• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

18424 Basic courses in Sheffield delivered Online

Ophthalmology for HCAs

By M&K Update Ltd

Develop essential knowledge and appropriate skills in the quality treatment and management of the patient with an eye problem

Ophthalmology for HCAs
Delivered in person or OnlineFlexible Dates
Price on Enquiry

PV301L: Solar Training - Solar Electric Lab Week (Battery-Based)

By Solar Energy International (SEI)

Students who complete the PV301L workshop will be able to: Identify and describe the basic functions of each component in a PV system Describe the configuration of various types of PV systems: PV direct, Stand-alone, PV/hybrid, Multimode, Zero-sell, Micro-grid, Utility-scale energy storage Calculate the capacity & voltage of different batteries Determine the state of charge of a battery by testing voltage and specific gravity List safety precautions & equipment required to work with batteries Demonstrate safe procedures for connecting and disconnecting batteries Demonstrate the process of adding water to batteries Identify appropriate battery enclosures Diagram and wire battery banks in series and parallel configurations, given various system parameters Make cables and lug connections for battery wiring Install temperature sensors on batteries Wire the battery bank for a live system Wire and test charge controllers through the various stages of operation Install and test PWM and MPPT charge controllers Program MPPT charge controllers based on battery and array values Wire and program battery SOC meters in different PV system configurations Set up and operate batteries during bulk, absorption, float, and equalization cycles Describe how maximum power point tracking and voltage step-down affect a PV system Identify some features, options, and metering available on different types of battery chargers Identify appropriate inverter types for different battery-based system configurations Compare available features and capabilities of battery-based inverters Identify specifications critical for battery-based inverters Wire test and program battery based inverters Discuss when and why breakers would be used rather than fuses Use a 3-line diagram to wire a system Discuss the order and perform safe installation practices Demonstrate the order of safe commissioning Demonstrate the order of shut-down and how to establish an electrically safe working environment

PV301L: Solar Training - Solar Electric Lab Week (Battery-Based)
Delivered Online On Demand
£1,255.73

Autodesk 3ds max Project based Training 1-2-1 Live online or Face to Face.

By Real Animation Works

3ds max face to face training customised and bespoke. Live online or Face to Face.

Autodesk 3ds max Project based Training 1-2-1 Live online or Face to Face.
Delivered in London or OnlineFlexible Dates
£800

Learn GO by Building Three Simple Golang Projects

By Packt

This course is the fastest way to start applying your basic Golang knowledge in the real-world and learning how projects are actually built. This course has no boring theory, no long introductions, no beating around the bush or wasting time, and just pure coding on the projects and learning from actually doing - not just watching.

Learn GO by Building Three Simple Golang Projects
Delivered Online On Demand4 hours 50 minutes
£82.99

High Impact Media Communication Programme

By Mpi Learning - Professional Learning And Development Provider

Develop confidence & capability in delivering to the camera & conducting interviews. Develop your own personal brand & impact on camera whether in person 'live', pre-recorded or online.

High Impact Media Communication Programme
Delivered in Loughborough or UK Wide or OnlineFlexible Dates
£1,335

Crystal Reports 2016 - Part 2

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course is designed for people who know how to create basic list and group reports and need to create reports that include subreports, cross-tabs, advanced formulas, and charts based on more than one data series. They may also need to build tools that make it easier for other people to create reports. They may or may not have programming and/or SQL experience. Overview In this course, you will create complex reports using tools in Crystal Reports 2016. You will: Create automatic and manual running totals. Work with cross-tab reports. Add subreports. Create drill-downs in a report. Use SQL statements in report processing. Create complex formulas. Add charts to reports. Enhance report functionality. In this course, students will create complex reports & data sources using the tools in Crystal Reports 2016. Students will not only create more complex reports including sub-reports and cross-tabs, but will also increase their speed and efficiency. 1 - CREATING RUNNING TOTALS Topic A: Create a Running Total Field Topic B: Modify a Running Total Field Topic C: Create a Manual Running Total 2 - WORKING WITH CROSS-TABS Topic A: Create a Cross-Tab Report Topic B: Format a Cross-Tab Report Topic C: Create Groups in Cross-Tab Reports 3 - ADDING SUBREPORTS Topic A: Insert a Subreport Topic B: Edit a Subreport Topic C: Share Variables 4 - CREATING DRILL-DOWNS IN A REPORT Topic A: Create a Drill-Down Topic B: Create Headings for Drill-Down Data 5 - USING SQL STATEMENTS IN REPORT PROCESSING Topic A: Create a Report Using SQL Queries Topic B: Summarize Report Data Topic C: Create Joins Using SQL Topic D: Create Subqueries Topic E: Create an SQL Expression Field 6 - CREATING COMPLEX FORMULAS Topic A: Work with Loops Topic B: Work with Arrays 7 - ADDING CHARTS TO REPORTS Topic A: Create Charts Topic B: Create a Chart with Drill-Down Topic C: Create a Top N Chart Topic D: Create a Cross-Tab Chart Topic E: Create Charts for Grouped Data Topic F: Format a Chart Topic G: Create a Chart Template 8 - ENHANCING REPORT FUNCTIONALITY Topic A: Organize Data Based on a Hierarchy Topic B: Create a Dynamic Image Topic C: Create a Report Alert Topic D: Create a Geographic Map 9 - APPENDIX Appendix A: Managing Reports Appendix B: Processing Data on the Server Appendix C: Detecting and Fixing Problems

Crystal Reports 2016 - Part 2
Delivered OnlineFlexible Dates
£990

EC-Council Computer Hacking Forensic Investigator (CHFI) v10.0

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The CHFI course will benefit: Police and other laws enforcement personnel Defense and Military personnel e-Business Security professionals Systems administrators Legal professionals Banking, Insurance and other professionals Government agencies Overview At the end of this course, you will possess the skills needed to: Understand the fundamentals of computer forensics Understand the computer forensic investigation process Describe in detail different types of hard disks and file systems Understand data acquisition and duplication Counteract anti-forensic techniques Leverage forensic skills in Windows, Linux, and Mac Investigate web attacks Understand dark web forensics Deploy forensic techniques for databases, cloud, and networks Investigate email crimes including malware Perform forensics in mobile and IoT environments Every crime leaves a digital footprint, and you need the skills to track those footprints. In this course, students will learn to unravel these pieces of evidence, decode them and report them. From decoding a hack to taking legal action against the perpetrators, they will become an active respondent in times of cyber-breaches. Computer Forensics in Today?s World 1.1. Understand the Fundamentals of Computer Forensics 1.2. Understand Cybercrimes and their Investigation Procedures 1.3. Understand Digital Evidence 1.4. Understand Forensic Readiness, Incident Response and the Role of SOC (Security Operations Center) in Computer Forensics 1.5. Identify the Roles and Responsibilities of a Forensic Investigator 1.6. Understand the Challenges Faced in Investigating Cybercrimes 1.7. Understand Legal Compliance in Computer Forensics Computer Forensics Investigation Process 2.1. Understand the Forensic Investigation Process and its Importance 2.2. Understand the Pre-investigation Phase 2.3. Understand First Response 2.4. Understand the Investigation Phase 2.5. Understand the Post-investigation Phase Understanding Hard Disks and File Systems 3.1. Describe Different Types of Disk Drives and their Characteristics 3.2. Explain the Logical Structure of a Disk 3.3. Understand Booting Process of Windows, Linux and Mac Operating Systems 3.4. Understand Various File Systems of Windows, Linux and Mac Operating Systems 3.5. Examine File System Using Autopsy and The Sleuth Kit Tools 3.6 Understand Storage Systems 3.7. Understand Encoding Standards and Hex Editors 3.8. Analyze Popular File Formats Using Hex Editor Data Acquisition and Duplication 4.1. Understand Data Acquisition Fundamentals 4.2. Understand Data Acquisition Methodology 4.3. Prepare an Image File for Examination Defeating Anti-forensics Techniques 5.1. Understand Anti-forensics Techniques 5.2. Discuss Data Deletion and Recycle Bin Forensics 5.3. Illustrate File Carving Techniques and Ways to Recover Evidence from Deleted Partitions 5.4. Explore Password Cracking/Bypassing Techniques 5.5. Detect Steganography, Hidden Data in File System Structures, Trail Obfuscation, and File Extension Mismatch 5.6. Understand Techniques of Artifact Wiping, Overwritten Data/Metadata Detection, and Encryption 5.7. Detect Program Packers and Footprint Minimizing Techniques 5.8. Understand Anti-forensics Countermeasures Windows Forensics 6.1. Collect Volatile and Non-volatile Information 6.2. Perform Windows Memory and Registry Analysis 6.3. Examine the Cache, Cookie and History Recorded in Web Browsers 6.4. Examine Windows Files and Metadata 6.5. Understand ShellBags, LNK Files, and Jump Lists 6.6. Understand Text-based Logs and Windows Event Logs Linux and Mac Forensics 7.1. Understand Volatile and Non-volatile Data in Linux 7.2. Analyze Filesystem Images Using The Sleuth Kit 7.3. Demonstrate Memory Forensics Using Volatility & PhotoRec 7.4. Understand Mac Forensics Network Forensics 8.1. Understand Network Forensics 8.2. Explain Logging Fundamentals and Network Forensic Readiness 8.3. Summarize Event Correlation Concepts 8.4. Identify Indicators of Compromise (IoCs) from Network Logs 8.5. Investigate Network Traffic 8.6. Perform Incident Detection and Examination with SIEM Tools 8.7. Monitor and Detect Wireless Network Attacks Investigating Web Attacks 9.1. Understand Web Application Forensics 9.2. Understand Internet Information Services (IIS) Logs 9.3. Understand Apache Web Server Logs 9.4. Understand the Functionality of Intrusion Detection System (IDS) 9.5. Understand the Functionality of Web Application Firewall (WAF) 9.6. Investigate Web Attacks on Windows-based Servers 9.7. Detect and Investigate Various Attacks on Web Applications Dark Web Forensics 10.1. Understand the Dark Web 10.2. Determine How to Identify the Traces of Tor Browser during Investigation 10.3. Perform Tor Browser Forensics Database Forensics 11.1. Understand Database Forensics and its Importance 11.2. Determine Data Storage and Database Evidence Repositories in MSSQL Server 11.3. Collect Evidence Files on MSSQL Server 11.4. Perform MSSQL Forensics 11.5. Understand Internal Architecture of MySQL and Structure of Data Directory 11.6. Understand Information Schema and List MySQL Utilities for Performing Forensic Analysis 11.7. Perform MySQL Forensics on WordPress Web Application Database Cloud Forensics 12.1. Understand the Basic Cloud Computing Concepts 12.2. Understand Cloud Forensics 12.3. Understand the Fundamentals of Amazon Web Services (AWS) 12.4. Determine How to Investigate Security Incidents in AWS 12.5. Understand the Fundamentals of Microsoft Azure 12.6. Determine How to Investigate Security Incidents in Azure 12.7. Understand Forensic Methodologies for Containers and Microservices Investigating Email Crimes 13.1. Understand Email Basics 13.2. Understand Email Crime Investigation and its Steps 13.3. U.S. Laws Against Email Crime Malware Forensics 14.1. Define Malware and Identify the Common Techniques Attackers Use to Spread Malware 14.2. Understand Malware Forensics Fundamentals and Recognize Types of Malware Analysis 14.3. Understand and Perform Static Analysis of Malware 14.4. Analyze Suspicious Word and PDF Documents 14.5. Understand Dynamic Malware Analysis Fundamentals and Approaches 14.6. Analyze Malware Behavior on System Properties in Real-time 14.7. Analyze Malware Behavior on Network in Real-time 14.8. Describe Fileless Malware Attacks and How they Happen 14.9. Perform Fileless Malware Analysis - Emotet Mobile Forensics 15.1. Understand the Importance of Mobile Device Forensics 15.2. Illustrate Architectural Layers and Boot Processes of Android and iOS Devices 15.3. Explain the Steps Involved in Mobile Forensics Process 15.4. Investigate Cellular Network Data 15.5. Understand SIM File System and its Data Acquisition Method 15.6. Illustrate Phone Locks and Discuss Rooting of Android and Jailbreaking of iOS Devices 15.7. Perform Logical Acquisition on Android and iOS Devices 15.8. Perform Physical Acquisition on Android and iOS Devices 15.9. Discuss Mobile Forensics Challenges and Prepare Investigation Report IoT Forensics 16.1. Understand IoT and IoT Security Problems 16.2. Recognize Different Types of IoT Threats 16.3. Understand IoT Forensics 16.4. Perform Forensics on IoT Devices

EC-Council Computer Hacking Forensic Investigator (CHFI) v10.0
Delivered OnlineFlexible Dates
£3,495

Project Management Fundamentals: In-House Training

By IIL Europe Ltd

Project Management Fundamentals: In-House Training Many projects are performed by highly competent and effective people who have little or no project management training. They perform projects like process improvement, marketing campaign development, new product development, event planning and production, and other 'tasks' which are projects. Project Management Fundamentals (PMF) is designed to support those people who need a solid foundation in project management, without being unnecessarily burdened to learn it while on the job. The course offers practical skills, concepts, and principles that can be taken back to the workplace, along with insights needed to adapt them to specific project environments. In today's environment, that means possibly adapting to Agile / Iterative methods. So, we have recently added key Agile concepts to provide a basic understanding of shifting towards agility. Since PMF's course goal is to achieve quality performance by learning effective planning and control, the focus is on a process orientation and an analytical, systems-oriented approach. Together, these frameworks promote project-related problem solving and decision-making skills necessary for real world projects. They honor project needs for collaboration, clear communications among people, and interpersonal and relationship skills. Recognition of these needs are woven throughout PMF, but are highlighted in two specific areas: Module 2 - People and Projects Module 8 - Executing, Communicating, and Developing the Team What You Will Learn At the end of this program, you will be able to: Describe the value of strong project management Identify characteristics of a successful project and project manager Recognize how current agile / adaptive practices fit within project management Explore project management processes, including Initiating, Planning, Execution, Monitoring & Controlling, and Closing Utilize project management processes and tools, based on case studies and real-world situations Create an initial project plan Use standard project management terminology Foundation Concepts Project management and definitions Value and focus of PM Competing constraints and project success Project life cycles People and Projects People and projects overview The project manager The project team People and projects in organizations Initiating and Defining Requirements Initiating the project Developing the project charter Conducting stakeholder assessments Defining requirements Using the Work Breakdown Structure Defining the Work Breakdown Structure (WBS) Developing a usable WBS Using the WBS Managing Project Risk Making the case for risk management Overview to planning for risk Identifying risks Analyzing risks Planning responses to risks Implementing response and monitoring risks Considerations for adaptive environments Estimating Defining an estimate Estimating approaches Estimating practices Estimating cost Validating an estimate Scheduling Defining the scheduling process and related terminology Sequencing and defining dependencies Determining the critical path Considering schedule risks and optimizing the schedule Executing, Communicating, and Developing the Team From baseline to execution Project communications and stakeholder relationships High-performing teams Monitoring and Controlling Defining monitoring and controlling Viewing control through the competing demands lens Variance Analysis and corrective action (Earned Value) Considerations in adaptive environments Closing the Project Closing projects Focusing on project transition Focusing on post-project evaluations

Project Management Fundamentals: In-House Training
Delivered in London or UK Wide or OnlineFlexible Dates
£1,495

Financial Analyst Complete Bundle - QLS Endorsed

By Imperial Academy

10 QLS Endorsed Courses for Financial Analyst | 10 Endorsed Certificates Included | Life Time Access

Financial Analyst Complete Bundle - QLS Endorsed
Delivered Online On Demand
£599

Basic Legionella Management

5.0(3)

By TNA Training & Safety Consultants

This course explains the background to Legionella, the potential risks associated with water systems and how these can be prevented or controlled. It helps you to understand the risk that Legionella poses and helps you develop the systems and working practices you need to stay ahead. It gives you enough knowledge to get a Legionella control programme off the ground yourself - or make confident, informed choices when commissioning others to take this on for you.

Basic Legionella Management
Delivered Online On Demand
£65