• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

59274 Courses

Root Cause Analysis for Boilers and Steam Cycle Failures

By EnergyEdge - Training for a Sustainable Energy Future

Enhance your skills with our EnergyEdge course on root cause analysis for boilers and steam cycle failures. Join us for a transformative learning experience!

Root Cause Analysis for Boilers and Steam Cycle Failures
Delivered In-Person
£2,699 to £2,799

Certified Information Security Systems Professional (CISSP)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for experienced IT security-related practitioners, auditors, consultants, investigators, or instructors, including network or security analysts and engineers, network administrators, information security specialists, and risk management professionals, who are pursuing CISSP training and certification to acquire the credibility and mobility to advance within their current computer security careers or to migrate to a related career. Through the study of all eight CISSP Common Body of Knowledge (CBK) domains, students will validate their knowledge by meeting the necessary preparation requirements to qualify to sit for the CISSP certification exam. Additional CISSP certification requirements include a minimum of five years of direct professional work experience in two or more fields related to the eight CBK security domains, or a college degree and four years of experience. Overview #NAME? In this course, students will expand upon their knowledge by addressing the essential elements of the 8 domains that comprise a Common Body of Knowledge (CBK)© for information systems security professionals. Prerequisites CompTIA Network+ Certification 1 - Security and Risk Management Security Governance Principles Compliance Professional Ethics Security Documentation Risk Management Threat Modeling Business Continuity Plan Fundamentals Acquisition Strategy and Practice Personnel Security Policies Security Awareness and Training 2 - Asset Security Asset Classification Privacy Protection Asset Retention Data Security Controls Secure Data Handling 3 - Security Engineering Security in the Engineering Lifecycle System Component Security Security Models Controls and Countermeasures in Enterprise Security Information System Security Capabilities Design and Architecture Vulnerability Mitigation Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems Cryptography Concepts Cryptography Techniques Site and Facility Design for Physical Security Physical Security Implementation in Sites and Facilities 4 - Information Security Management Goals Organizational Security The Application of Security Concepts 5 - Information Security Classification and Program Development Information Classification Security Program Development 6 - Risk Management and Ethics Risk Management Ethics 7 - Software Development Security Software Configuration Management Software Controls Database System Security 8 - Cryptography Ciphers and Cryptography Symmetric-Key Cryptography Asymmetric-Key Cryptography Hashing and Message Digests Email, Internet, and Wireless Security Cryptographic Weaknesses 9 - Physical Security Physical Access Control Physical Access Monitoring Physical Security Methods Facilities Security

Certified Information Security Systems Professional (CISSP)
Delivered Online
£3,395

Awaken Your Inner Healer - Usui Reiki Level 1

5.0(3)

By Stephanie Edwards

Spiritual Awakening Level 1 allow your TRUE soul essence to light the way. Become aligned with Reiki Source Energy, vitality, and a happier and harmonic way of being.

Awaken Your Inner Healer -  Usui Reiki Level 1
Delivered In-Person in London + more
£89 to £189

Try Out Tuesdays - Indoor Archery

5.0(4)

By Glasgow Boys' Brigade

Open to Company & Senior Section members. Try out this months Indoor Archery

Try Out Tuesdays - Indoor Archery
Delivered In-Person in Glasgow
£2 to £5

Medication Training Level 2

4.9(1007)

By Caring For Care

This Safer Handling Of Medication Training course is aimed at staff who are responsible for handling medication About this event This Safer Handling Of Medication Training course is aimed at staff who are responsible for the handling, administrating and disposal of medication within a care environment. Policies. Legislation. CQC Medication. Routes. Formulation. Types. Absorption. MDT. Roles and Responsibilities. Levels of support. Boundaries and agreed ways of working. Order. Receive. Store. Record. Transfer. Dispose. 7 R’s. Group Work. Sources of info. Practical session including MAR charts. Risk assessments. Person Centred Care. Review. Covert. Consent. Refuse. Errors and action. Infection Control and Technique.

Medication Training Level 2
Delivered Online
£65

5th December Laura Williams #Agent121. Looking for: YA, ADULT FICTION, NON-FICTION

5.0(1)

By I Am In Print

LOOKING FOR: YA, ADULT FICTION, NON-FICTION Laura Williams is literary agent at the Greene and Heaton Literary Agency. She is seeking literary fiction, commercial fiction, psychological thrillers and high concept Young Adult. Laura is actively building a fiction list and a small non-fiction list. She is currently looking for literary fiction, edgy commercial fiction, psychological thrillers and high-concept contemporary young adult, as well as narrative non-fiction of all types. Her taste is quite dark, and she loves gothic, ghost stories, horror and anything sinister. She also loves books that make her cry, from big love stories to intense family dramas. She is open to historical or horror YA, but not magical or fantasy.  Meditative or moving novels about modern life, appeal to Laura, sad stories with love and the importance of caring for each other shining through. She also loves stories about female friendships or conversely groups of women who don't get on, such as the hugely fun BAD SUMMER PEOPLE by Emma Rosenblum. She is always on the lookout for a big tragic love story to make her cry happy or sad tears. At the more commercial end of fiction, think funny novels with warmth and romantic comedies with a bit of depth – think Marian Keyes. Most of all Laura is looking for novels she hasn’t read before – something unusual structurally or thematically, something that shines a light on a subject the author is passionate about, something that’ll break her heart or raise her blood in an entirely new way. Laura is always looking to promote diverse voices from across the globe, and is particularly keen on LGBTQI+ stories. Laura would like you to submit a covering letter, a 1-2 page synopsis and the first 5,000 words of your completed manuscript in a single word document. (In addition to the paid sessions, Laura is kindly offering one free session for low income/under-represented writers. Please email agent121@iaminprint.co.uk to apply, outlining your case for this option which is offered at the discretion of I Am In Print).  By booking you understand you need to conduct an internet connection test with I Am In Print prior to the event. You also agree to email your material in one document to reach I Am In Print by the stated submission deadline and note that I Am In Print take no responsibility for the advice received during your agent meeting. The submission deadline is: Monday 25 November 2024

5th December Laura Williams #Agent121. Looking for: YA, ADULT FICTION, NON-FICTION
Delivered Online + more
£72

EnergyEdge offers classroom training on EP technical services contracts to boost your knowledge and skills. Enroll now!

E&P Technical Services Contract
Delivered In-Person
£2,299 to £2,399

Becoming Anxiety Free with NLP

By Proactive NLP Ltd

Become free from Anxiety and say goodbye to managing your anxiety and start living a happy and content life. This masterclass will show you can change how your mind works to eliminate the negative and debilitating emotional impact of anxiety, once and for all!

Becoming Anxiety Free with NLP
Delivered Online
£65

55366 Querying Data with Transact-SQL

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for novice database developers, database administrators, Business Intelligence developers, report creators, and application developers who have an understanding of relational database concepts and have basic Windows navigation skills. Overview Create single table SELECT queries Create multiple table SELECT queries Filter and sort data Insert, update, and delete data Query data using built-in functions Create queries that aggregate data Create subqueries Create queries that use table expressions Use UNION, INTERSECT, and EXCEPT on multiple sets of data Implement window functions in queries Use PIVOT and GROUPING SETS in queries Use stored procedures in queries Add error handling to queries Use transactions in queries This five-day instructor-led course is intended for IT professionals who wish to use the Transact-SQL language to query and configure Microsoft SQL Server. Students are typically database developers and database administrators, but might also be Business Intelligence developers, report creators, or application developers. In this course, students learn how to query single tables, join data from multiple tables, filter and sort data, modify data, use procedures and functions, and implement error handling. Prerequisites Basic understanding of relational databases. Basic Windows knowledge. Module 1: Introduction to Transact-SQL What is Transact-SQL The SELECT statement The WHERE clause Sorting results Calculations CASE expressions Module 2: Joining tables with Transact-SQL The JOIN clause Inner joins Outer joins Self joins and cross joins Module 3: Filtering and sorting results Implement the ORDER BY clause Filter data with the WHERE clause Limit the number of rows returned by a query Implement NULL logic Module 4: SQL Server data types Understand data types Implement string data types Implement temporal data types Module 5: Inserting, updating and deleting data Insert new records Update existing records Delete data Module 6: Using SQL Server functions with Transact-SQL Understand function types in SQL Server Convert data using functions Implement logical functions Work with NULL data using functions Module 7: Aggregating data with Transact-SQL Implement aggregation in SQL Server Group records in SQL Server Filter aggregated data Module 8: Implement subqueries with Transact-SQL Implement scalar and multi-valued sub-queries Implement correlated subqueries Implement existence checks with subqueries Module 9: Create queries that use table expressions Create views Create table-valued functions Implement derived tables Implement common table expressions Module 10: Use UNION, INTERSECT, EXCEPT and APPLY on multiple sets of data Write queries with the UNION operator Write queries with the INTERSECT and EXCEPT operators Write queries with the APPLY operator Module 11: Implement window functions in queries Understand window functions Impement window functions Module 12: Use PIVOT and grouping sets in queries Implement PIVOT in queries Implement grouping sets in queries Module 13: Use stored procedures in queries Query data with stored procedures Interact with stored procedures using input and output parameters Write simple stored procedures Pass dynamic SQL to SQL Server Module 14: Implement programming features in Transact-SQL Understand T-SQL programming elements Implement loops and conditions in T-SQL queries Module 15: Add error handling to queries Understand SQL Server error handling Implemet structured exception handling Module 16: Use transactions in queries Understand database transactions Implement transactions in T-SQL

55366 Querying Data with Transact-SQL
Delivered Online
£2,976

50255 Managing Windows Environments with Group Policy

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for Enterprise network staff responsible for help desk support, system administration, and network design. Overview At Course Completion: - Features and functions of Group Policy - Use Group Policy management tools to manage security policies - Design a Group Policy infrastructure - Group Policy processing architecture - Back up, restore, import, and copy Group Policy Objects through the Group Policy - Management Console - Use Windows PowerShell to manage Group Policy - Implement security using Group Policy - Configure the desktop environment with Group Policy - Configure roaming profiles and Folder Redirection - Assign and publish software packages - Implement AppLocker and software restriction policies - Create and deploy Administrative Templates - Configure Group Policy preferences In this course, you will learn how to reduce costs and increase efficiencies in your network. You will discover how to consolidate the administration of an enterprise IT infrastructure with Group Policy, and you will learn to control and manage computer systems and domain users running Windows Server 2016 and Windows clients. Create Group Policies, implement administrative and security templates, and determine best practices when deploying software packages. Walk away with the experience and tools needed to optimize your enterprise systems and networks, implement administrative and security templates, and determine best practices when deploying software packages. 1 - Introduction to Configuration Management Configuration Management Overview Configuration Management Using Group Policy Group Policy Features Introduced with Later Versions of Windows Using Windows PowerShell in the Configuration Management Process 2 - Using Group Policy Management Tools Local and Domain Policies Using Group Policy Management Console Understanding Group Policy Refresh 3 - Designing a Group Policy Infrastructure Design Stages for a Group Policy Infrastructure Planning your Group Policy Design Designing Your Group Policy Solution Deploying Your Group Policy Solution Managing Your Group Policy Solution 4 - Understanding the Architecture of Group Policy Processing Group Policy Components in AD DS Understanding the Group Policy Deployment Order Modifying Group Policy Processing 5 - Troubleshooting and Backing Up GPOs Using Group Policy Troubleshooting Tools Integration of RSoP Functionality Group Policy Logging Options Backing Up, Restoring, Importing, and Copying GPOs Building Migration Tables 6 - Securing Windows Using Group Policy Exploring the Windows Security Architecture Securing User Accounts Exploring Security Policies Windows Firewall with Advanced Security Implementing Domain Security Security Policy Options for Window Client and Windows Server 7 - Implementing Application Security Using Group Policy Managing UAC Settings Defending Against Malware Using AppLocker to Restrict Software Implementing Windows App Security Settings 8 - Configuring the Desktop Environment with Group Policy Exploring Script Types and Controlling Script Execution Defining the Desktop, Start Menu, and Taskbar Settings Defining the Control Panel Settings Defining the Windows Components Settings Configuring the Printer Management and Pruning Settings Defining the Network Settings Discovering the new Group Policy Settings 9 - Implementing User State Virtualization Configuring Folder Redirection Managing Offline Files Implementing User Experience Virtualization OneDrive for Business 10 - Assigning and Publishing Software Packages Using MSI Packages to Distribute Software Using Group Policy as a Software Deployment Method Deploying Software Setting Up Distribution Points Using the Systems Center Configuration Manager to Distribute Software 11 - Configuration Management with Windows PowerShell Introducing Windows PowerShell Using Windows PowerShell Writing PowerShell Scripts Windows PowerShell Library for Group Policy Windows PowerShell-Based Logon Scripts 12 - Implementing PowerShell Desired State Configuration Introducing Group Policy Preferences Comparing Preferences and Policy Settings Options for Applying Preferences Configure Preference Settings 13 - Configuring Group Policy Preferences Introducing Group Policy Preferences Comparing Preferences and Policy Settings Options for Applying Preferences Configuring Preferences Settings Additional course details: Nexus Humans 50255 Managing Windows Environments with Group Policy training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the 50255 Managing Windows Environments with Group Policy course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

50255 Managing Windows Environments with Group Policy
Delivered Online
£2,975