• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

55169 Courses delivered Online

Objective-C programming

5.0(3)

By Systems & Network Training

OBJECTIVE-C PROGRAMMING TRAINING COURSE DESCRIPTION A hands on introduction that will allow you to master Objective-C and start using it to write powerful native applications for even the newest Macs and iOS devices! Using The step-by-step approach, will let you get comfortable with Objective-C's unique capabilities and Apple's Xcode 5 development environment. Make the most of Objective-C objects and messaging. Work effectively with design patterns, collections, blocks, foundation classes, threading, Git and a whole lot more. Every session builds on what you've already learned, giving a rock-solid foundation for real-world success! WHAT WILL YOU LEARN * Use Xcode 5. * Declare classes, instance variables, properties, methods, and actions. * Use arrays, dictionaries, and sets. * Expand and extend classes with protocols, delegates, categories, and extensions. * Use Apple's powerful classes and frameworks. OBJECTIVE-C PROGRAMMING TRAINING COURSE DETAILS * Who will benefit: Developers wanting to learn Objective-C. * Prerequisites: Software development fundamentals. * Duration 5 days OBJECTIVE-C PROGRAMMING TRAINING COURSE CONTENTS * PART 1: GETTING STARTED WITH OBJECTIVE-C * The Developer Program: Objective-C, enrolling as an Apple Developer, setting up the development environment, Xcode. Your first project. * OO programming with Objective-C: OO projects, Frameworks, classes and instances, encapsulation, accessors, Inheritance. * OO features in Objective-C: Messages, methods, working with id, nesting messages, method signatures and parameters. allocating and initializing objects. Using Xcode: Xcode, source code control, git and Xcode, Using a Remote Repository. * Compiler Directives: Projects, Compiler Directives, Prefix headers, main.m, .h files. * PART 2: OBJECTIVE-C BASICS * Messaging in a Testbed App: Setting Up the Testbed Apps, Adding a Text Field and Connecting It to Your Code, Sending a Message to the Text Field, Reviewing the Message Syntax. * Declaring a Class in an Interface File: Context, Creating an Instance Variable with id, What Happens When Execution Stops, dynamic binding, Creating an Instance Variable for with the Class Name and with a Superclass Name, instance variable visibility. * Properties in an Interface File: Interface Variables vs Properties, Declared Properties, Using Attributes. Implementing Properties. @synthesize, @dynamic. * Methods in an Interface File: Methods in a Class, class and instance methods, Method declaration, returning complex data structures from Methods. * Actions in an Interface File: Actions, Actions in OS X and iOS, disconnecting actions. * Routing messages with selectors: Receiver and selector objects in messages, Objective-C Runtime, SEL and @selector (), performSelector, NSInvocation, testing whether an Instance can respond to a selector. * Building on the Foundation: The Foundation Framework, Foundation Classes, Foundation Paradigms and Policies; Mutability, class clusters, notifications. * Defining a Class in Implementation Files: Projects, dynamic typing, creating a new App, implementing a method, expanding Classses with init Methods. * Organizing Data with Collections: Collecting Objects, Property Lists, Runtime, comparing the Collection Classes, Creating a Collection, Objective-C Literal Syntax, Enumerating collections, Testing Membership in a Collection, Accessing an Object in a Collection. * Managing Memory and Runtime Objects: Managing objects in memory, managing reference counts manually and with ARC, variable qualifiers, variable autorelease. * PART 3: EXPANDING AND EXTENDING CLASSES * Protocols and Delegates: Subclassing, Protocols, Delegates, Looking Deeper Inside Protocols. * Categories and Extensions: Comparing categories and protocols, categories vs subclasses, working with categories, class extensions, informal protocols. * Associative References and Fast Enumeration: Objective-C 2.0 Time-Saving Features, Extending Classes by Adding Instance Variables (Sort of), Using Fast Enumeration. * Blocks: Revisiting Blocks, Callbacks, Blocks, Exploring Blocks in Cocoa, Cocoa Blocks and Memory. * PART 4: BEYOND THE BASICS * Handling Exceptions and Errors: Exception and Error classes: NSException, NSError, Identifying exceptions, throwing exceptions, catching exceptions. * Queues and Threading: Getting Started with Concurrency, Introducing Queues, Dispatch Sources, Using Dispatch Queues. * Working with the Debugger: Logging Information, Console Logs, NSLog, Smart Breakpoints, enhancing breakpoints with messages. * Using Xcode Debug Gauges for Analysis: Debug Gauges, Monitoing CPU and memory utilization, monitoring energy, Using Instruments. * PART 5: OPTIONAL TOPICS * C Syntax Summary: Data Types, Control Structures. * Apps, Packages, and Bundles: Project Bundles, lproj Files, Asset Catalogs, plist Files, Precompiled Header Files (.pch). * Archiving and Packaging Apps for Development and Testing: Archiving.

Objective-C programming
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£4997

Penetration testing and Ethical Hacking

5.0(3)

By Systems & Network Training

PENETRATION TESTING TRAINING COURSE DESCRIPTION An advanced technical hands on course focusing on hacking and counter hacking. The course revolves around a series of exercises based on "hacking" into a network (pen testing the network) and then defending against the hacks. WHAT WILL YOU LEARN * Perform penetration tests. * Explain the technical workings of various penetration tests. * Produce reports on results of penetration tests. * Defend against hackers. PENETRATION TESTING TRAINING COURSE DETAILS * Who will benefit: Technical support staff, auditors and security professionals. Staff who are responsible for network infrastructure integrity. * Prerequisites: IP Security IP VPNs * Duration 5 days PENETRATION TESTING TRAINING COURSE CONTENTS * Introduction Hacking concepts, phases, types of attacks, 'White hacking', What is penetration testing? Why use pen testing, black box vs. white box testing, equipment and tools, security lifecycles, counter hacking, pen testing reports, methodologies, legal issues. * Physical security and social engineering Testing access controls, perimeter reviews, location reviews, alarm response testing. Request testing, guided suggestions, trust testing. Social engineering concepts, techniques, counter measures, Identity theft, Impersonation on social media, Footprints through social engineering * Reconnaissance (discovery) Footprinting methodologies, concepts, threats and countermeasures, WHOIS footprinting, Gaining contacts and addresses, DNS queries, NIC queries, ICMP ping sweeping, system and server trails from the target network, information leaks, competitive intelligence. Scanning pen testing. * Gaining access Getting past passwords, password grinding, spoofed tokens, replays, remaining anonymous. * Scanning (enumeration) Gaining OS info, platform info, open port info, application info. Routes used, proxies, firewalking, Port scanning, stealth port scanning, vulnerability scanning, FIN scanning, Xmas tree scanning, Null scanning, spoofed scanning, Scanning beyond IDS. Enumeration concepts, counter measures and enumeration pen testing. * Hacking Hacking webservers, web applications, Wireless networks and mobile platforms. Concepts, threats, methodology, hacking tools and countermeasures. * Trojan, Backdoors, Sniffers, Viruses and Worms Detection, concepts, countermeasures, Pen testing Trojans, backdoors, sniffers and viruses. MAC attacks, DHCP attacks, ARP poisoning, DNS poisoning Anti-Trojan software, Malware analysis Sniffing tools. * Exploiting (testing) vulnerabilities Buffer overflows,, simple exploits, brute force methods, UNIX based, Windows based, specific application vulnerabilities. * DoS/DDoS Concepts, techniques, attack tools, Botnet, countermeasures, protection tools, DoS attack pen testing. * SQL Injection Types and testing, Blind SQL Injection, Injection tools, evasion and countermeasures. * Securing networks 'Hurdles', firewalls, DMZ, stopping port scans, IDS, Honeypots, Router testing, firewall testing, IDS testing, Buffer Overflow. * Cryptography PKI, Encryption algorithms, tools, Email and Disk Encryption. * Information security Document grinding, privacy.

Penetration testing and Ethical Hacking
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£4997

Advanced Junos Security

5.0(3)

By Systems & Network Training

ADVANCED JUNOS SECURITY TRAINING COURSE DESCRIPTION This course provides students with intermediate routing knowledge and configuration examples. The course includes an overview of protocol-independent routing features, load balancing and filter-based forwarding, OSPF, BGP, IP tunneling, and high availability (HA) features. Junos Intermediate Routing (JIR) is an intermediate-level course. WHAT WILL YOU LEARN * Demonstrate the understanding of integrated user firewall. * Implement next generation Layer 2 security features. * Implement virtual routing instances in a security setting. * Utilize Junos tools for troubleshooting Junos security implementations. * Implement IPS policy. ADVANCED JUNOS SECURITY TRAINING COURSE DETAILS * Who will benefit: Individuals responsible for implementing, monitoring, and troubleshooting Junos security components. * Prerequisites: Intro to the Junos Operating System * Duration 5 days ADVANCED JUNOS SECURITY TRAINING COURSE CONTENTS * Junos Layer 2 Packet Handling and Security Features Transparent Mode Security Secure Wire Layer 2 Next Generation Ethernet Switching MACsec Lab 2 Implementing Layer 2 Security * Virtualization Virtualization Overview Routing Instances Logical Systems Lab 3 Implementing Junos Virtual Routing * AppSecure Theory AppSecure Overview AppID Overview AppID Techniques Application System Cache Custom Application Signatures * AppSecure Implementation AppTrack AppFW AppQoS APBR SSL Proxy Lab 4 Implementing AppSecure * Working with Log Director Log Director Overview Log Director Components Installing and setting up Log Director Clustering with the Log Concentrator VM Administrating Log Director Lab 5 Deploying Log Director * Sky ATP Theory Sky ATP Overview Monitoring Sky ATP Analysis and Detection of Malware * Sky ATP Implementation Configuring Sky ATP Installing Sky ATP Analysis and detection of Malware Infected Host Case Study Lab 6 Instructor Led Sky ATP Demo * Implementing UTM UTM Overview AntiSpam AntiVirus Content and Web Filtering Lab 7 Implementing UTM * Introduction to IPS IPS Overview Network Asset Protection Intrusion Attack Methods Intrusion Prevention Systems IPS Inspection Walkthrough IPS Policy and Configuration SRX IPS Requirements IPS Operation Modes Basic IPS Policy Review IPS Rulebase Operations Lab 8 Implementing Basic IPS Policy * SDSN SDSN Overview, Components & Configuration Policy Enforcer Troubleshooting SDSN Use Cases Lab 9 Implementing SDSN * Enforcement, Monitoring, and Reporting User Role Firewall and Integrated User Firewall Overview User Role Firewall Implementation Monitoring User Role Firewall Integrated User Firewall Implementation Monitoring Integrated User Firewall Lab 10 Configure User Role Firewall and Integrated User Firewall * Troubleshooting Junos Security Troubleshooting Methodology Troubleshooting Tools Identifying IPsec Issues Lab 11 Performing Security Troubleshooting Techniques * Appendix A: SRX Series Hardware and Interfaces Branch SRX Platform Overview High End SRX Platform Overview SRX Traffic Flow and Distribution SRX Interfaces

Advanced Junos Security
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£4997

Ghost Stories: Rawblood by Catriona Ward

By Words Have Power

This mini-course is part of the larger Words Have Power course series, Introduction to Contemporary Gothic Literature, and allows access to the course materials and live seminar on ghost stories as represented by Rawblood by Catriona Ward

Ghost Stories: Rawblood by Catriona Ward
Delivered Online2 hours, Aug 14th, 17:00
£13

Computer System Validation Training Course (ONLINE). Extend Your Role to CSV Projects. Get Certified and Become a CSV Professional

By Getreskilled (UK)

Has the Computer System Validation Engineer left and you’ve been handed their responsibilities? Do the thoughts of your next audit fill you with dread? CSV can be frustrating but this program will show you how to manage electronic data in a regulated manufacturing/laboratory/clinical environment using the GAMP framework and ensure compliance with FDA’s 21 CFR Part 11, EU Annex 11 or other regulatory guidelines.

Computer System Validation Training Course (ONLINE). Extend Your Role to CSV Projects. Get Certified and Become a CSV Professional
Delivered Online On Demand
£699 to £9996

The C&G Fast Track Course - C&G 2365 Level 2 and 3 Diploma in Electrical Installations

5.0(9)

By Optima Electrical Training

https://www.optima-ect.com/fast-track-course

The C&G Fast Track Course - C&G 2365 Level 2 and 3 Diploma in Electrical Installations
Delivered Online On Demand
£6495 to £7395

Fundraiser Suicide First Aid Lite for WSPD

5.0(2)

By Changing Minds Training

In support of this year's World Suicide Prevention Day, all ticket fees for Tuesday 10th September 2024 are donated to The Ripple Suicide Prevention Charity - find out more about them here [https://www.ripplesuicideprevention.com]! Course Overview Teaching the theory and practice of suicide intervention skills that can be applied in any professional or personal setting, this programme is delivered over 3.5 hours as a suicide prevention awareness session. We use only the most experienced suicide prevention trainers to deliver this unique learning experience: for anyone who seeks greater understanding and confidence to intervene with people at risk of suicide.  The Suicide First Aid Lite (Virtual) course gives learners the knowledge and tools to understand that suicide is one of the most preventable deaths and some basic skills can help someone with thoughts of suicide stay safe from their thoughts and stay alive.  Course Content SFA Lite is comprised of 2 parts, each 90 minutes duration. The programme teaches the skills needed to identify someone who may be thinking about suicide and to pass the person onto a suicide first aider.  Part 1: * Introduction to the session; programme, ourselves and suicide prevention  * Stigma and survivors of bereavement by suicide and the Hidden Toll  * Suicide thoughts and suicide behaviour  * Intention of behaviour versus outcome of behaviour  * Possible causes of suicide thoughts  * Suicide – the ripple effect  Part 2: * ‘I’m really glad you told me’ audio visual  * Suicide Safety Guidance  * Recognising and asking about suicide  * Referring a person onto suicide first aiders  Suicide First Aid Lite (Virtual) training offers learning outcomes that are knowledge based and factual. This training can be used as a stand-alone programme or as the first part of a journey to learn suicide prevention skills.  The one-day programme Suicide First Aid through Understanding Suicide Interventions is a City & Guilds qualification programme and the next step for people wanting a more in-depth practise-based approach to the learning. The information in SFALV is easy to grasp for people of all skill levels and those with no prior knowledge of the subject. It is designed to meet the needs of virtual groups and could be used as a forerunner to the one-day Suicide First Aid Programme.  Evidence Base Two independent evaluations in 2016 and 2017 by Dr Paul Rogers demonstrated significant statistical change in 14 of 19 measures. Increased confidence and reduced anxiety in dealing with suicide, were among the leading outcomes.  Format Taught over 3.5 hours using tutor facilitated socratic learning, tutor-led practise sessions, mini lectures, group work and audio-visual presentations. This is a has some interactive elements and is an emotionally engaging learning experience.  Pre-training requirement No previous experience or training is necessary. Participants will be asked to self- reflect and empathise with a person having thoughts of suicide. There is no expectation on participants to share personal experiences.  Who should attend?  Multi-sector managers and practitioners including health, housing, social care, education, criminal justice, call centre operators, private, voluntary and public sector workers and community groups or members. 

Fundraiser Suicide First Aid Lite for WSPD
Delivered Online4 hours, Sept 10th, 08:00
£10 to £115

Object Oriented Analysis & Design

5.0(3)

By Systems & Network Training

OOAD TRAINING COURSE DESCRIPTION A workshop course providing thorough practical knowledge of object oriented analysis and design methods. WHAT WILL YOU LEARN * Perform Systems Analysis with Object Oriented methods. * Identify key classes and objects. * Expand and refine OO problem domain models. * Design Class hierarchies using inheritance and polymorphism. * Design programs with Object Oriented methods. OOAD TRAINING COURSE DETAILS * Who will benefit: System analysts, designers, programmers and project managers. * Prerequisites: It is desirable that delegates have experience of programming in C++/Java or some other OOP language. * Duration 5 days OOAD TRAINING COURSE CONTENTS * What is OO? Classes, objects, messages, encapsulation, associations, inheritance, polymorphism, reusability. * What is Systems Analysis and design? Data flow diagrams, structure diagrams. The OO approach. * OOA The problem domain and object modelling. Identifying classes and objects. Generalisation and inheritance. Defining attributes and methods. * OOD Refining the OOA results. Designing the User Interface. Designing the algorithms and data structures using objects. Designing the methods. * OOP Prototyping. Implementing OOD with OOPs and OOPLs.

Object Oriented Analysis & Design
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£4637

Certified Kanban System Design – KMP I - 17-19 December

By Tom Reynolds

Attend our world class Kanban University accredited Certified Kanban System Design training course and learn to implement Kanban in your company

Certified Kanban System Design – KMP I - 17-19 December
Delivered Online3 days, Dec 17th, 09:00
£1074 to £1194

M.D.D DATING ADVICE FOR WOMEN WITH VERY LOW CONFIDENCE PACKAGE (DATING ADVICE FOR WOMEN)

4.9(27)

By Nia Williams Miss Date Doctor Dating Coach London, Couples Therapy

* Introspective test * Emotional regulation and emotional intelligence training * Help in addressing pain points areas * Full Makeover and beauty treatments * 10 V.I.P confidence building sessions * Personality test * Addressing trauma issues * Personal life coach available daily * Behavioural pattern training * Relationships analysation * Happiness test * Dating advice for low confidence and insecurity triggers * Eradication of negative patterns * Cognitive behavioural therapy https://relationshipsmdd.com/product/dating-advice-for-women-with-very-low-confidence-package/ [https://relationshipsmdd.com/product/dating-advice-for-women-with-very-low-confidence-package/]

M.D.D DATING ADVICE FOR WOMEN WITH VERY LOW CONFIDENCE PACKAGE (DATING ADVICE FOR WOMEN)
Delivered in-person, on-request, onlineDelivered Online & In-Person in London & 2 more
£4800