• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

9 Stomp courses

🔥 Limited Time Offer 🔥

Get a 10% discount on your first order when you use this promo code at checkout: MAY24BAN3X

Stompin' at the 100 Club 20 May 2024 featuring The Jive Aces

5.0(15)

By SwingdanceUK

A lively night of hot Swing music and dancing brought to you by SwingdanceUK and his founder Simon Selmon who have been going since 1986, including a 20-year run of weekly Stompin’ nights at the 100 Club, spreading the love of Lindy Hop far and wide featuring live Swing music from the Jive Aces & beginners & intermediate Lindy classes!

Stompin' at the 100 Club 20 May 2024 featuring The Jive Aces
Delivered In-Person in London3 hours 30 minutes, May 20th, 18:30
£20

Introduction to Reactive Spring (TT3355 )

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This in an intermediate-level Java development course geared for students experienced with Java and Spring programming essentials. This course does not cover Java or Spring development basics. Overview Working within in an engaging, hands-on learning environment, guided by our expert team, attendees will: Understand the ReactiveX specification Understand the basics of Reactive Programming Discuss the advantages and limitations of Observables Write a client application capable of handling Reactive events Apply operators to event streams to filter, modify and combine the objects emitted by event publishers Select the appropriate type of Event Source Use both Cold and Hot Observables Deal with backpressure problems in reactive programming Develop a reactive web application using Spring WebFlux Define application flows of a WebFlux application Use the WebClient API to work with both synchronous and streaming APIs Develop Unit and Integration tests to test WebFlux endpoints Creating a reactive REST endpoint Become familiar with the basics of WebSockets Create a WebSocket endpoint using Spring Create a WebSocket client Understand the basics of NoSQL Become familiar with the basics of MongoDB Understand how the data in MongoDB can be retrieved using a Reactive API Define Spring Data MongoDB repositories Query the MongoDB using Spring Data Define a reactive repository using MongoDB Explore the Spring Data R2DBC API to perform reactive CRUD operations against a relational database Spring Data reative allow us to implement database operations relying on Reative Programming APIs. While the Spring R2DBC initiative aims to bring reactive programming to relational databaes, several NoSQL databases already provide this possibility. After an introduction to NoSQL and the MongoDB, this courses covers the APIs available to communicate with this NoSQL database using both blocking and reactive APIs.Introdcution to Reactive Spring is a comprehensive Java training workshop geared for experienced developers who wish to explore concurrent, asynchronous and reactive programming APIs and techniques using Spring. After an introduction to reactive programming, Reactive Streams and the Project Reactor APIs, this course will show how this APIs are integrated into Spring. Spring 5 includes Spring WebFlux, providing a reactive programming model for web applications, including support for Reactive REST APIs. Spring WebSocket assists in the creation of web applications which provide a full-duplex, two-way communication between client and server. INTRODUCTION TO REACTIVE PROGRAMMING * Reactive Manifesto * Introduce ReactiveX * ReactiveX implementations * The Observer, Iterator pattern and functional programming * Discuss hot and cold publishers REACTIVE STREAMS API * Introduce the Reactive Streams specification * Publisher and Subscribers * java.util.concurrent.Flow * Transformation of Messages (Processor) * Controlling messages * Tutorial: Setup Eclipse for Using Maven INTRODUCTION * Introduce the Reactor Building blocks * Flux and Mono * Creating observables * Subscribing to a stream TESTING EVENT SOURCES (INTRODUCTION) * Testing reactive implementations * StepVerifier : test sequence of emitted items * Defining expectations * TestPublisher: produce test data to test downstream operators REACTIVE OPERATORS * Introduce Operators * Show the use of marble diagrams * Explain some commonly used operators * Callback operators SCHEDULERS (MULTITHREADING) * Thread usage of subscriber and consumer * Using the subscribeOn method * Introduce the Scheduler interface * Using the observeOn method BACKPRESSURE * Strategies for dealing with Backpressure * ?reactive pull? backpressure EXCEPTION HANDLING * Handling errors in onError * Exception handling strategies * Using onErrorReturn or onErrorNext operators * Using the retry operators * The Global Error Handler SPRING DATA REVIEW * Quick review of Spring Data repositories * Query return types * Defining Query methods * Pagination and sorting R2DBC * Reactive Relational Database Connectivity * DatabaseClient * Performing CRUD operations * Reactive Query annotated methods SPRING WEBFLUX: INTRODUCTION * Annotated Controllers * Functional Endpoints * WebFlux configuration * Creating a reactive REST endpoint DEFINING FLOWS * Defining the application flow * Actions * Defining decision * Navigating flows * RouterFunction VIEW TECHNOLOGIES * View technologies * Using Thymeleaf to create the view * View Configuration SPRING WEBCLIENT: INTRODUCTION TO WEBCLIENT * Working with asynchronous and streaming APIs * Making requests * Handling the response * Lab: WebClient WEBTESTCLIENT * Testing WebFlux server endpoints * Testing controllers or functions * Define integration tests INTRODUCTION TO SPRING REACTIVE WEBSOCKETS * Be familiar with the basics of WebSockets * Understand the HTTP handshake and upgrade * Name some of the advantages of WebSockets DEFINING THE WEBSOCKET * WebSocket Message Handling * WebSocketSession * Implementing the WebSockethandler * Creating a Browser WebSocket Client WEBSOCKET STOMP * Streaming (or Simple) text-orientated messaging protocol * Introduce SockJS * Connecting to the STOMP endpoint * Configuring the message broker * STOMP destinations REACTIVE WEBSOCKET * Reactive WebSocket support * Implement the reactive WebSocketHandler BIGDATA * Introduce Big Data * Explain the need for enhanced data storage INTRODUCTION TO MONGODB * JavaScript Object Notation Overview * Introduce Binary JSON (BSON) * Starting the database * Creating Collections and Documents * Executing ?simple? database commands * Introduce the ObjectID * Searching for documents using query operators * Updating and deleting documents * MongoDB Compass SPRING AND MONGODB * MongoDB Support in Spring Data * MongoClient and MongoTemplate * Spring Data MongoDB configuration * @EnableMongoRepositories * Adding documents to the database * The @Document and @Field annotations * Polymorphism and the _class property * The Criteria object SPRING DATA MONGODB * MongoRepository * Field naming strategy * Using JSON queries to find documents * The @PersistenceConstructor annotation REACTIVE REPOSITORIES WITH MONGODB * Using reactive repositories * ReactiveMongoTemplate * RxJava or Reactor ADDITIONAL COURSE DETAILS: Nexus Humans Introduction to Reactive Spring (TT3355 ) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Introduction to Reactive Spring (TT3355 ) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Introduction to Reactive Spring (TT3355 )
Delivered on-request, onlineDelivered Online
Price on Enquiry

Cisco Implementing Automation for Cisco Security Solutions v1.0 (SAUI)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Channel and Customer Engineers Network Engineer System Engineer Wireless Engineer Consulting Systems Engineer Technical Solutions Architect Network Admisnistrator Wireless Design Engineer Network Manager Channel SEs Sales Engineer Channel AMs Account Manager Overview Upon completing this course, students will be able to meet these objectives: Understand the overall architecture of the Cisco security solutions and how APIs help enable security Understand how to use Cisco Firepower APIs Understand how pxGrid APIs function and their benefits Understand what capabilities the Cisco Stealthwatch APIs offer and construct API requests to them for configuration changes and auditing purposes Understand the features and benefits of using Cisco Stealthwatch Cloud APIs Learn how to use the Cisco Umbrella Investigate API Understand the Functionality provided by Cisco AMP and its APIs Learn how to use Cisco Threat Grid APIs to analyze, search, and dispose of threats This course demonstrates the tools and the benefits of leveraging programmability and automation in Cisco Security Solutions, including Cisco Firepower Management Center, Cisco Firepower Threat Defense, Cisco ISE, Cisco pxGrid, Cisco Stealthwatch Enterprise, Cisco Stealthwatch Cloud, Cisco Umbrella, Cisco AMP, Cisco Threat grid, and Cisco Security Management Appliances. Students will learn how to use the API for each Cisco security solution and specific applications of when the API benefits IT security content. INTRODUCING CISCO SECURITY APIS * Role of APIs in Cisco Security Solutions * Cisco Firepower, Cisco ISE, Cisco pxGrid, and Cisco Stealthwatch APIs * Use cases and security workflow * CONSUMING CISCO ADVANCED MALWARE PROTECTION APIS * Cisco AMP overview * Cisco AMP endpoint API * Cisco AMP use cases and workflows * Discovery 1: Query Cisco AMP endpoint APIs for verifying compliance USING CISCO ISE * Introducing Cisco Identity services engine * Cisco ISE use cases * Cisco ISE APIs USING CISCO PXGRID APIS * Cisco pxGrid overview * WebSockets and STOMP messaging protocol * Discovery 2: Use the REST API and Cisco pxGrid with Cisco Identity services engine USING CISCO THREAT GRID APIS * Cisco threat grid overview * Cisco threat grid API * Cisco threat grid use cases and workflows * Discovery 3: Construct a Python script using the Cisco threat grid API * INVESTIGATING CISCO UMBRELLA SECURITY DATA PROGRAMMATICALLY * Cisco Umbrella investigate API overview * Cisco Umbrella investigate API: Details * Discovery 4: Query security data with the Cisco Umbrella investigate API * EXPLORING CISCO UMBRELLA REPORTING AND ENFORCEMENT APIS * Cisco Umbrella reporting and enforcement APIs: Overview * Cisco Umbrella reporting and enforcement APIs: Deep dive * Discovery 5: Generate reports using the Cisco Umbrella reporting API AUTOMATING SECURITY WITH CISCO FIREPOWER APIS * Review basic constructs of Firewall policy management * Design policies for automation * Cisco FMC APIs in depth * Discovery 6: Explore the Cisco Firepower management center API * Cisco FTD automation with ansible * Discovery 7: Use ansible to automate Cisco Firepower threat defense configuration * Cisco FDM API in depth * Discovery 8: Automate Firewall policies using the Cisco Firepower device manager API OPERATIONALIZING CISCO STEALTHWATCH AND ITS API CAPABILITIES * Cisco Stealthwatch overview * Cisco Stealthwatch APIs: Details * Discovery 9: Automate alarm policies and create reports using the Cisco Stealthwatch APIs * USING CISCO STEALTHWATCH CLOUD APIS * Cisco Stealthwatch Cloud overview * Cisco Stealthwatch Cloud APIs: Deep dive * Discovery 10: Construct a report using Cisco stealthwatch Cloud APIs * DESCRIBING CISCO SECURITY MANAGEMENT APPLIANCE APIS * Cisco SMA APIs overview * Cisco SMA API * Discovery 11: Construct reports using Cisco SMA APIs *

Cisco Implementing Automation for Cisco Security Solutions v1.0 (SAUI)
Delivered on-request, onlineDelivered Online
Price on Enquiry

Learn RabbitMQ: Asynchronous Messaging with Java and Spring

By Packt

Learn RabbitMQ: Asynchronous Messaging with Java and Spring

Learn RabbitMQ: Asynchronous Messaging with Java and Spring
Delivered Online On Demand
£11.99

Stompin' at the 100 Club 25 Nov 2024 featuring Chris Dean's Swing Shift!

5.0(15)

By SwingdanceUK

A lively night of hot Swing music and dancing brought to you by SwingdanceUK and his founder Simon Selmon who have been going since 1986, including a 20-year run of weekly Stompin’ nights at the 100 Club, spreading the love of Lindy Hop far and wide featuring live Swing music from Chris Dean's Swing Shift band & beginners & intermediate Lindy classes!

Stompin' at the 100 Club 25 Nov 2024 featuring Chris Dean's Swing Shift!
Delivered In-Person in London3 hours 30 minutes, Nov 25th, 19:30
£18 to £20

Attacking and Securing .Net Web Applications (TT8320-N)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This is an intermediate-level programming course, designed for experienced .Net developers who wish to get up and running on developing well defended software applications. Real world programming experience with .Net is required. Overview Students who attend Attacking and Securing .Net Web Applications will leave the course armed with the skills required to recognize actual and potential software vulnerabilities and implement defenses for those vulnerabilities. This course begins by developing the skills required to fingerprint a web application and then scan it for vulnerabilities and bugs. Practical labs using current tools and techniques provide students with the experience needed to begin testing their own applications. Students also gain a deeper understanding of how attackers probe applications to understand the runtime environment as well as find potential weaknesses. This course the introduces developers to the most common security vulnerabilities faced by web applications today. Each vulnerability is examined from a .Net perspective through a process of describing the threat and attack mechanisms, recognizing associated vulnerabilities, and, finally, designing, implementing effective defenses. Practical labs reinforce these concepts with real vulnerabilities and attacks. Students are then challenged to design and implement the layered defenses they will need in defending their own applications. There is an emphasis on the underlying vulnerability patterns since the technologies, use cases, and methods of attack as constantly changing. The patterns remain the same through all the change and flux. This 'skills-centric' course is about 50% hands-on lab and 50% lecture, designed to train attendees in secure web application development, coding and design, coupling the most current, effective techniques with the soundest industry practices. Our instructors and mentors are highly experienced practitioners who bring years of current 'on-the-job' experience into every classroom. This lab-intensive course provides hands-on .Net security training that offers a unique look at .Net application security. Beginning with penetration testing and hunting for bugs in .Net web applications, you thoroughly examine best practices for defensively coding web applications, covering all the OWASP Top Ten as well as several additional prominent vulnerabilities. You will repeatedly attack and then defend various assets associated with fully functional web applications and services, driving home the mechanics of how to secure .Net web applications in the most practical of terms. BUG HUNTING FOUNDATION * Why Hunt Bugs? * Safe and Appropriate Bug Hunting/Hacking SCANNING WEB APPLICATIONS * Scanning Applications Overview MOVING FORWARD FROM HUNTING BUGS * Removing Bugs FOUNDATION FOR SECURING APPLICATIONS * Principles of Information Security BUG STOMPING 101 * Unvalidated Data * Injection * Broken Authentication * Sensitive Data Exposure * XML External Entities (XXE) * Broken Access Control BUG STOMPING 102 * Security Misconfiguration * Cross Site Scripting (XSS) * Deserialization/Vulnerable Components * Insufficient Logging and Monitoring * Spoofing, CSRF, and Redirects MOVING FORWARD WITH APPLICATION SECURITY * Applications: What Next? * .NET Issues and Best Practices * Making Application Security Real TIME PERMITTING TOPICS * Cryptography Overview * .NET Cryptographic Services

Attacking and Securing .Net Web Applications (TT8320-N)
Delivered on-request, onlineDelivered Online
Price on Enquiry

Attacking and Securing Java / JEE Web Applications (TT8320-J)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This is an intermediate -level programming course, designed for experienced Java developers who wish to get up and running on developing well defended software applications. Familiarity with Java and JEE is required and real world programming experience is highly recommended. Ideally students should have approximately 6 months to a year of Java and JEE working knowledge. Overview Students who attend Attacking and Securing Java Web Applications will leave the course armed with the skills required to recognize actual and potential software vulnerabilities and implement defenses for those vulnerabilities. This course begins by developing the skills required to fingerprint a web application and then scan it for vulnerabilities and bugs. Practical labs using current tools and techniques provide students with the experience needed to begin testing their own applications. Students also gain a deeper understanding of how attackers probe applications to understand the runtime environment as well as find potential weaknesses. This course the introduces developers to the most common security vulnerabilities faced by web applications today. Each vulnerability is examined from a Java/JEE perspective through a process of describing the threat and attack mechanisms, recognizing associated vulnerabilities, and, finally, designing, implementing, and testing effective defenses. Practical labs reinforce these concepts with real vulnerabilities and attacks. Students are then challenged to design and implement the layered defenses they will need in defending their own applications. There is an emphasis on the underlying vulnerability patterns since the technologies, use cases, and methods of attack as constantly changing. The patterns remain the same through all the change and flux. This 'skills-centric' course is about 50% hands-on lab and 50% lecture, designed to train attendees in secure web application development, coding and design, coupling the most current, effective techniques with the soundest industry practices. Our engaging instructors and mentors are highly experienced practitioners who bring years of current 'on-the-job' experience into every classroom. This lab-intensive course provides hands-on Java / JEE security training that offers a unique look at Java application security. Beginning with penetration testing and hunting for bugs in Java web applications, you embrace best practices for defensively coding web applications, covering all the OWASP Top Ten as well as several additional prominent vulnerabilities. You will repeatedly attack and then defend various assets associated with fully functional web applications and services, allowing you to experience the mechanics of how to secure JEE web applications in the most practical of terms. BUG HUNTING FOUNDATION * Why Hunt Bugs? * Safe and Appropriate Bug Hunting/Hacking SCANNING WEB APPLICATIONS * Scanning Applications Overview MOVING FORWARD FROM HUNTING BUGS * Removing Bugs FOUNDATION FOR SECURING APPLICATIONS * Principles of Information Security BUG STOMPING 101 * Unvalidated Data * Broken Authentication * Sensitive Data Exposure * XML External Entities (XXE) * Broken Access Control BUG STOMPING 102 * Security Misconfiguration * Cross Site Scripting (XSS) * Deserialization/Vulnerable Components * Insufficient Logging and Monitoring * Spoofing, CSRF, and Redirects MOVING FORWARD WITH APPLICATION SECURITY * Applications: What Next? * Making Application Security Real

Attacking and Securing Java / JEE Web Applications (TT8320-J)
Delivered on-request, onlineDelivered Online
Price on Enquiry

Jazz and Tap combo

5.0(1)

By Whizzdance

(5-8yrs) Using a range of music from the latest pop songs to great musical theatre songs (old and new!) JazzPops offers a range of dance throughout the term with a dash of some musical games. Combined with an introduction to Tap class, incorporating the work of the ISTD Primary Class along with some toe tapping and super fun stomping choreography!  TRIAL BOOKINGS: Of course you are welcome to watch the trial class but following the trial, WhizzDancers are expected to be independent in the room. TERM BOOKINGS: You are welcome to watch the first class but following this your WhizzDancer will be expected to go in the class independently. You will be expected to provide full uniform. Details will be sent following. We have lots of opportunities ahead for your WhizzDancer including exams and shows. We look forward to meeting them in the studio :) Downstairs Dance Studio Please bring: - Comfortable clothes to move in (no zips or demin) - No ballet shoes required for the trial Please contact info@whizzdance.com [info@whizzdance.com] for more information on how to book your free trial. 

Jazz and Tap combo
Delivered In-PersonSold out! Join the waitlist
FREE

Jazz and Tap combo

5.0(1)

By Whizzdance

(5-8yrs) Using a range of music from the latest pop songs to great musical theatre songs (old and new!) JazzPops offers a range of dance throughout the term with a dash of some musical games. Combined with an introduction to Tap class, incorporating the work of the ISTD Primary Class along with some toe tapping and super fun stomping choreography!  TRIAL BOOKINGS: Of course you are welcome to watch the trial class but following the trial, WhizzDancers are expected to be independent in the room. TERM BOOKINGS: You are welcome to watch the first class but following this your WhizzDancer will be expected to go in the class independently. You will be expected to provide full uniform. Details will be sent following. We have lots of opportunities ahead for your WhizzDancer including exams and shows. We look forward to meeting them in the studio :) Downstairs Dance Studio Please bring: - Comfortable clothes to move in (no zips or demin) - No ballet shoes required for the trial Please contact info@whizzdance.com [info@whizzdance.com] for more information on how to book your free trial. 

Jazz and Tap combo
Delivered In-PersonSold out! Join the waitlist
FREE

Educators matching "Stomp"

Show all 10