequisites: Essential LTE * Duration 2 days LTE AIRSIDE TRAINING COURSE CONTENTS * Introduction and review of LTE This section describes the requirements of LTE and key technical features, and reviews the system architecture. LTE Architecture, UE, E-UTRAN and EPC. Specifications. * OFDMA, SC-FDMA and MIMO antennas This section describes the techniques used in the LTE air interface, notably orthogonal frequency division multiple access (OFDMA) and multiple input multiple output (MIMO) antennas. Communication techniques for fading multipath channels. OFDMA, FFT processing and cyclic prefix insertion. SC-FDMA in the LTE uplink. Multiple antenna techniques including transmit & receive diversity and spatial multiplexing. * Introduction to the air interface This section covers the operation of the air interface, the channels that it uses, and the mapping to the time and frequency domains of OFDMA and SC-FDMA. Air interface protocol stack. Logical, transport and physical channels. Frame and slot structure, the resource grid. Resource element mapping of the physical channels and physical signals. LTE spectrum allocation. * Cell acquisition This is the first of three sections covering the air interface physical layer. Here, we cover mobile procedures to start low-level communications with the cell, and base station transmission of the corresponding information. Primary/secondary synchronisation signals. Downlink reference signals. The master information block. Physical control format indicator channel. Organisation and transmission of the system information. * Data transmission and reception In this section, we cover procedures used for data transmission and reception on the shared channels, and describe in detail the individual steps. Data transmission and reception on the uplink and downlink. Scheduling commands and grants on the PDCCH. DL-SCH and UL-SCH. Physical channel processing of the PDSCH and PUSCH. Hybrid ARQ indicators on the PHICH. Uplink control information on the PUCCH. Uplink demodulation and sounding reference signals. * Additional physical layer procedure This section concludes our discussion of the air interface physical layer, by discussing a number of procedures that support its operation. Transmission of the physical random access channel. Contention and non-contention based random access procedures. Discontinuous transmission in idle and connected modes. Uplink power control and timing advance. * Air interface layer 2 This section describes the architecture and operation of layer 2 of the air interface protocol stack. MAC protocol, interactions with the physical layer, use for scheduling. RLC protocol, transparent, unacknowledged and acknowledged modes. PDCP, including header compression, security functions and recovery from handover.

LTE airside
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£2477

Securing UNIX systems

5.0(3)

By Systems & Network Training

SECURING UNIX SYSTEMS TRAINING COURSE DESCRIPTION This course teaches you everything you need to know to build a safe Linux environment. The first section handles cryptography and authentication with certificates, openssl, mod_ssl, DNSSEC and filesystem encryption. Then Host security and hardening is covered with intrusion detection, and also user management and authentication. Filesystem Access control is then covered. Finally network security is covered with network hardening, packet filtering and VPNs. WHAT WILL YOU LEARN * Secure UNIX accounts. * Secure UNIX file systems. * Secure UNIX access through the network. SECURING UNIX SYSTEMS COURSE DETAILS * Who will benefit: Linux technical staff needing to secure their systems. * Prerequisites: Linux system administration (LPIC-1) * Duration 5 days SECURING UNIX SYSTEMS COURSE CONTENTS * Cryptography * Certificates and Public Key Infrastructures X.509 certificates, lifecycle, fields and certificate extensions. Trust chains and PKI. openssl. Public and private keys. Certification authority. Manage server and client certificates. Revoke certificates and CAs. * Encryption, signing and authentication SSL, TLS, protocol versions. Transport layer security threats, e.g. MITM. Apache HTTPD with mod_ssl for HTTPS service, including SNI and HSTS. HTTPD with mod_ssl to authenticate users using certificates. HTTPD with mod_ssl to provide OCSP stapling. Use OpenSSL for SSL/TLS client and server tests. * Encrypted File Systems Block device and file system encryption. dm-crypt with LUKS to encrypt block devices. eCryptfs to encrypt file systems, including home directories and, PAM integration, plain dm-crypt and EncFS. * DNS and cryptography DNSSEC and DANE. BIND as an authoritative name server serving DNSSEC secured zones. BIND as an recursive name server that performs DNSSEC validation, KSK, ZSK, Key Tag, Key generation, key storage, key management and key rollover, Maintenance and resigning of zones, Use DANE. TSIG. * Host Security * Host Hardening BIOS and boot loader (GRUB 2) security. Disable useless software and services, sysctl for security related kernel configuration, particularly ASLR, Exec-Shield and IP / ICMP configuration, Exec-Shield and IP / ICMP configuration, Limit resource usage. Work with chroot environments, Security advantages of virtualization. * Host Intrusion Detection The Linux Audit system, chkrootkit, rkhunter, including updates, Linux Malware Detect, Automate host scans using cron, AIDE, including rule management, OpenSCAP. * User Management and Authentication NSS and PAM, Enforce password policies. Lock accounts automatically after failed login attempts, SSSD, Configure NSS and PAM for use with SSSD, SSSD authentication against Active Directory, IPA, LDAP, Kerberos and local domains, Kerberos and local domains, Kerberos tickets. * FreeIPA Installation and Samba Integration FreeIPA, architecture and components. Install and manage a FreeIPA server and domain, Active Directory replication and Kerberos cross-realm trusts, sudo, autofs, SSH and SELinux integration in FreeIPA. * Access Control * Discretionary Access Control File ownership and permissions, SUID, SGID. Access control lists, extended attributes and attribute classes. * Mandatory Access Control TE, RBAC, MAC, DAC. SELinux, AppArmor and Smack. * etwork File Systems NFSv4 security issues and improvements, NFSv4 server and clients, NFSv4 authentication mechanisms (LIPKEY, SPKM, Kerberos), NFSv4 pseudo file system, NFSv4 ACLs. CIFS clients, CIFS Unix Extensions, CIFS security modes (NTLM, Kerberos), mapping and handling of CIFS ACLs and SIDs in a Linux system. * Network Security * Network Hardening FreeRADIUS, nmap, scan methods. Wireshark, filters and statistics. Rogue router advertisements and DHCP messages. * Network Intrusion Detection ntop, Cacti, bandwidth usage monitoring, Snort, rule management, OpenVAS, NASL. * Packet Filtering Firewall architectures, DMZ, netfilter, iptables and ip6tables, standard modules, tests and targets. IPv4 and IPv6 packet filtering. Connection tracking, NAT. IP sets and netfilter rules, nftables and nft. ebtables. conntrackd * Virtual Private Networks OpenVPN server and clients for both bridged and routed VPN networks. IPsec server and clients for routed VPN networks using IPsec-Tools / racoon. L2TP.

Securing UNIX systems
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£4997