• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

3998 Courses

The Therapeutic Power of Language

By Human Givens College

– a psychotherapy skills masterclass The language we use has a huge impact on others – on this practical, inspiring course you will learn how to combine solution-focused techniques and effective language skills to help relieve distress and improve outcomes, as quickly as possible… -------------------------------------------------------------------------------- * Accredited CPD Certificate : 12 hours * * Length 2 days (9:30am - 4:00pm) -------------------------------------------------------------------------------- > Excellent course! I’ve learnt so much and been inspired so much. Gareth has a > wonderful style of delivery... > > MARY FLYNN This course is suitable for anyone working with adults, teens or children – the knowledge and skills you will gain have a wide range of applications in addition to therapy and counselling, including coaching, healthcare, teaching, motivation, overcoming resistance, emotional turmoil and much more. You will leave with a powerful toolkit of precisely-targeted and creative therapeutic language skills, as well as a range of effective brief therapy strategies. These can be easily tailored to any individual and used to successfully help people resolve a wide range of conditions and problems as quickly as possible. If you want to be more effective in what you do, these are core skills to have…   Denise Winn previously taught this course, it is now delivered by Gareth Hughes WHY TAKE THIS COURSE Language is key to everything we do – being aware of the power of language to help or do harm is essential when we’re trying to help people. Knowing how to use it well can make all the difference to a successful therapeutic outcome. Paying attention to the language we use is central to the human givens approach to therapy and counselling: our choice of words is crucial in building rapport with people, learning more about someone – their unique qualities and abilities – in listening and responding, in providing motivation and in collaborating to agree goals and strategies for the effective resolution of their problems. The careful use of language is essential for other areas of life too: at work, home, with family and friends – and this  2-day course is accessible to all. It can be taken as part of the Human Givens Diploma or as a stand-alone course. You will gain a solid foundation in the most effective brief solution-focused strategies and language skills that are essential if you want to be able to help people as quickly as possible. By distilling the essence of proven brief therapy approaches and working in tune with the givens of human nature, outcomes can be dramatically improved and suffering successfully reduced. You will also learn how any team of professional healthcare workers can safely incorporate brief therapy techniques into their work with patients suffering from depression, anxiety, panic attacks, PTSD, anger, OCD, eating disorders, addiction and relationship/marital/family problems, thereby improving outcomes and reducing suffering on an even wider scale. -------------------------------------------------------------------------------- GOOD TO KNOW This course gives you essential skills that are used in the successful treatment of a wide range of conditions, such as anxiety disorders, depression [https://www.humangivens.com/college/lift-depression/], addictions, self-harm, OCD and the rewind technique [https://www.humangivens.com/college/rewind-technique-training/] for treating trauma and phobias. They are also fundamental skills to have when using guided imagery and visualisation [https://www.humangivens.com/college/guided-imagery-and-visualisation/]. This course is an essential component of Part 1 of the HG Diploma. > I feel very excited and energised. I can't wait to start using these > techniques... > > OCCUPATIONAL THERAPIST WHAT WILL YOU LEARN * The essential skills needed for successful brief therapy * New information about the APET™ model – why it is so important to construct therapy that is in tune with our how brains work (our emotional reactions come first) – this speeds up therapy and explains why purely cognitive and behavioural approaches can take so long * An ability to get to the root of the matter quickly by establishing which innate needs are not being met and why (the essence of effective brief therapy) * Quick rapport building skills * How to use the RIGAAR™ structure to improve therapy outcomes * Reflective listening and reflective reframing * How to use therapeutic language skills directly and indirectly to initiate change * Ways to use solution-focused questioning to create a framework for change * How to identify and use your client’s own life resources * An understanding of why the human givens approach dramatically increases the likelihood of therapy being brief, regardless of the presenting problem * A range of psychological interventions to use with common psychiatric problems: anxiety, panic attacks, depression, intrusive thoughts, relationship difficulties and so on * Promoting cooperation by developing realistic and achievable goals * How to identify exceptions (when the problem doesn’t occur) and get the patient to take credit for them * How to generate motivation for change in your patients * Separating the patient’s core identity from their problem * How to minimise or overcome resistance * How not to be drawn in to a client’s negative self-view * Great use of case histories to illustrate the skills covered * How to use the psychological laws of positive expectancy and concentrated attention * An understanding of why taking this collaborative human givens stance, reduces stress and pressure on you * Plenty of opportunity to consolidate what you are learning by practising the skills yourself -------------------------------------------------------------------------------- HOW IS THE COURSE STRUCTURED? Held over two consecutive days, this skills-based practical workshop combines a blend of talks, demonstrations and exercises.  Each day starts at 9.30pm and finishes at 4.00pm, with 2 breaks for networking and refreshment and 45 minutes for lunch. Course notes, refreshments and lunch are included on both days. -------------------------------------------------------------------------------- WHO IS THIS COURSE SUITABLE FOR? You and your patients will benefit enormously from you attending these two days. If you are a counsellor, psychotherapist, clinical psychologist, mental health nurse, GP, doctor, nurse, OT, physiotherapist, youth worker, social worker, health visitor, support worker or any other caring professional, and wish to be more effective in what you do, this course gives you the perfect opportunity to discover new, subtle but highly effective skills with plenty of time to practise to help you assimilate them into your own work. Many other professions – such as educational and business professionals – also find the skills and information covered highly applicable to and beneficial for their own work. It is also suitable for anyone who is thinking of a career in this field as these are core skills needed for successful brief, solution-focused psychotherapy. -------------------------------------------------------------------------------- This course has been independently accredited by the internationally recognised CPD Standards Office for 12 hours of CPD training. On completion of this training you’ll receive CPD certificates from the College and the CPD Standards Office.

The Therapeutic Power of Language
Delivered In-Person in Leeds + 1 more locations6 hours 30 minutes, Jul 16th, 08:30 + 3 more
£396

55340 Developing ASP.NET Core Web Applications

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for professional web developers who use Microsoft Visual Studio in an individual-based or team-based, small-sized to large development environment. Candidates for this course are interested in developing advanced web applications and want to manage the rendered HTML comprehensively. They want to create websites that separate the user interface, data access, and application logic. Overview Describe the Microsoft Web Technologies stack and select an appropriate technology to use to develop any given application. Design the architecture and implementation of a web application that will meet a set of functional requirements, user interface requirements, and address business models. Configure the pipeline of ASP.NET Core web applications using middleware, and leverage dependency injection across applications. Develop a web application that uses the ASP.NET Core routing engine to present friendly URLs and a logical navigation hierarchy to users. Create Views in an application that display and edit data and interact with Models and Controllers. Connect an ASP.NET Core application to a database using Entity Framework Core. Implement a consistent look and feel across an entire web application. Write JavaScript code that runs on the client-side and utilizes the jQuery script library to optimize the responsiveness of an web application. Add client side packages and configure Task Runners. Run unit tests and debugging tools against a web application in Visual Studio 2022. Write an application that authenticates and authorizes users to access content securely using Identity. Build an application that resists malicious attacks. Use caching to accelerate responses to user requests. Use SignalR to enable two-way communication between client and server. Describe what a Web API is and why developers might add a Web API to an application. Describe how to package and deploy an ASP.NET Core web application from a development computer to a web server. In this 5-day course, professional web developers will learn to develop advanced ASP.NET Core applications using .NET tools and technologies. The focus will be on coding activities that enhance the performance and scalability of the Web site application. MODULE 1: EXPLORING ASP.NET CORE * Introducing of Microsoft Web Technologies * Getting Started with Razor Pages in ASP.NET Core * Introducing ASP.NET Core MVC MODULE 2: DESIGNING ASP.NET CORE MVC WEB APPLICATIONS * Planning in the Project Design Phase * Designing Models, Controllers and Views MODULE 3: CONFIGURE MIDDLEWARE AND SERVICES IN ASP.NET CORE * Configuring Middlewares * Configuring Services MODULE 4: DEVELOPING CONTROLLERS * Writing Controllers and Actions * Configuring Routes * Writing Action Filters MODULE 5: DEVELOPING VIEWS * Creating Views with Razor Syntax * Using HTML Helpers and Tag Helpers * Reusing Code in Views MODULE 6: DEVELOPING MODELS * Creating MVC Models * Working with Forms * Validating User Input MODULE 7: USING ENTITY FRAMEWORK CORE IN ASP.NET CORE * Introduction to Entity Framework Core * Working with Entity Framework Core * Use Entity Framework Core to connect to Microsoft SQL Server MODULE 8: USING LAYOUTS, CSS AND JAVASCRIPT IN ASP.NET CORE * Using Layouts * Using CSS and JavaScript * Using JavaScript Libraries MODULE 9: CLIENT-SIDE DEVELOPMENT * Applying Styles and Responsive Design * Using Task Runners * Looking at ASP.NET Core Blazor MODULE 10: TESTING AND TROUBLESHOOTING * Testing ASP.NET Core Applications * Implementing an Exception Handling Strategy * Logging ASP.NET Core Applications MODULE 11: MANAGING SECURITY * Authentication in ASP.NET Core * Authorization in ASP.NET Core * Defending from Common Attack MODULE 12: PERFORMANCE AND COMMUNICATION IMPLEMENTING A CACHING STRATEGY * Managing State * Supporting Two-way Communication MODULE 13: IMPLEMENTING WEB APIS * Introducing Web APIs * Developing a Web API * Calling a Web API MODULE 14: HOSTING AND DEPLOYMENT * Hosting and Deploying On-premises * Deploying to Microsoft Azure * Looking at Microsoft Azure Fundamentals

55340 Developing ASP.NET Core Web Applications
Delivered Online6 days, Aug 13th, 13:00 + 1 more
£2975

PL-500T00 Microsoft Power Automate RPA Developer

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for If you're a developer with a keen interest in providing automated solutions for your organization, this certification could be a great fit for you. You automate time-consuming and repetitive tasks by using Microsoft Power Automate. You review solution requirements, create process documentation, and design, develop, deploy, integrate, troubleshoot, and evaluate solutions. Working with business stakeholders, you help to improve and automate business workflows. Overview After completing this course, students will be able to: Design RPA solutions Develop RPA solutions Deploy and manage RPA solutions Candidates for this course automate time-consuming and repetitive tasks by using Microsoft Power Automate. They review solution requirements, create process documentation, and design, develop, troubleshoot, and evaluate solutions. Candidates work with business stakeholders to improve and automate business workflows. They collaborate with administrators to deploy solutions to production environments, and they support solutions. MODULE 1: GET STARTED WITH POWER AUTOMATE FOR DESKTOP * Get started with Power Automate for desktop by learning about flows, creating automated steps, and flow development essentials. MODULE 2: AUTOMATE PROCESSES WITH ROBOTIC PROCESS AUTOMATION AND POWER AUTOMATE FOR DESKTOP * Work with Power Automate for desktop to record Windows and Web applications, but also use out of box actions such as manipulating Excel documents as part of an end to end invoice processing solution. MODULE 3: WORK WITH POWER AUTOMATE FOR DESKTOP * Work with Power Automate for desktop options, flows, recording features, conditions, loops, variables, images, and error and exception handling. MODULE 4: WORK WITH DIFFERENT TECHNOLOGIES IN POWER AUTOMATE FOR DESKTOP * Learn how to automate email handling, Excel, user interface, and system services with Power Automate for desktop. MODULE 5: IMPLEMENT ADVANCED LOGIC IN POWER AUTOMATE FOR DESKTOP * Learn how to work with system flows, control flows, mimic mouse actions, as well as operations used to manipulate text, date, and time in Power Automate for desktop. MODULE 6: BUILD EXPERTISE WITH POWER AUTOMATE FOR DESKTOP * Learn how to use Power Automate for desktop to work with Power Automate, OCR technologies, and scripting. MODULE 7: BUILD CUSTOM CONNECTORS FOR POWER AUTOMATE * This Learning Path explores custom connectors and explains how to configure them and use them with Microsoft Power Automate MODULE 8: USE BEST PRACTICES TO SECURE AND GOVERN MICROSOFT POWER PLATFORM ENVIRONMENTS * This module focuses on introducing Microsoft Power Platform environments and their role in creating Data Loss Prevention (DLP) policies by using examples and use cases. A brief introduction and overview of tools will also be discussed, including Microsoft Power Platform and Power Automate Admin experiences and Microsoft Power Platform Center of Excellence (COE) toolkit. ADDITIONAL COURSE DETAILS: Nexus Humans PL-500T00 Microsoft Power Automate RPA Developer training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the PL-500T00 Microsoft Power Automate RPA Developer course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

PL-500T00 Microsoft Power Automate RPA Developer
Delivered Online5 days, Jul 22nd, 13:00 + 1 more
£2380

Decision Making for Vulnerable People Webinar

5.0(1)

By Born at the Right Time

leading expert Philip Warford will talk about the options available to protect a disabled person using specialist Wills and Trusts

Decision Making for Vulnerable People Webinar
Delivered Online1 hour, Jul 17th, 09:00 + 1 more
FREE

SC-100T00 Microsoft Cybersecurity Architect

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is for experienced cloud security engineers who have taken a previous certification in the security, compliance and identity portfolio. Specifically, students should have advanced experience and knowledge in a wide range of security engineering areas, including identity and access, platform protection, security operations, securing data, and securing applications. They should also have experience with hybrid and cloud implementations. Beginning students should instead take the course SC-900: Microsoft Security, Compliance, and Identity Fundamentals. This is an advanced, expert-level course. Although not required to attend, students are strongly encouraged to have taken and passed another associate level certification in the security, compliance and identity portfolio (such as AZ-500, SC-200 or SC-300) before attending this class. This course prepares students with the expertise to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Governance Risk Compliance (GRC), security operations (SecOps), and data and applications. Students will also learn how to design and architect solutions using zero trust principles and specify security requirements for cloud infrastructure in different service models (SaaS, PaaS, IaaS). Prerequisites Highly recommended to have attended and passed one of the associate level certifications in the security, compliance and identity portfolio (such as AZ-500T00 Microsoft Azure Security Technologies, SC-200T00: Microsoft Security Operations Analyst, or SC-300T00: Microsoft Identity and Access Administrator.) Advanced experience and knowledge in identity and access, platform protection, security operations, securing data and securing applications. Experience with hybrid and cloud implementations. 1 - INTRODUCTION TO ZERO TRUST AND BEST PRACTICE FRAMEWORKS * Zero Trust initiatives * Zero Trust technology pillars part 1 * Zero Trust technology pillars part 2 2 - DESIGN SOLUTIONS THAT ALIGN WITH THE CLOUD ADOPTION FRAMEWORK (CAF) AND WELL-ARCHITECTED FRAMEWORK (WAF) * Define a security strategy * Cloud Adoption Framework secure methodology * Design security with Azure Landing Zones * The Well-Architected Framework security pillar 3 - DESIGN SOLUTIONS THAT ALIGN WITH THE MICROSOFT CYBERSECURITY REFERENCE ARCHITECTURE (MCRA) AND MICROSOFT CLOUD SECURITY BENCHMARK (MCSB) * Design solutions with best practices for capabilities and controls * Design solutions with best practices for attack protection 4 - DESIGN A RESILIENCY STRATEGY FOR COMMON CYBERTHREATS LIKE RANSOMWARE * Common cyberthreats and attack patterns * Support business resiliency * Ransomware protection * Configurations for secure backup and restore * Security updates 5 - CASE STUDY: DESIGN SOLUTIONS THAT ALIGN WITH SECURITY BEST PRACTICES AND PRIORITIES * Case study description * Case study answers * Conceptual walkthrough * Technical walkthrough 6 - DESIGN SOLUTIONS FOR REGULATORY COMPLIANCE * Translate compliance requirements into a security solution * Address compliance requirements with Microsoft Purview * Address privacy requirements with Microsoft Priva * Address security and compliance requirements with Azure policy * Evaluate infrastructure compliance with Defender for Cloud 7 - DESIGN SOLUTIONS FOR IDENTITY AND ACCESS MANAGEMENT * Design cloud, hybrid and multicloud access strategies (including Azure AD) * Design a solution for external identities * Design modern authentication and authorization strategies * Align conditional access and Zero Trust * Specify requirements to secure Active Directory Domain Services (AD DS) * Design a solution to manage secrets, keys, and certificates 8 - DESIGN SOLUTIONS FOR SECURING PRIVILEGED ACCESS * The enterprise access model * Design identity governance solutions * Design a solution to secure tenant administration * Design a solution for cloud infrastructure entitlement management (CIEM) * Design a solution for privileged access workstations and bastion services 9 - DESIGN SOLUTIONS FOR SECURITY OPERATIONS * Design security operations capabilities in hybrid and multicloud environments * Design centralized logging and auditing * Design security information and event management (SIEM) solutions * Design solutions for detection and response * Design a solution for security orchestration, automation, and response (SOAR) * Design security workflows * Design threat detection coverage 10 - CASE STUDY: DESIGN SECURITY OPERATIONS, IDENTITY AND COMPLIANCE CAPABILITIES * Case study description * Case study answers * Conceptual walkthrough * Technical walkthrough 11 - DESIGN SOLUTIONS FOR SECURING MICROSOFT 365 * Evaluate security posture for collaboration and productivity workloads * Design a Microsoft 365 Defender solution * Design configurations and operational practices for Microsoft 365 12 - DESIGN SOLUTIONS FOR SECURING APPLICATIONS * Design and implement standards to secure application development * Evaluate security posture of existing application portfolios * Evaluate application threats with threat modeling * Design security lifecycle strategy for applications * Secure access for workload identities * Design a solution for API management and security * Design a solution for secure access to applications 13 - DESIGN SOLUTIONS FOR SECURING AN ORGANIZATION'S DATA * Design a solution for data discovery and classification using Microsoft Purview * Design a solution for data protection * Design data security for Azure workloads * Design security for Azure Storage * Design a security solution with Microsoft Defender for SQL and Microsoft Defender for Storage 14 - CASE STUDY: DESIGN SECURITY SOLUTIONS FOR APPLICATIONS AND DATA * Case study description * Case study answers * Conceptual walkthrough * Technical walkthrough 15 - SPECIFY REQUIREMENTS FOR SECURING SAAS, PAAS, AND IAAS SERVICES * Specify security baselines for SaaS, PaaS, and IaaS services * Specify security requirements for web workloads * Specify security requirements for containers and container orchestration 16 - DESIGN SOLUTIONS FOR SECURITY POSTURE MANAGEMENT IN HYBRID AND MULTICLOUD ENVIRONMENTS * Evaluate security posture by using Microsoft Cloud Security Benchmark * Design integrated posture management and workload protection * Evaluate security posture by using Microsoft Defender for Cloud * Posture evaluation with Microsoft Defender for Cloud secure score * Design cloud workload protection with Microsoft Defender for Cloud * Integrate hybrid and multicloud environments with Azure Arc * Design a solution for external attack surface management 17 - DESIGN SOLUTIONS FOR SECURING SERVER AND CLIENT ENDPOINTS * Specify server security requirements * Specify requirements for mobile devices and clients * Specify internet of things (IoT) and embedded device security requirements * Secure operational technology (OT) and industrial control systems (ICS) with Microsoft Defender for IoT * Specify security baselines for server and client endpoints * Design a solution for secure remote access 18 - DESIGN SOLUTIONS FOR NETWORK SECURITY * Design solutions for network segmentation * Design solutions for traffic filtering with network security groups * Design solutions for network posture management * Design solutions for network monitoring 19 - CASE STUDY: DESIGN SECURITY SOLUTIONS FOR INFRASTRUCTURE * Case study description * Case study answers * Conceptual walkthrough * Technical walkthrough ADDITIONAL COURSE DETAILS: Nexus Humans SC-100T00 Microsoft Cybersecurity Architect training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SC-100T00 Microsoft Cybersecurity Architect course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

SC-100T00 Microsoft Cybersecurity Architect
Delivered Online5 days, Jul 29th, 13:00 + 1 more
£2380

Microsoft PowerPoint for the Business User

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is intended for people who use PowerPoint for their business communication needs. Overview To ensure your success in this course, you should have end-user skills with any current version of Windows, including being able to open and close applications, navigate basic file structures, and manage files and folders. This course is intended for those who wish to take advantage of the application for high quality business presentations and reports. PRESENTATIONS * Create Attractive Presentations from Existing PowerPoint Templates * Creating Presentations Quickly using Outline to build a Structure * Incorporating and reusing slides from other presentations into your own TEMPLATES AND CUSTOMIZATION * Using Slide Layouts * Using the Slide Master * Creating Custom Slide Layout WORKING WITH CHARTS AND TABLES * Create and Modify Tables * Create Charts and Graphs * Copying Charts into PowerPoint * Link Vs Embed ADD VISUAL ELEMENTS TO A PRESENTATION * Create and Modify Shapes * Add Images * Create SmartArt to Make Easily Modifiable graphics * Use SmartArt to Give Dull Text a More Visual Appeal WORKING WITH MEDIA AND ANIMATION * Add Audio to A Presentation * Add Video to A Presentation * Add and Customize Animations * Add and Customize Transitions PREPARING TO PRESENT * Add Notes to A Presentation * Presenter View And Slide Show Controls * Create A Custom Slide Show * Saving and Sharing the Presentation * Printing Options and Handouts ADDITIONAL COURSE DETAILS: Nexus Humans Microsoft PowerPoint for the Business User training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Microsoft PowerPoint for the Business User course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Microsoft PowerPoint for the Business User
Delivered OnlineTwo days, Jul 23rd, 08:30 + 2 more
£197

THE SUMMER ACADEMY

5.0(1)

By In2Drama

A SPECIALISED DRAMA COURSE FOR 11-21 YEAR OLDS, LED BY INDUSTRY PROFESSIONALS -------------------------------------------------------------------------------- In2Drama’s signature course is our Summer Academy for young aspiring performers wishing to carve out a career in the performing arts, or simply to explore a new hobby. Our action-packed 5 day course includes over 35 hours of masterclasses taught by industry professionals, and ends with a live public performance in front of peers and parents.  Whether you’re an experienced performer and need to be pushed outside of your comfort zone, or are nervous to step out in front of an audience for the first time, we can help you increase your confidence and have you performing with ease! The In2Drama faculty is made up of some of the very best talent in the industry with excellent connections to UK drama schools as well as professional film, TV and theatre contacts for anyone looking to take the next step in their learning journey. ‍ WHEN AND WHERE? Monday 22nd - Friday 26th July 2024 The Academy takes place in Cranleigh Arts Centre, around 20 minutes from Guildford. The venue has a professional theatre, a sprung dance floor for choreography sessions, dressing rooms, and lots of great areas for filming and multimedia activities, so it's the perfect spot for our aspiring performers to learn in. ‍ WHO IS IT FOR? Whether you’re simply interested in making new friends and having fun over summer, or you’re an aspiring performer with the goal of attending drama school or casting call auditions, we’re here to help make your dreams a reality. 11-15 year olds: Ready for an amazing summer of making friends, learning new performing skills and putting on a real show? Our lower age group offers all of the below modules with a focus on developing skills, having fun with friends and performing for family. 16-21 year olds: This group is suitable for 16-21 year olds who would like a future in the performing arts. While still suitable for those who want to have fun, the courses will be focused on perfecting audition skills for casting calls and drama school applications. ‍ WHAT YOU’LL LEARN You can benefit from over 35 hours of masterclasses in acting, singing, dance, audition skills, music production, technical theatre and film production, all taught by industry professionals, with modules tailored to your learning goals. Wherever your talent lies, we will ensure you leave the Academy with all the knowledge you need. ‍ THE IN2DRAMA ACADEMY TIMETABLE *Timetable subject to change MONDAY DANCE 11-15 year olds: 9am - 12pm  16-21 year olds: 1pm - 4pm  Presentation: 4.30pm - 5pm ‍ TECHNICAL THEATRE For all ages, from 2:30pm - 5pm ‍ FILM PRODUCTION 11-15 year olds: 1pm - 4pm 16-21 year olds: 9am - 12pm TUESDAY MUSIC PRODUCTION 11-15 year olds: 9am - 12pm 16-21 year olds: 1pm - 4pm  Presentation: 4.30 - 5pm ‍ TECHNICAL THEATRE For all ages, from 2:30pm - 5pm ‍ FILM PRODUCTION 11-15 year olds: 1pm - 4pm 16-21 year olds: 9am - 12pm WEDNESDAY ACTING 11-15 year olds: 9am - 12pm 16-21 year olds: 1pm - 4pm Presentation: 4.30pm - 5pm ‍ TECHNICAL THEATRE For all ages, from 2:30pm - 5pm ‍ FILM PRODUCTION 11-15 year olds: 1pm - 4pm 16-21 year olds: 9am - 12pm ‍ MUSIC PRODUCTION 11-15 year olds: 9am - 12pm 16-21 year olds: 1pm - 4pm THURSDAY SINGING & AUDITION 11-15 year olds: 9am - 12pm 16-21 year olds: 1pm - 4pm Presentation: 4.30pm - 5pm ‍ TECHNICAL THEATRE For all ages, from 2:30pm - 5pm ‍ FILM PRODUCTION 11-15 year olds: 1pm - 4pm 16-21 year olds: 9am - 12pm FRIDAY MUSICAL THEATRE AUDITION MASTERCLASS WITH EMMA HATTON For all ages, from 9am - 12pm Presentation: 1pm - 2pm MOVEMENT DIRECTION MASTERCLASS WITH PHOEBE HYDER For all ages, from 2pm - 4.15pm Movement Masterclass and Awards Ceremony: 4.30pm - 5pm HEADSHOTS AND SHOWREELS A headshot is a picture of yourself that casting agents will use to decide if you are physically right for a part. A showreel allows them to see you in action through a series of short video clips.  While taking part in the Academy, you will have the chance to purchase optional headshots and a showreel to showcase your talents. Our team will help you capture the very best bits of your performances and a brilliant headshot that you can use to apply for future castings and opportunities. When booking the Academy below, you can add a showreel to your booking if you choose.

THE SUMMER ACADEMY
Delivered In-Person in Guildford Full day, Jul 22nd, 08:00 + 4 more
£455

EC-Council Certified Ethical Hacker (CEH) v12

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The Certified Ethical Hacking v12 course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Overview Information security controls, laws, and standards. Various types of footprinting, footprinting tools, and countermeasures. Network scanning techniques and scanning countermeasures Enumeration techniques and enumeration countermeasures Vulnerability analysis to identify security loopholes in the target organization?s network, communication infrastructure, and end systems. System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities. Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures. Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing. Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures. DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures. Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures. Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures. Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures. SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures. Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools. Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools. Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures. Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools. Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap. Threats to IoT and OT platforms and defending IoT and OT devices. Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools. CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so you will be better positioned to setup your security infrastructure and defend against future attacks. An understanding of system weaknesses and vulnerabilities helps organizations strengthen their system security controls to minimize the risk of an incident. CEH was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to achieve the CEH credential. You will be exposed to an entirely different posture toward the responsibilities and measures required to be secure. Now in its 12th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies. 1 - INTRODUCTION TO ETHICAL HACKING * Information Security Overview * Cyber Kill Chain Concepts * Hacking Concepts * Ethical Hacking Concepts * Information Security Controls * Information Security Laws and Standards 2 - 2 - FOOT-PRINTING AND RECONNAISSANCE * Footprinting Concepts * Footprinting through Search Engines * Footprinting through Web Services * Footprinting through Social Networking Sites * Website Footprinting * Email Footprinting * Who is Footprinting * DNS Footprinting * Network Footprinting * Footprinting through Social Engineering * Footprinting Tools * Footprinting Countermeasures 3 - SCANNING NETWORKS * Network Scanning Concepts * Scanning Tools * Host Discovery * Port and Service Discovery * OS Discovery (Banner Grabbing/OS Fingerprinting) * Scanning Beyond IDS and Firewall * Draw Network Diagrams 4 - ENUMERATION * Enumeration Concepts * NetBIOS Enumeration * SNMP Enumeration * LDAP Enumeration * NTP and NFS Enumeration * SMTP and DNS Enumeration * Other Enumeration Techniques * Enumeration Countermeasures 5 - VULNERABILITY ANALYSIS * Vulnerability Assessment Concepts * Vulnerability Classification and Assessment Types * Vulnerability Assessment Solutions and Tools * Vulnerability Assessment Reports 6 - SYSTEM HACKING * System Hacking Concepts * Gaining Access * Escalating Privileges * Maintaining Access * Clearing Logs 7 - MALWARE THREATS * Malware Concepts * APT Concepts * Trojan Concepts * Virus and Worm Concepts * Fileless Malware Concepts * Malware Analysis * Countermeasures * Anti-Malware Software 8 - SNIFFING * Sniffing Concepts * Sniffing Technique: MAC Attacks * Sniffing Technique: DHCP Attacks * Sniffing Technique: ARP Poisoning * Sniffing Technique: Spoofing Attacks * Sniffing Technique: DNS Poisoning * Sniffing Tools * Countermeasures * Sniffing Detection Techniques 9 - SOCIAL ENGINEERING * Social Engineering Concepts * Social Engineering Techniques * Insider Threats * Impersonation on Social Networking Sites * Identity Theft * Countermeasures 10 - DENIAL-OF-SERVICE * DoS/DDoS Concepts * DoS/DDoS Attack Techniques * BotnetsDDoS Case Study * DoS/DDoS Attack Tools * Countermeasures * DoS/DDoS Protection Tools 11 - SESSION HIJACKING * Session Hijacking Concepts * Application Level Session Hijacking * Network Level Session Hijacking * Session Hijacking Tools * Countermeasures 12 - EVADING IDS, FIREWALLS, AND HONEYPOTS * IDS, IPS, Firewall, and Honeypot Concepts * IDS, IPS, Firewall, and Honeypot Solutions * Evading IDS * Evading Firewalls * IDS/Firewall Evading Tools * Detecting Honeypots * IDS/Firewall Evasion Countermeasures 13 - HACKING WEB SERVERS * Web Server Concepts * Web Server Attacks * Web Server Attack Methodology * Web Server Attack Tools * Countermeasures * Patch Management * Web Server Security Tools 14 - HACKING WEB APPLICATIONS * Web Application Concepts * Web Application Threats * Web Application Hacking Methodology * Web API, Webhooks, and Web Shell * Web Application Security 15 - SQL INJECTION * SQL Injection Concepts * Types of SQL Injection * SQL Injection Methodology * SQL Injection Tools * Evasion Techniques * Countermeasures 16 - HACKING WIRELESS NETWORKS * Wireless Concepts * Wireless Encryption * Wireless Threats * Wireless Hacking Methodology * Wireless Hacking Tools * Bluetooth Hacking * Countermeasures * Wireless Security Tools 17 - HACKING MOBILE PLATFORMS * Mobile Platform Attack Vectors * Hacking Android OS * Hacking iOS * Mobile Device Management * Mobile Security Guidelines and Tools 18 - IOT AND OT HACKING * IoT Hacking * IoT Concepts * IoT Attacks * IoT Hacking Methodology * IoT Hacking Tools * Countermeasures * OT Hacking * OT Concepts * OT Attacks * OT Hacking Methodology * OT Hacking Tools * Countermeasures 19 - CLOUD COMPUTING * Cloud Computing Concepts * Container Technology * Serverless Computing * Cloud Computing Threats * Cloud Hacking * Cloud Security 20 - CRYPTOGRAPHY * Cryptography Concepts * Encryption Algorithms * Cryptography Tools * Public Key Infrastructure (PKI) * Email Encryption * Disk Encryption * Cryptanalysis * Countermeasures ADDITIONAL COURSE DETAILS: Nexus Humans EC-Council Certified Ethical Hacker (CEH) v.12 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified Ethical Hacker (CEH) v.12 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

EC-Council Certified Ethical Hacker (CEH) v12
Delivered Online6 days, Jul 29th, 13:00 + 4 more
£3495

Security Engineering on AWS

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is intended for security engineers, security architects, and information security professionals. Overview Identify security benefits and responsibilities of using the AWS Cloud Build secure application infrastructures Protect applications and data from common security threats Perform and automate security checks Configure authentication and permissions for applications and resources Monitor AWS resources and respond to incidents Capture and process logs Create and configure automated and repeatable deployments with tools such as AMIs and AWS CloudFormation This course demonstrates how to efficiently use AWS security services to stay secure in the AWS Cloud. The course focuses on the security practices that AWS recommends for enhancing the security of your data and systems in the cloud. The course highlights the security features of AWS key services including compute, storage, networking, and database services. You will also learn how to leverage AWS services and tools for automation, continuous monitoring and logging, and responding to security incidents. Prerequisites We recommend that attendees of this course have: * Working knowledge of IT security practices and infrastructure concepts * Familiarity with cloud computing concepts * Completed AWS Security Essentials and Architecting on AWS courses 1 - SECURITY ON AWS * Security in the AWS cloud * AWS Shared Responsibility Model * Incident response overview * DevOps with Security Engineering 2 - IDENTIFYING ENTRY POINTS ON AWS * Identify the different ways to access the AWS platform * Understanding IAM policies * IAM Permissions Boundary * IAM Access Analyzer * Multi-factor authentication * AWS CloudTrail 3 - SECURITY CONSIDERATIONS: WEB APPLICATION ENVIRONMENTS * Threats in a three-tier architecture * Common threats: user access * Common threats: data access * AWS Trusted Advisor 4 - APPLICATION SECURITY * Amazon Machine Images * Amazon Inspector * AWS Systems Manager 5 - DATA SECURITY * Data protection strategies * Encryption on AWS * Protecting data at rest with Amazon S3, Amazon RDS, Amazon DynamoDB * Protecting archived data with Amazon S3 Glacier * Amazon S3 Access Analyzer * Amazon S3 Access Points 6 - SECURING NETWORK COMMUNICATIONS * Amazon VPC security considerations * Amazon VPC Traffic Mirroring * Responding to compromised instances * Elastic Load Balancing * AWS Certificate Manager 7 - MONITORING AND COLLECTING LOGS ON AWS * Amazon CloudWatch and CloudWatch Logs * AWS Config * Amazon Macie * Amazon VPC Flow Logs * Amazon S3 Server Access Logs * ELB Access Logs 8 - PROCESSING LOGS ON AWS * Amazon Kinesis * Amazon Athena 9 - SECURITY CONSIDERATIONS: HYBRID ENVIRONMENTS * AWS Site-to-Site and Client VPN connections * AWS Direct Connect * AWS Transit Gateway 10 - OUT-OF-REGION PROTECTION * Amazon Route 53 * AWS WAF * Amazon CloudFront * AWS Shield * AWS Firewall Manager * DDoS mitigation on AWS 11 - SECURITY CONSIDERATIONS: SERVERLESS ENVIRONMENTS * Amazon Cognito * Amazon API Gateway * AWS Lambda 12 - THREAT DETECTION AND INVESTIGATION * Amazon GuardDuty * AWS Security Hub * Amazon Detective 13 - SECRETS MANAGEMENT ON AWS * AWS KMS * AWS CloudHSM * AWS Secrets Manager 14 - AUTOMATION AND SECURITY BY DESIGN * AWS CloudFormation * AWS Service Catalog 15 - ACCOUNT MANAGEMENT AND PROVISIONING ON AWS * AWS Organizations * AWS Control Tower * AWS SSO * AWS Directory Service

Security Engineering on AWS
Delivered Online4 days, Jul 31st, 13:00 + 1 more
£2025

CompTIA IT Fundamentals+

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course will prepare participants to take the FC0-U61 exam to obtain the IT Fundamentals+ certification and help participants learn some of the basic principles and techniques of providing PC, mobile, applications, and network support. Overview On course completion, participants will be able to: - Set up a computer workstation and use basic software applications. - Explain the functions and types of devices used within a computer system. - Apply basic computer maintenance and support principles. - Describe some principles of software and database development. - Configure computers and mobile devices to connect to home networks and to the Internet. - Identify security issues affecting the use of computers and networks. This course will prepare participants to take the FC0-U61 exam to obtain the IT Fundamentals+ certification and help participants learn some of the basic principles and techniques of providing PC, mobile, applications, and network support. 1 - IDENTIFYING COMPUTER HARDWARE * Identify Types of Computing Devices * Identify Internal Computer Components * Common Computer Connector Types * Identify Common Peripheral Devices 2 - IDENTIFYING COMPUTER SOFTWARE * Compare Functions and Features of Common Operating Systems * Identify Application Software 3 - SETTING UP A BASIC WORKSTATION * Connect Hardware * Install and Configure Operating Systems * Install and Configure Applications * Configure Accessibility Options 4 - CONFIGURING NETWORK ACCESS * Network Connection Types * Install and Configure a SOHO Router * Network and Alternative Technologies * Sharing and Storage Methods 5 - WORKING WITH FILES, FOLDERS, AND APPLICATIONS * Create Files * Navigate a File Structure * Manage Files and Folders * Compress and Extract Files * Create Screen Captures 6 - CONFIGURING AND USING WIRELESS DEVICES * Configuring Wireless Devices * Use Wireless Devices 7 - SECURING COMPUTING DEVICES * Identify Security Threats * Apply Security Best Practices * Perform Secure Web Browsing 8 - SUPPORTING COMPUTERS AND USERS * Environmental and Safety Concepts * Back Up and Restore Data * Manage Software * Implement Basic Support Measures ADDITIONAL COURSE DETAILS: Nexus Humans CompTIA IT Fundamentals Plus Certification (ITF Plus) (Exam FCO-U61) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CompTIA IT Fundamentals Plus Certification (ITF Plus) (Exam FCO-U61) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CompTIA IT Fundamentals+
Delivered Online6 days, Aug 5th, 13:00 + 1 more
£2475