• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

2086 Courses in Holywood

How to identify and mitigate procurement fraud and corruption - IN PERSON

By Global Risk Alliance Ltd

Our training programme will provide those involved at any stage of the process for procuring goods and/or services within their organisations with the knowledge and skillset to identify and mitigate the threat posed by the breadth and multi-layered complexity of procurement fraud and corruption.

How to identify and mitigate procurement fraud and corruption - IN PERSON
Delivered in-person, on-requestDelivered In-Person in Internationally
£5000 to £7000

M.D.D PREMIER VIP COACHING PACKAGE (V.I.P)

4.9(27)

By Nia Williams Miss Date Doctor Dating Coach London, Couples Therapy

* Better relationships intensive training programme * One on one dating coaching * Better relationships programme and Relationship assessment overview * 5 Day Holiday in mystery 5 star location (Clear mind and relaxation) * 2 day therapy in 5 star Luxury London hotel * Luxury spa retreat and treatment by celebrity facialist * World famous celebrity dentist teeth whitening treatment * Free M.D.D Membership for 1 year Assess your love life and enjoy a vacation and bespoke luxury package created by your M.D.D date coach to tailor to your specific needs and problem areas enjoy a first-class experience and let the M.D.D help you embrace a new and bright future and assist you with a beautiful transition to the love life you desire and a happier, confident, enriched mind.Let all your strengths and abilities be harnessed to propel you to great success with this intensive package Price on application https://relationshipsmdd.com/product/m-d-d-premier-vip-coaching-package/ [https://relationshipsmdd.com/product/m-d-d-premier-vip-coaching-package/]

M.D.D PREMIER VIP COACHING PACKAGE (V.I.P)
Delivered in-person, on-request, onlineDelivered Online & In-Person in London & 2 more
£5600

YMCA Level 3 Diploma in Personal Training

5.0(7)

By Platinum Training Institute

This qualification is suitable for learners holding a Level 2 qualification in Gym Instruction or equivalent who wish to progress to a career as a professional Personal Trainer on an employed or self-employed basis. This qualification is mapped directly to: The Chartered Institute for the Management of Sport and Physical Activity (CIMSPA) professional standards for a Personal Trainer.

YMCA Level 3 Diploma in Personal Training
Delivered Online9 weeks, Jan 20th, 17:30 + 14 more
£995

Advanced Body Shape Package

By Harley Elite Academy (HeLa)

Expert Body Shape Fillers Package includes: * Fat-Dissolving injections – Fillers * BBL (Brazilian Buttocks Lift ) with Filler – Non Surgical * Threads lift injectables for body ENTRY REQUIREMENTS * Registered Medical professional * Level – Beauty Therapist * Dental Nurse * Physiotherapist * Holds at least 6 months experience with needles (micro-needling, microblading, tattooing, vaccinations, phlebotomy and more) -------------------------------------------------------------------------------- NOTE! After booking we will contact you for scheduling the exact course date! Courses dates are subject to change due to mentors availability. We will inform you via email if a date becomes available! -------------------------------------------------------------------------------- ADDITIONAL INFORMATION ATTENDANCE ONLINE (Theory), IN CLINIC (Practice) -------------------------------------------------------------------------------- EXPERT LEVEL * Fat-Dissolving injections – Fillers * BBL (Brazilian Buttocks Lift ) with Filler – Non Surgical * PDO Threads lift injectables for body * PRP/ Mesotherapy Training Course Choose Online Theory or In-Clinic with practice 4 Days Intensive Courses  (1 Week)

Advanced Body Shape Package
Delivered in-person, on-request, onlineDelivered Online & In-Person in London
£4550 to £6500

Securing UNIX systems

5.0(3)

By Systems & Network Training

SECURING UNIX SYSTEMS TRAINING COURSE DESCRIPTION This course teaches you everything you need to know to build a safe Linux environment. The first section handles cryptography and authentication with certificates, openssl, mod_ssl, DNSSEC and filesystem encryption. Then Host security and hardening is covered with intrusion detection, and also user management and authentication. Filesystem Access control is then covered. Finally network security is covered with network hardening, packet filtering and VPNs. WHAT WILL YOU LEARN * Secure UNIX accounts. * Secure UNIX file systems. * Secure UNIX access through the network. SECURING UNIX SYSTEMS COURSE DETAILS * Who will benefit: Linux technical staff needing to secure their systems. * Prerequisites: Linux system administration (LPIC-1) * Duration 5 days SECURING UNIX SYSTEMS COURSE CONTENTS * Cryptography * Certificates and Public Key Infrastructures X.509 certificates, lifecycle, fields and certificate extensions. Trust chains and PKI. openssl. Public and private keys. Certification authority. Manage server and client certificates. Revoke certificates and CAs. * Encryption, signing and authentication SSL, TLS, protocol versions. Transport layer security threats, e.g. MITM. Apache HTTPD with mod_ssl for HTTPS service, including SNI and HSTS. HTTPD with mod_ssl to authenticate users using certificates. HTTPD with mod_ssl to provide OCSP stapling. Use OpenSSL for SSL/TLS client and server tests. * Encrypted File Systems Block device and file system encryption. dm-crypt with LUKS to encrypt block devices. eCryptfs to encrypt file systems, including home directories and, PAM integration, plain dm-crypt and EncFS. * DNS and cryptography DNSSEC and DANE. BIND as an authoritative name server serving DNSSEC secured zones. BIND as an recursive name server that performs DNSSEC validation, KSK, ZSK, Key Tag, Key generation, key storage, key management and key rollover, Maintenance and resigning of zones, Use DANE. TSIG. * Host Security * Host Hardening BIOS and boot loader (GRUB 2) security. Disable useless software and services, sysctl for security related kernel configuration, particularly ASLR, Exec-Shield and IP / ICMP configuration, Exec-Shield and IP / ICMP configuration, Limit resource usage. Work with chroot environments, Security advantages of virtualization. * Host Intrusion Detection The Linux Audit system, chkrootkit, rkhunter, including updates, Linux Malware Detect, Automate host scans using cron, AIDE, including rule management, OpenSCAP. * User Management and Authentication NSS and PAM, Enforce password policies. Lock accounts automatically after failed login attempts, SSSD, Configure NSS and PAM for use with SSSD, SSSD authentication against Active Directory, IPA, LDAP, Kerberos and local domains, Kerberos and local domains, Kerberos tickets. * FreeIPA Installation and Samba Integration FreeIPA, architecture and components. Install and manage a FreeIPA server and domain, Active Directory replication and Kerberos cross-realm trusts, sudo, autofs, SSH and SELinux integration in FreeIPA. * Access Control * Discretionary Access Control File ownership and permissions, SUID, SGID. Access control lists, extended attributes and attribute classes. * Mandatory Access Control TE, RBAC, MAC, DAC. SELinux, AppArmor and Smack. * etwork File Systems NFSv4 security issues and improvements, NFSv4 server and clients, NFSv4 authentication mechanisms (LIPKEY, SPKM, Kerberos), NFSv4 pseudo file system, NFSv4 ACLs. CIFS clients, CIFS Unix Extensions, CIFS security modes (NTLM, Kerberos), mapping and handling of CIFS ACLs and SIDs in a Linux system. * Network Security * Network Hardening FreeRADIUS, nmap, scan methods. Wireshark, filters and statistics. Rogue router advertisements and DHCP messages. * Network Intrusion Detection ntop, Cacti, bandwidth usage monitoring, Snort, rule management, OpenVAS, NASL. * Packet Filtering Firewall architectures, DMZ, netfilter, iptables and ip6tables, standard modules, tests and targets. IPv4 and IPv6 packet filtering. Connection tracking, NAT. IP sets and netfilter rules, nftables and nft. ebtables. conntrackd * Virtual Private Networks OpenVPN server and clients for both bridged and routed VPN networks. IPsec server and clients for routed VPN networks using IPsec-Tools / racoon. L2TP.

Securing UNIX systems
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£4997

Complete COBOL programming

5.0(3)

By Systems & Network Training

COBOL TRAINING COURSE DESCRIPTION A hands on training course providing an introduction to COBOL. WHAT WILL YOU LEARN * Write COBOL programs * Debug COBOL programs * Examine existing code and determine its function. COBOL TRAINING COURSE DETAILS * Who will benefit: Programmers working with COBOL. * Prerequisites: None although experience in another high level language would be useful. A 10 day version of this course would be more applicable for those new to programming. * Duration 5 days COBOL TRAINING COURSE CONTENTS * Introduction to COBOL Compilation, linkage editor. Compile errors, compiler options. Divisions, syntax and format, COBOL character set, program structure. * COBOL statement structure COBOL words, format of statements. * Divisions Identification entries, Environment entries, Data division: FD, record descriptions, hierarchy and level numbers, description-string entry. * File and Working-Storage Sections Literals, figurative constants, redefines clause, data representation, Usage clause, synchronization, sign clause. * Procedure Division File status codes; Open, Read, Write, Close, Stop, Goback; Accept, display; Move, Justified, data name qualification, reference modification. * Perform statement Out-of-line, With test ... Until, ... Times, in-line statement; Go to statement. * Program design Design techniques, design considerations, procedure names, program structure. * Printing Printed output, Write, advancing option, editing characters; Initialize. * Condition testing Conditional statements: IF, class, sign and relation conditions, condition-name conditionals, Set, compound conditions, logical operators. Evaluate, Continue. * Arithmetic Rounded option, On Size Error option, Add, Subtract, Multiply, Divide, Compute. * Non-sequential files File access modes, Select. Indexed and relative files. Open, Close, creating / reading sequential access files, Write, Read, Invalid key clause, reading, writing / updating Random access files, Rewrite, Delete, Start. * Declarative routines Clauses. * Subroutines Call, Using clause - calling program/called program, Linkage Section, returning control. * Table handling Subscripted tables: One/two/three dimensional tables, Perform, variable length tables. Indexed tables: Set, using an index; Search. Copy code: Copy, Suppress, Replacing. * Data Manipulation Inspect, String, Unstring. COBOL/370 LE/370 and Intrinsic Functions.

Complete COBOL programming
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£4997

Penetration testing and Ethical Hacking

5.0(3)

By Systems & Network Training

PENETRATION TESTING TRAINING COURSE DESCRIPTION An advanced technical hands on course focusing on hacking and counter hacking. The course revolves around a series of exercises based on "hacking" into a network (pen testing the network) and then defending against the hacks. WHAT WILL YOU LEARN * Perform penetration tests. * Explain the technical workings of various penetration tests. * Produce reports on results of penetration tests. * Defend against hackers. PENETRATION TESTING TRAINING COURSE DETAILS * Who will benefit: Technical support staff, auditors and security professionals. Staff who are responsible for network infrastructure integrity. * Prerequisites: IP Security IP VPNs * Duration 5 days PENETRATION TESTING TRAINING COURSE CONTENTS * Introduction Hacking concepts, phases, types of attacks, 'White hacking', What is penetration testing? Why use pen testing, black box vs. white box testing, equipment and tools, security lifecycles, counter hacking, pen testing reports, methodologies, legal issues. * Physical security and social engineering Testing access controls, perimeter reviews, location reviews, alarm response testing. Request testing, guided suggestions, trust testing. Social engineering concepts, techniques, counter measures, Identity theft, Impersonation on social media, Footprints through social engineering * Reconnaissance (discovery) Footprinting methodologies, concepts, threats and countermeasures, WHOIS footprinting, Gaining contacts and addresses, DNS queries, NIC queries, ICMP ping sweeping, system and server trails from the target network, information leaks, competitive intelligence. Scanning pen testing. * Gaining access Getting past passwords, password grinding, spoofed tokens, replays, remaining anonymous. * Scanning (enumeration) Gaining OS info, platform info, open port info, application info. Routes used, proxies, firewalking, Port scanning, stealth port scanning, vulnerability scanning, FIN scanning, Xmas tree scanning, Null scanning, spoofed scanning, Scanning beyond IDS. Enumeration concepts, counter measures and enumeration pen testing. * Hacking Hacking webservers, web applications, Wireless networks and mobile platforms. Concepts, threats, methodology, hacking tools and countermeasures. * Trojan, Backdoors, Sniffers, Viruses and Worms Detection, concepts, countermeasures, Pen testing Trojans, backdoors, sniffers and viruses. MAC attacks, DHCP attacks, ARP poisoning, DNS poisoning Anti-Trojan software, Malware analysis Sniffing tools. * Exploiting (testing) vulnerabilities Buffer overflows,, simple exploits, brute force methods, UNIX based, Windows based, specific application vulnerabilities. * DoS/DDoS Concepts, techniques, attack tools, Botnet, countermeasures, protection tools, DoS attack pen testing. * SQL Injection Types and testing, Blind SQL Injection, Injection tools, evasion and countermeasures. * Securing networks 'Hurdles', firewalls, DMZ, stopping port scans, IDS, Honeypots, Router testing, firewall testing, IDS testing, Buffer Overflow. * Cryptography PKI, Encryption algorithms, tools, Email and Disk Encryption. * Information security Document grinding, privacy.

Penetration testing and Ethical Hacking
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£4997

Complete Visual BASIC

5.0(3)

By Systems & Network Training

COMPLETE VISUAL BASIC TRAINING COURSE DESCRIPTION A hands-on introduction to programming in Visual BASIC V6. WHAT WILL YOU LEARN * Build Visual BASIC applications. * Build simple components. * Debug Visual BASIC programs. * Examine existing code and determine its function. COMPLETE VISUAL BASIC TRAINING COURSE DETAILS * Who will benefit: Anyone wishing to program in Visual BASIC. * Prerequisites: None although experience in another high level language would be useful. * Duration 5 days COMPLETE VISUAL BASIC TRAINING COURSE CONTENTS * Application development using VB VB features. VB editions, VB terminology. Working in the Development Environment. Event-Driven Programming. Creating a program in VB. Project and executable files. VB reference materials. * Visual Basic fundamentals Objects. Controlling objects. Introduction to forms. Introduction to controls. Basic controls. * Working with code and forms Modules. Working with code. Interacting with the user. Working with code statements. Managing forms. * Variables and procedures Introduction to variables and constants. Working with Procedures and Functions. * Controlling program execution Common VB functions. Comparison and relational operators. Conditional structures. Looping structures. * Debugging Error types. Debugging logic errors in VB. * Working with controls Control types. Standard controls. Advanced standard controls. ActiveX controls. Insertable controls. * Data access using the ADO data control Overview of ActiveX Data Objects. VB data access features. Relational database concepts. Using the ADO data Control to access data. SQL. Manipulating data. Using the data form wizard. * Input validation Field-Level validation. The masked edit control. Form-Level validation. Form events used when validating data. * Error trapping Trapping run time errors. Error handling overview. Enabling an error trap. Errors and the calling chain. In line error handling. * Enhancing the User Interface Menus. Status bars. Toolbars. * Drag and Drop Overview of Drag and Drop. Mouse events Drag and Drop basics. * More about controls Using control arrays. Using the controls collection. Working with object variables. Collections. * Finishing touches User Interface design principles. Distributing an application. Creating a default project.

Complete Visual BASIC
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£4997

MEF Carrier Ethernet 2.0 Certification

5.0(3)

By Systems & Network Training

MEF CARRIER ETHERNET TRAINING COURSE DESCRIPTION The course progresses from a overview of the Carrier Ethernet service and how it works onto looking at the concepts in depth. Service attributes and management follow with the course finishing with studies of practical Carrier Ethernet. WHAT WILL YOU LEARN * Discuss and understand key Carrier Ethernet Concepts. * Understand tasks related to designing, deploying and maintaining a Carrier Ethernet network. * Offer effective solutions to implementing a Carrier Ethernet enterprise network given available customer resources and requirements. * Carry out informed discussions using industry Carrier Ethernet 'vocabulary. * Pass the MEF CECP 2.0 professional accreditation exam. MEF CARRIER ETHERNET TRAINING COURSE DETAILS * Who will benefit: Anyone working with Carrier Ethernet * Prerequisites: The course attendees need to be conversant with data networks, as well as Ethernet and IP technologies. * Duration 5 days MEF CARRIER ETHERNET TRAINING COURSE CONTENTS * Section One: Introduction to Carrier Ethernet * Introduction to Carrier Ethernet: What is Carrier Ethernet? Evolution, advantages, The MEF, MEF specifications; UNI, EVC, OVC, EPL/EVPL, EP-LAN/ EVP-LAN, EP-Tree/EVP-Tree, etc, overview. * How Carrier Ethernet Works: Service Frame Handling. Carrier Ethernet at Customer Premises, metro and core. Carrier Ethernet Workings, UNI attributes, Service Attributes (EVC and EVC per UNI attributes), Bandwidth Profiles, service multiplexing, L2 protocol processing; Carrier Ethernet equipment, CPE, aggregation and homing nodes, core equipment; management systems. * The Setting Up of a Carrier Ethernet Service: Step 1: Choose service type, EPL/EVPL, EP-LAN/EVP-LAN, EPTree/EVP-Tree, EVLine...; Step 2: CPE tasks, UNI-C tasks (UNI attributes, service attributes (EVC and EVC per UNI) and bandwidth profiles), UNI-N tasks (L2 protocol handling). Step 3: Non-CPE tasks, Access, metro and core connections set up. * Section Two: Carrier Ethernet Concepts in depth * Carrier Ethernet Definitions in Depth: UNI, UNI I & II, UNI-N and UNI-C, etc.; NNI/ENNI; EVC; OVC, OVC type (P2P, M2M, Rooted MP), OVC end point (root, leaf, trunk), OVC end point map, OVC end point bundling; Service types in detail, EPL/EVPL, EP-LAN/EVP-LAN, EP-Tree/EVP-Tree, EVLine, Access EPL, Access EVPL . * Carrier Ethernet Service Frame Handling: Unicast, multicast and broadcast frame delivery, Tagged, untagged and priority; Tagging, C and S-Tags, 802.3, 802.1d, 802.1q, 802.1ad, 802.1ah evolution, VLAN ID translation/preservation. CoS preservation. * Other Key Carrier Ethernet Concepts: MTU, MTU at UNI, MTU at ENNI; Physical Layer Attributes, FE, GbE and 10GbE, Service Multiplexing and Bundling Concept and detail, rules and implications; Hairpin Switching * Managing Bandwidth in a Carrier Ethernet Network: Token Bucket Algorithm, EIR, CIR, CBS, EBS, Coupling Flag; Frame Colors, recoloring, Color Awareness attribute, Color Forwarding; Bandwidth Profiles, rules and concepts. MEF CoS identifiers, DEI bit (in S-Tag), PCP bit (in C-Tag or S-Tag), or DSCP (in IP header), Multiflow bandwidth concepts; CoS Label/Color Identification. * Section Three: Carrier Ethernet Service Attributes Overview: Carrier Ethernet 2.0; Blueprint C Service Attributes: Per UNI, Physical interfaces, Frame format, Ingress/egress Bandwidth Profiles, CEVLAN ID/EVC Map, UNI protection. EVC per UNI, Ingress/egress Bandwidth Profiles, etc.; Per EVC, CEVLAN ID Preservation, CoS ID Preservation, Relationship between SLA and SLP, Class of Service, etc. OVC, ENNI, OVC End Point per UNI and OVC End Point per ENNI, Ingress/egress bandwidth profiles, etc. * Section Four: Managing Carrier Ethernet Networks Overview: MEF Service Lifecycle. Carrier Ethernet maintenance: Port, Link & NE failure, Service Protection Technologies, Fault Identification and Recovery, LAG, Active/Standby EVC, Single EVC with transport protection, G.8031, G.8032, MPLS FRR. * SOAMs: Connectivity fault management, connectivity Monitoring, Loopback, Linktrace; Performance Management, Frame Delay, Inter Frame Delay Variation, Availability, Frame Loss Ratio, Resiliency, HLI, DMM, DMR, SLM, SLR; Key Concepts, Single vs dual ended, ordered UNI pair calculations. * LOAMs: Link discovery, link monitoring, etc. * Terminology and Concepts: MEG levels, MIPs. * Section Five: Practical Carrier Ethernet Carrier Ethernet Transport Technologies: Layer 1: SDH. Layer 2: Bridging, provider bridging, PBB, PBBTE. Layer 2.5: MPLS VPWS, MPLS VPLS, MPLS-TP. * Carrier Ethernet Access Technologies: fiber, SDH, active fiber, PON, GPON, 10G PON, OTN, WDM; copper, PDH, G-SDSL, 10Pass-TS, HFC; packet radio. * Optimising mobile backhaul with Carrier Ethernet Key challenges solutions: Market pressure, LTE evolution, elements and architecture (RAN BS, NC, GWIF.), synchronization, bandwidth management. * Circuit Emulation over Ethernet: Purpose, needs and applications. Synchronization: Phased, ToD, External Reference source, SynchE ,NTP, IEEE-1588 v2/ PTP, ACR; MEF Service Definitions for emulated circuits. * Applying what you know: Practical examples and scenarios, Carrier Ethernet solutions; Practice Scenarios, Given a scenario, determine appropriate Ethernet services

MEF Carrier Ethernet 2.0 Certification
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£4997

Advanced RF

5.0(3)

By Systems & Network Training

ADVANCED RF TRAINING COURSE DESCRIPTION This course provides a follow on to our popular RF fundamentals course for those that need to know more. WHAT WILL YOU LEARN * Explain RF propagation * Describe the importance of transmission lines in RF systems. * Recognise the issues in RF systems. * Describe transmission measurements. ADVANCED RF TRAINING COURSE DETAILS * Who will benefit: Those working with RF systems. * Prerequisites: RF fundamentals. * Duration 3 days ADVANCED RF TRAINING COURSE CONTENTS * RF propagation The Electromagnetic Spectrum, Electromagnetic Radiation, Spherical Wave Front, The Space Wave, Receive Antenna below the Horizon, Bending the Space Wave , Surface Wave Path, Tilting of Surface Wave, Conductivity, Layers of the Atmosphere, Variations of the Ionosphere, Variations caused by Solar Activity, Multi Hop Transmission, Classification of Radio Waves, Fading, Fading Reduction, Free Space Path Loss, Shadowing of Radio Wave, Signal Levels after Shadowing, Radio Waves as Wavelets, Fresnel Zone. * Transmission Lines Transmission Line Construction, Primary Line Constants, 'T' Networks, Input Impedence, Lossless Unbalanced Line, Standing Waves, Open Circuit / Short Circuit Termination, Short Circuit Standing Waves, Open Circuit Standing Waves, Voltage Standing Wave Pattern, Short Circuit Termination, Open Circuit Termination, The Directional Coupler, Effect of E and M Coupling, Practical Reflectometer. * Antenna Theory The Open Circuit Line, Dipole V/I Distribution, Polar Diagram, Power Pattern ½ Wave Dipole, Half Wave Dipole, Vehicle Mount, Centre Fed Whip Antenna, Antenna Beamwidth, The Yagi Array, Uda Yagi array, Antenna Characteristics, 6 Element Yagi Polar Diagram, Log Periodic Antenna, Helical Antenna. Microwave Dish Array, Typical Microwave Dish Antenna. * Transmission Measurements Transmission Measurements, Effective Isotropic Radiated Power, Fade Margin. * Noise Noise in Communications, Noise Voltage Equivalent Circuit. * Satellite Communications Satellite Communications, Large Earth Station, The Satellite Payload, Geo Stationary Orbit, Basic Orbits, VSAT Terminal, Iridium Phone, The Space Segment, Satellite Footprint, Typical System Hardware. * Mobile Communications Mobile Evolution, The Path to UMTS, Technologies Bit Rate and Mobility, Systems and Specifications, Wireless Networks, Diffraction, Multi Path Propagation, Loss Models, GSM Architecture, OSI Model - GSM, OSI Reference Model, OSI Layers.

Advanced RF
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£4997