• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

2078 Courses in Blackfield

Complete COBOL programming

5.0(3)

By Systems & Network Training

COBOL TRAINING COURSE DESCRIPTION A hands on training course providing an introduction to COBOL. WHAT WILL YOU LEARN * Write COBOL programs * Debug COBOL programs * Examine existing code and determine its function. COBOL TRAINING COURSE DETAILS * Who will benefit: Programmers working with COBOL. * Prerequisites: None although experience in another high level language would be useful. A 10 day version of this course would be more applicable for those new to programming. * Duration 5 days COBOL TRAINING COURSE CONTENTS * Introduction to COBOL Compilation, linkage editor. Compile errors, compiler options. Divisions, syntax and format, COBOL character set, program structure. * COBOL statement structure COBOL words, format of statements. * Divisions Identification entries, Environment entries, Data division: FD, record descriptions, hierarchy and level numbers, description-string entry. * File and Working-Storage Sections Literals, figurative constants, redefines clause, data representation, Usage clause, synchronization, sign clause. * Procedure Division File status codes; Open, Read, Write, Close, Stop, Goback; Accept, display; Move, Justified, data name qualification, reference modification. * Perform statement Out-of-line, With test ... Until, ... Times, in-line statement; Go to statement. * Program design Design techniques, design considerations, procedure names, program structure. * Printing Printed output, Write, advancing option, editing characters; Initialize. * Condition testing Conditional statements: IF, class, sign and relation conditions, condition-name conditionals, Set, compound conditions, logical operators. Evaluate, Continue. * Arithmetic Rounded option, On Size Error option, Add, Subtract, Multiply, Divide, Compute. * Non-sequential files File access modes, Select. Indexed and relative files. Open, Close, creating / reading sequential access files, Write, Read, Invalid key clause, reading, writing / updating Random access files, Rewrite, Delete, Start. * Declarative routines Clauses. * Subroutines Call, Using clause - calling program/called program, Linkage Section, returning control. * Table handling Subscripted tables: One/two/three dimensional tables, Perform, variable length tables. Indexed tables: Set, using an index; Search. Copy code: Copy, Suppress, Replacing. * Data Manipulation Inspect, String, Unstring. COBOL/370 LE/370 and Intrinsic Functions.

Complete COBOL programming
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£4997

Advanced Satellite communications

5.0(3)

By Systems & Network Training

SATELLITE COMMUNICATIONS TRAINING COURSE DESCRIPTION This course starts by recaping some of the essential satellite knowledge required and proceeds to explore the deeper aspects of satellite communications, including hardware, communications and error control coding. WHAT WILL YOU LEARN * Explain how satellite communications work. * Explain how RF works * Explain the architecture of satellite systems. * Use spectrum analysers. SATELLITE COMMUNICATIONS TRAINING COURSE DETAILS * Who will benefit: Anyone working with satellite systems. * Prerequisites: None. * Duration 3 days SATELLITE COMMUNICATIONS TRAINING COURSE CONTENTS * Basic Principles of Satellite Communications GEO, MEO and LEO satellites. Launching and orbits. Frequency bands and polarisation. Satellite footprints. Multibeam coverage. Power spectra. Link budgets. Modulation and coding. Access technologies. Earth station components. Space segment components. Satellite system services. Satellite operators. * Radio frequency propagation Electromagnetic waves principles and generation. Reception of the EM wave. Space wave, sky wave and surface wave theory. The isotropic radiator. Types of antennae and their basic properties. Polar diagrams. International frequency allocation. Spectrum management and utilisation. Radio wave propagation. Line of sight propagation. Propagation for satellite comms. Free space path loss. Path attenuation. Noise and Interference. Power and its measurement. * Satellite antennae and other hardware Power flux density. Effective aperture. Horn antennae. Parabolic reflector. Offset feed. Cassegrain and Gregorian antennae. Antenna feed systems - Horn, TMC, OMJ and polarizer. Antenna steering and mount systems. Array antennae. LNA, LNB, LNC. Microwave tubes - TWT and Klystron. Polarizers. * Earth and Space Segments and the link Earth station antennae. Transponders. Antennae sub systems. Power supplies. Link budgets. System noise. System losses. Interference. Satellite switching. * Ground Communications Equipment Baseband signals. Analogue and Digital systems. Overview of modulation - AM, FM, PM. Digital Modulation. Frequency conversion -up and down conversion. Filters, mixers, local oscillators, IF amplifiers and group delay equalisers. Access methods - single and multiple access systems. Data networks. Television transmission - analogue and digital. Digital signal compression. MPEG processing. * Satellite Navigation Longitude, latitude, altitude, GPS, How GPS works, timing, alternatives to GPS. * Mobile satellite services Voice and Phones, BGAN, TV, GPS to program aerial, VSAT. * Error Control Coding The need for coding. Linear block codes. Cyclic codes. Convolution codes. Interleaving and concatenated codes. Coding gain. Turbo codes. * Test and measurement Theory and practice of Spectrum Analysers.

Advanced Satellite communications
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£4997

Objective-C programming

5.0(3)

By Systems & Network Training

OBJECTIVE-C PROGRAMMING TRAINING COURSE DESCRIPTION A hands on introduction that will allow you to master Objective-C and start using it to write powerful native applications for even the newest Macs and iOS devices! Using The step-by-step approach, will let you get comfortable with Objective-C's unique capabilities and Apple's Xcode 5 development environment. Make the most of Objective-C objects and messaging. Work effectively with design patterns, collections, blocks, foundation classes, threading, Git and a whole lot more. Every session builds on what you've already learned, giving a rock-solid foundation for real-world success! WHAT WILL YOU LEARN * Use Xcode 5. * Declare classes, instance variables, properties, methods, and actions. * Use arrays, dictionaries, and sets. * Expand and extend classes with protocols, delegates, categories, and extensions. * Use Apple's powerful classes and frameworks. OBJECTIVE-C PROGRAMMING TRAINING COURSE DETAILS * Who will benefit: Developers wanting to learn Objective-C. * Prerequisites: Software development fundamentals. * Duration 5 days OBJECTIVE-C PROGRAMMING TRAINING COURSE CONTENTS * PART 1: GETTING STARTED WITH OBJECTIVE-C * The Developer Program: Objective-C, enrolling as an Apple Developer, setting up the development environment, Xcode. Your first project. * OO programming with Objective-C: OO projects, Frameworks, classes and instances, encapsulation, accessors, Inheritance. * OO features in Objective-C: Messages, methods, working with id, nesting messages, method signatures and parameters. allocating and initializing objects. Using Xcode: Xcode, source code control, git and Xcode, Using a Remote Repository. * Compiler Directives: Projects, Compiler Directives, Prefix headers, main.m, .h files. * PART 2: OBJECTIVE-C BASICS * Messaging in a Testbed App: Setting Up the Testbed Apps, Adding a Text Field and Connecting It to Your Code, Sending a Message to the Text Field, Reviewing the Message Syntax. * Declaring a Class in an Interface File: Context, Creating an Instance Variable with id, What Happens When Execution Stops, dynamic binding, Creating an Instance Variable for with the Class Name and with a Superclass Name, instance variable visibility. * Properties in an Interface File: Interface Variables vs Properties, Declared Properties, Using Attributes. Implementing Properties. @synthesize, @dynamic. * Methods in an Interface File: Methods in a Class, class and instance methods, Method declaration, returning complex data structures from Methods. * Actions in an Interface File: Actions, Actions in OS X and iOS, disconnecting actions. * Routing messages with selectors: Receiver and selector objects in messages, Objective-C Runtime, SEL and @selector (), performSelector, NSInvocation, testing whether an Instance can respond to a selector. * Building on the Foundation: The Foundation Framework, Foundation Classes, Foundation Paradigms and Policies; Mutability, class clusters, notifications. * Defining a Class in Implementation Files: Projects, dynamic typing, creating a new App, implementing a method, expanding Classses with init Methods. * Organizing Data with Collections: Collecting Objects, Property Lists, Runtime, comparing the Collection Classes, Creating a Collection, Objective-C Literal Syntax, Enumerating collections, Testing Membership in a Collection, Accessing an Object in a Collection. * Managing Memory and Runtime Objects: Managing objects in memory, managing reference counts manually and with ARC, variable qualifiers, variable autorelease. * PART 3: EXPANDING AND EXTENDING CLASSES * Protocols and Delegates: Subclassing, Protocols, Delegates, Looking Deeper Inside Protocols. * Categories and Extensions: Comparing categories and protocols, categories vs subclasses, working with categories, class extensions, informal protocols. * Associative References and Fast Enumeration: Objective-C 2.0 Time-Saving Features, Extending Classes by Adding Instance Variables (Sort of), Using Fast Enumeration. * Blocks: Revisiting Blocks, Callbacks, Blocks, Exploring Blocks in Cocoa, Cocoa Blocks and Memory. * PART 4: BEYOND THE BASICS * Handling Exceptions and Errors: Exception and Error classes: NSException, NSError, Identifying exceptions, throwing exceptions, catching exceptions. * Queues and Threading: Getting Started with Concurrency, Introducing Queues, Dispatch Sources, Using Dispatch Queues. * Working with the Debugger: Logging Information, Console Logs, NSLog, Smart Breakpoints, enhancing breakpoints with messages. * Using Xcode Debug Gauges for Analysis: Debug Gauges, Monitoing CPU and memory utilization, monitoring energy, Using Instruments. * PART 5: OPTIONAL TOPICS * C Syntax Summary: Data Types, Control Structures. * Apps, Packages, and Bundles: Project Bundles, lproj Files, Asset Catalogs, plist Files, Precompiled Header Files (.pch). * Archiving and Packaging Apps for Development and Testing: Archiving.

Objective-C programming
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£4997

Penetration testing and Ethical Hacking

5.0(3)

By Systems & Network Training

PENETRATION TESTING TRAINING COURSE DESCRIPTION An advanced technical hands on course focusing on hacking and counter hacking. The course revolves around a series of exercises based on "hacking" into a network (pen testing the network) and then defending against the hacks. WHAT WILL YOU LEARN * Perform penetration tests. * Explain the technical workings of various penetration tests. * Produce reports on results of penetration tests. * Defend against hackers. PENETRATION TESTING TRAINING COURSE DETAILS * Who will benefit: Technical support staff, auditors and security professionals. Staff who are responsible for network infrastructure integrity. * Prerequisites: IP Security IP VPNs * Duration 5 days PENETRATION TESTING TRAINING COURSE CONTENTS * Introduction Hacking concepts, phases, types of attacks, 'White hacking', What is penetration testing? Why use pen testing, black box vs. white box testing, equipment and tools, security lifecycles, counter hacking, pen testing reports, methodologies, legal issues. * Physical security and social engineering Testing access controls, perimeter reviews, location reviews, alarm response testing. Request testing, guided suggestions, trust testing. Social engineering concepts, techniques, counter measures, Identity theft, Impersonation on social media, Footprints through social engineering * Reconnaissance (discovery) Footprinting methodologies, concepts, threats and countermeasures, WHOIS footprinting, Gaining contacts and addresses, DNS queries, NIC queries, ICMP ping sweeping, system and server trails from the target network, information leaks, competitive intelligence. Scanning pen testing. * Gaining access Getting past passwords, password grinding, spoofed tokens, replays, remaining anonymous. * Scanning (enumeration) Gaining OS info, platform info, open port info, application info. Routes used, proxies, firewalking, Port scanning, stealth port scanning, vulnerability scanning, FIN scanning, Xmas tree scanning, Null scanning, spoofed scanning, Scanning beyond IDS. Enumeration concepts, counter measures and enumeration pen testing. * Hacking Hacking webservers, web applications, Wireless networks and mobile platforms. Concepts, threats, methodology, hacking tools and countermeasures. * Trojan, Backdoors, Sniffers, Viruses and Worms Detection, concepts, countermeasures, Pen testing Trojans, backdoors, sniffers and viruses. MAC attacks, DHCP attacks, ARP poisoning, DNS poisoning Anti-Trojan software, Malware analysis Sniffing tools. * Exploiting (testing) vulnerabilities Buffer overflows,, simple exploits, brute force methods, UNIX based, Windows based, specific application vulnerabilities. * DoS/DDoS Concepts, techniques, attack tools, Botnet, countermeasures, protection tools, DoS attack pen testing. * SQL Injection Types and testing, Blind SQL Injection, Injection tools, evasion and countermeasures. * Securing networks 'Hurdles', firewalls, DMZ, stopping port scans, IDS, Honeypots, Router testing, firewall testing, IDS testing, Buffer Overflow. * Cryptography PKI, Encryption algorithms, tools, Email and Disk Encryption. * Information security Document grinding, privacy.

Penetration testing and Ethical Hacking
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£4997

Advanced Junos Security

5.0(3)

By Systems & Network Training

ADVANCED JUNOS SECURITY TRAINING COURSE DESCRIPTION This course provides students with intermediate routing knowledge and configuration examples. The course includes an overview of protocol-independent routing features, load balancing and filter-based forwarding, OSPF, BGP, IP tunneling, and high availability (HA) features. Junos Intermediate Routing (JIR) is an intermediate-level course. WHAT WILL YOU LEARN * Demonstrate the understanding of integrated user firewall. * Implement next generation Layer 2 security features. * Implement virtual routing instances in a security setting. * Utilize Junos tools for troubleshooting Junos security implementations. * Implement IPS policy. ADVANCED JUNOS SECURITY TRAINING COURSE DETAILS * Who will benefit: Individuals responsible for implementing, monitoring, and troubleshooting Junos security components. * Prerequisites: Intro to the Junos Operating System * Duration 5 days ADVANCED JUNOS SECURITY TRAINING COURSE CONTENTS * Junos Layer 2 Packet Handling and Security Features Transparent Mode Security Secure Wire Layer 2 Next Generation Ethernet Switching MACsec Lab 2 Implementing Layer 2 Security * Virtualization Virtualization Overview Routing Instances Logical Systems Lab 3 Implementing Junos Virtual Routing * AppSecure Theory AppSecure Overview AppID Overview AppID Techniques Application System Cache Custom Application Signatures * AppSecure Implementation AppTrack AppFW AppQoS APBR SSL Proxy Lab 4 Implementing AppSecure * Working with Log Director Log Director Overview Log Director Components Installing and setting up Log Director Clustering with the Log Concentrator VM Administrating Log Director Lab 5 Deploying Log Director * Sky ATP Theory Sky ATP Overview Monitoring Sky ATP Analysis and Detection of Malware * Sky ATP Implementation Configuring Sky ATP Installing Sky ATP Analysis and detection of Malware Infected Host Case Study Lab 6 Instructor Led Sky ATP Demo * Implementing UTM UTM Overview AntiSpam AntiVirus Content and Web Filtering Lab 7 Implementing UTM * Introduction to IPS IPS Overview Network Asset Protection Intrusion Attack Methods Intrusion Prevention Systems IPS Inspection Walkthrough IPS Policy and Configuration SRX IPS Requirements IPS Operation Modes Basic IPS Policy Review IPS Rulebase Operations Lab 8 Implementing Basic IPS Policy * SDSN SDSN Overview, Components & Configuration Policy Enforcer Troubleshooting SDSN Use Cases Lab 9 Implementing SDSN * Enforcement, Monitoring, and Reporting User Role Firewall and Integrated User Firewall Overview User Role Firewall Implementation Monitoring User Role Firewall Integrated User Firewall Implementation Monitoring Integrated User Firewall Lab 10 Configure User Role Firewall and Integrated User Firewall * Troubleshooting Junos Security Troubleshooting Methodology Troubleshooting Tools Identifying IPsec Issues Lab 11 Performing Security Troubleshooting Techniques * Appendix A: SRX Series Hardware and Interfaces Branch SRX Platform Overview High End SRX Platform Overview SRX Traffic Flow and Distribution SRX Interfaces

Advanced Junos Security
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£4997

Object Oriented Analysis & Design

5.0(3)

By Systems & Network Training

OOAD TRAINING COURSE DESCRIPTION A workshop course providing thorough practical knowledge of object oriented analysis and design methods. WHAT WILL YOU LEARN * Perform Systems Analysis with Object Oriented methods. * Identify key classes and objects. * Expand and refine OO problem domain models. * Design Class hierarchies using inheritance and polymorphism. * Design programs with Object Oriented methods. OOAD TRAINING COURSE DETAILS * Who will benefit: System analysts, designers, programmers and project managers. * Prerequisites: It is desirable that delegates have experience of programming in C++/Java or some other OOP language. * Duration 5 days OOAD TRAINING COURSE CONTENTS * What is OO? Classes, objects, messages, encapsulation, associations, inheritance, polymorphism, reusability. * What is Systems Analysis and design? Data flow diagrams, structure diagrams. The OO approach. * OOA The problem domain and object modelling. Identifying classes and objects. Generalisation and inheritance. Defining attributes and methods. * OOD Refining the OOA results. Designing the User Interface. Designing the algorithms and data structures using objects. Designing the methods. * OOP Prototyping. Implementing OOD with OOPs and OOPLs.

Object Oriented Analysis & Design
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£4637

Trauma Risk Managment - TRiM Practitioner

5.0(1)

By Strongmind Resiliency Training Ltd

Trauma Risk Management is an evidence based, peer delivered risk assessment and ongoing support system, designed specifically to help in the management of traumatic events.

Trauma Risk Managment - TRiM Practitioner
Delivered in-person, on-requestDelivered In-Person in Internationally
£4800

M.D.D DATING ADVICE FOR WOMEN WITH VERY LOW CONFIDENCE PACKAGE (DATING ADVICE FOR WOMEN)

4.9(27)

By Nia Williams Miss Date Doctor Dating Coach London, Couples Therapy

* Introspective test * Emotional regulation and emotional intelligence training * Help in addressing pain points areas * Full Makeover and beauty treatments * 10 V.I.P confidence building sessions * Personality test * Addressing trauma issues * Personal life coach available daily * Behavioural pattern training * Relationships analysation * Happiness test * Dating advice for low confidence and insecurity triggers * Eradication of negative patterns * Cognitive behavioural therapy https://relationshipsmdd.com/product/dating-advice-for-women-with-very-low-confidence-package/ [https://relationshipsmdd.com/product/dating-advice-for-women-with-very-low-confidence-package/]

M.D.D DATING ADVICE FOR WOMEN WITH VERY LOW CONFIDENCE PACKAGE (DATING ADVICE FOR WOMEN)
Delivered in-person, on-request, onlineDelivered Online & In-Person in London & 2 more
£4800

PPP PROJECT FINANCE MODEL

5.0(10)

By GBA Corporate

OVERVIEW -------------------------------------------------------------------------------- This is particularly important for PPP projects where long-term commitments are made now based on bankability, value for money and risk allocation. During the course, participants will gain knowledge and skills on the frameworks, tools, and methodologies necessary to build quantitative models for financial decision-making in order to improve the financial viability and bankability of PPP projects. Participants will master modelling frameworks on capital budgeting, risk measurement, regression analysis and Monte Carlo Simulation among others.

PPP PROJECT FINANCE MODEL
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£1718 to £3779

Credit Risk in Bank

5.0(10)

By GBA Corporate

OVERVIEW -------------------------------------------------------------------------------- Objectives * Understand the fundamental concepts of credit risk * Evaluate and understand internal and external credit ratings * Understand value at risk (VaR) and its use in measuring credit risk * Explain the counterparty risk for derivatives, particularly over-the-counter derivatives * Describe different credit risk models according to the recommendations of the Basel Committee

Credit Risk in Bank
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£1718 to £3779