• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

21984 Business courses delivered Online

55128 Writing Reports with Report Builder and SSRS Level 2

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The primary audience for this course are persons who are new to reporting with Microsoft© SQL Server© Report Builder and SSRS, persons who are transitioning from another reporting software application, and persons who are existing Report Builder and SSRS report authors. The secondary audience for this course are persons who are using Report Designer (SSRS). Course participants may be business analysts, programmer analysts, data analysts, database administrators, or IT professionals and may or may not have experience with Microsoft© SQL Server© Report Builder and SSRS, programming (Visual Basic), and/or Transact-Structured Query Language (T-SQL) experience. Overview After completing this course, students will be able to: Create parameter reports. Create list reports. Format reports with complex expressions. Add images and subreports. Add drilldown and drillthrough functionality. Add sparklines, data bars, and indicators. In this course, students will continue their learning on the foundations of report writing with Microsoft© SQL Server© Report Builder and SSRS. The focus will be on report creation by connecting to a database and manipulating the data. 1 - Parameter Reports Parameterized Reporting Create Report Parameters Modify Report Parameters Provide Default Parameter Values Provide Available Values for Parameters Lab: Creating Parameterized Reports 2 - List Data Regions Introducing the List Data Region Create Reports Using List Data Regions Modify Reports Which Use List Data Regions Lab: Creating List Reports 3 - Enhancing Reports with Complex Expressions Formatting Reports Top N Reports Running Values Lab: Enhancing Reports with Complex Expressions 4 - Enhance Reports with Images and Subreports Add Images to Reports Retrieve Images from a Database Introducing SSRS (SQL Server Reporting Services) Report Server Add Subreports to Reports Lab: Working With Images and Subreports 5 - Drilldown and Drillthrough Reports Add and Configure Drilldown Reporting Add and Configure Drillthrough Reporting Lab: Add Drilldown and Drillthrough Functionality to Reports 6 - Sparklines, Data Bars, and Indicators Sparklines Data Bars Indicators Lab: Adding Sparklines, Data Bars, and Indicators to Reports Additional course details: Nexus Humans 55128 Writing Reports with Report Builder and SSRS Level 2 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the 55128 Writing Reports with Report Builder and SSRS Level 2 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

55128 Writing Reports with Report Builder and SSRS Level 2
Delivered Online
£1,190

EC-Council Computer Hacking Forensic Investigator (CHFI) v10.0

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The CHFI course will benefit: Police and other laws enforcement personnel Defense and Military personnel e-Business Security professionals Systems administrators Legal professionals Banking, Insurance and other professionals Government agencies Overview At the end of this course, you will possess the skills needed to: Understand the fundamentals of computer forensics Understand the computer forensic investigation process Describe in detail different types of hard disks and file systems Understand data acquisition and duplication Counteract anti-forensic techniques Leverage forensic skills in Windows, Linux, and Mac Investigate web attacks Understand dark web forensics Deploy forensic techniques for databases, cloud, and networks Investigate email crimes including malware Perform forensics in mobile and IoT environments Every crime leaves a digital footprint, and you need the skills to track those footprints. In this course, students will learn to unravel these pieces of evidence, decode them and report them. From decoding a hack to taking legal action against the perpetrators, they will become an active respondent in times of cyber-breaches. Computer Forensics in Today?s World 1.1. Understand the Fundamentals of Computer Forensics 1.2. Understand Cybercrimes and their Investigation Procedures 1.3. Understand Digital Evidence 1.4. Understand Forensic Readiness, Incident Response and the Role of SOC (Security Operations Center) in Computer Forensics 1.5. Identify the Roles and Responsibilities of a Forensic Investigator 1.6. Understand the Challenges Faced in Investigating Cybercrimes 1.7. Understand Legal Compliance in Computer Forensics Computer Forensics Investigation Process 2.1. Understand the Forensic Investigation Process and its Importance 2.2. Understand the Pre-investigation Phase 2.3. Understand First Response 2.4. Understand the Investigation Phase 2.5. Understand the Post-investigation Phase Understanding Hard Disks and File Systems 3.1. Describe Different Types of Disk Drives and their Characteristics 3.2. Explain the Logical Structure of a Disk 3.3. Understand Booting Process of Windows, Linux and Mac Operating Systems 3.4. Understand Various File Systems of Windows, Linux and Mac Operating Systems 3.5. Examine File System Using Autopsy and The Sleuth Kit Tools 3.6 Understand Storage Systems 3.7. Understand Encoding Standards and Hex Editors 3.8. Analyze Popular File Formats Using Hex Editor Data Acquisition and Duplication 4.1. Understand Data Acquisition Fundamentals 4.2. Understand Data Acquisition Methodology 4.3. Prepare an Image File for Examination Defeating Anti-forensics Techniques 5.1. Understand Anti-forensics Techniques 5.2. Discuss Data Deletion and Recycle Bin Forensics 5.3. Illustrate File Carving Techniques and Ways to Recover Evidence from Deleted Partitions 5.4. Explore Password Cracking/Bypassing Techniques 5.5. Detect Steganography, Hidden Data in File System Structures, Trail Obfuscation, and File Extension Mismatch 5.6. Understand Techniques of Artifact Wiping, Overwritten Data/Metadata Detection, and Encryption 5.7. Detect Program Packers and Footprint Minimizing Techniques 5.8. Understand Anti-forensics Countermeasures Windows Forensics 6.1. Collect Volatile and Non-volatile Information 6.2. Perform Windows Memory and Registry Analysis 6.3. Examine the Cache, Cookie and History Recorded in Web Browsers 6.4. Examine Windows Files and Metadata 6.5. Understand ShellBags, LNK Files, and Jump Lists 6.6. Understand Text-based Logs and Windows Event Logs Linux and Mac Forensics 7.1. Understand Volatile and Non-volatile Data in Linux 7.2. Analyze Filesystem Images Using The Sleuth Kit 7.3. Demonstrate Memory Forensics Using Volatility & PhotoRec 7.4. Understand Mac Forensics Network Forensics 8.1. Understand Network Forensics 8.2. Explain Logging Fundamentals and Network Forensic Readiness 8.3. Summarize Event Correlation Concepts 8.4. Identify Indicators of Compromise (IoCs) from Network Logs 8.5. Investigate Network Traffic 8.6. Perform Incident Detection and Examination with SIEM Tools 8.7. Monitor and Detect Wireless Network Attacks Investigating Web Attacks 9.1. Understand Web Application Forensics 9.2. Understand Internet Information Services (IIS) Logs 9.3. Understand Apache Web Server Logs 9.4. Understand the Functionality of Intrusion Detection System (IDS) 9.5. Understand the Functionality of Web Application Firewall (WAF) 9.6. Investigate Web Attacks on Windows-based Servers 9.7. Detect and Investigate Various Attacks on Web Applications Dark Web Forensics 10.1. Understand the Dark Web 10.2. Determine How to Identify the Traces of Tor Browser during Investigation 10.3. Perform Tor Browser Forensics Database Forensics 11.1. Understand Database Forensics and its Importance 11.2. Determine Data Storage and Database Evidence Repositories in MSSQL Server 11.3. Collect Evidence Files on MSSQL Server 11.4. Perform MSSQL Forensics 11.5. Understand Internal Architecture of MySQL and Structure of Data Directory 11.6. Understand Information Schema and List MySQL Utilities for Performing Forensic Analysis 11.7. Perform MySQL Forensics on WordPress Web Application Database Cloud Forensics 12.1. Understand the Basic Cloud Computing Concepts 12.2. Understand Cloud Forensics 12.3. Understand the Fundamentals of Amazon Web Services (AWS) 12.4. Determine How to Investigate Security Incidents in AWS 12.5. Understand the Fundamentals of Microsoft Azure 12.6. Determine How to Investigate Security Incidents in Azure 12.7. Understand Forensic Methodologies for Containers and Microservices Investigating Email Crimes 13.1. Understand Email Basics 13.2. Understand Email Crime Investigation and its Steps 13.3. U.S. Laws Against Email Crime Malware Forensics 14.1. Define Malware and Identify the Common Techniques Attackers Use to Spread Malware 14.2. Understand Malware Forensics Fundamentals and Recognize Types of Malware Analysis 14.3. Understand and Perform Static Analysis of Malware 14.4. Analyze Suspicious Word and PDF Documents 14.5. Understand Dynamic Malware Analysis Fundamentals and Approaches 14.6. Analyze Malware Behavior on System Properties in Real-time 14.7. Analyze Malware Behavior on Network in Real-time 14.8. Describe Fileless Malware Attacks and How they Happen 14.9. Perform Fileless Malware Analysis - Emotet Mobile Forensics 15.1. Understand the Importance of Mobile Device Forensics 15.2. Illustrate Architectural Layers and Boot Processes of Android and iOS Devices 15.3. Explain the Steps Involved in Mobile Forensics Process 15.4. Investigate Cellular Network Data 15.5. Understand SIM File System and its Data Acquisition Method 15.6. Illustrate Phone Locks and Discuss Rooting of Android and Jailbreaking of iOS Devices 15.7. Perform Logical Acquisition on Android and iOS Devices 15.8. Perform Physical Acquisition on Android and iOS Devices 15.9. Discuss Mobile Forensics Challenges and Prepare Investigation Report IoT Forensics 16.1. Understand IoT and IoT Security Problems 16.2. Recognize Different Types of IoT Threats 16.3. Understand IoT Forensics 16.4. Perform Forensics on IoT Devices

EC-Council Computer Hacking Forensic Investigator (CHFI) v10.0
Delivered Online
£3,495

Modelling Business Processes - BCS Practitioner

5.0(12)

By Duco Digital Training

Duco Digital Training's Practitioner course in BCS Requirements Engineering develops your skills in the understanding and application of elicitation, analysis and management of business analysis requirements.

Modelling Business Processes - BCS Practitioner
Delivered Online On Demand18 hours
£750

BA (Hons.) Business Management - 24 Months

4.0(2)

By London School Of Business And Research

Its no secret the world has been changing before our eyes ! In order to confront the rapidly-evolving world around us, businesses need highly trained, adaptable and creative individuals to keep pace and stay innovative. BA (Hons) Business Management course is designed to train you for the jobs of the future; you'll be taught the fundamentals of business management in the wider context of the contemporary business landscape, ensuring your skills will remain flexible and adaptable as the world changes. The programme aims to develop pro-active decision makers, managers and leaders for a variety of careers in business sectors in a global context. The course combines practical professional experience with creative approaches to enterprise and innovation that will develop your entrepreneurial spirit. Program OverviewKey Highlights Program Duration: 24 Months (18 Months Option also available) Program Credits: 120 Designed for working Professionals 100% Online Global programme: Study anywhere, anytime on your laptop, phone or tablet. Study material: Comprehensive study materials and e-library support. No Written Exam. The Assessment is done via Submission of Assignment Online Lectures Timely Doubt Resolution Dedicated Student Success Manager Regular Networking Events with Industry Professionals LSBR Alumni Status Payment Plan: No Cost EMI Option

BA (Hons.) Business Management - 24 Months
Delivered Online On Demand
£7,200

Property Sourcing Business Blueprint

By Property SQ2

Build a property sourcing business, negotiation property deals as a sourcing agent or buyer's agent. Be legal and compliant, learning industry best practice as a deal packager.

Property Sourcing Business Blueprint
Delivered OnlineFlexible Dates
£1,100 to £3,000

Business Developer Bundle - QLS Endorsed

By Imperial Academy

10 QLS Endorsed Courses for Business Developer | 10 QLS Endorsed Hard Copy Certificates Included | Lifetime Access | Tutor Support

Business Developer Bundle - QLS Endorsed
Delivered Online On Demand
£599

Business Analysis Course - BCS Foundation

5.0(12)

By Duco Digital Training

Duco Digital Training's BCS Foundation Certificate in Business Analysis has been designed to provide learners with knowledge and understanding of business analysis concepts, principles and techniques for roles such as business a analyst.

Business Analysis Course - BCS Foundation
Delivered Online On Demand40 hours
£500

Business Resilience Fundamentals

By IIL Europe Ltd

In our VUCA (Volatile, Uncertain, Complex, Ambiguous) world, organizational resilience is key to adapting, surviving, and thriving. The world is experiencing a level of disruption and business risk not seen in generations. Some companies freeze and fail, while others innovate, advance, and even thrive. The difference is resilience. As crises become more frequent, the ability to thrive in crises is now essential. The Oxford English Dictionary defines resilience - in an organizational context - as 'the capacity to recover quickly from difficulties'. A resilient business is one which is capable not of just withstanding shocks and disruptions in the business environment, but also capable of adapting to and taking advantage of them. It is more than simply bouncing back after a crisis or being an agile organization. Business Resilience Fundamentals training and supporting certification are underpinned by the publication BUSINESS RESILIENCE: A practical guide to sustained progress delivered at pace. It provides a cohesive, practical guide to building business resilience, enabling leaders to implement an effective framework in an inclusive and sustainable way. Participants will be guided on implementing and adapting a range of tools to build and enhance organizational resilience. This course will help participants to ensure their organization is better prepared for the next crisis and to anticipate fluctuations in the business environment to take advantage.

Business Resilience Fundamentals
Delivered OnlineFlexible Dates
£1,850 to £1,950

Foundation Certificate in Business Analysis

5.0(1)

By Career Transitioners

The BCS Foundation Certificate in Business Analysis is a foundation- level certification that provides a broad understanding of business analysis principles and techniques. It is offered by the British Computer Society (BCS), a professional association for IT professionals.

Foundation Certificate in Business Analysis
Delivered OnlineFlexible Dates
£690

Better Business Cases Foundation & Practitioner: In-House

By IIL Europe Ltd

Better Business Cases™ Foundation and Practitioner: In-House Training Using this best-practice approach will allow organizations to reduce unnecessary spending and improve the decision-making process which gives you a greater chance of securing necessary funding and support for initiatives. The goal of the combined foundation and practitioner course is to develop a candidate's ability to deliver a comprehensive business case through encouraging expanded knowledge to guide the practical application of theoretical foundations. Upon the completion of this course, a candidate will be able to start applying the model to a real business case development project. The outline presented in the course overview will be addressed in the first 2 days, with the Foundation exam conducted on the morning of Day 3. Then the topics will be revisited at a deeper level, for 2 more days, with the Practitioner exam conducted on the afternoon of Day 5. What you will Learn At the end of this program, you will be able to: Develop the lifecycle of a business case and establish the relationships between the five cases Apply the steps in the business case development framework, in order to support the production of a business case, using the Five Case Model, for a given scenario. Overview of Better Business Cases Alignment with the strategic planning process Importance of the Business Case using the Five Case Model Overview of the Five Case Model Purpose of the key stages in the development of a spending proposal Purpose of a Business Justification Case Business Case Development Process Purpose of project / programme assurance and assurance reviews Responsibility for producing the Business Case Determining the Strategic Context and Undertaking the Strategic Assessment Scoping the Scheme and Preparing the Strategic Outline Case Planning the Scheme and Preparing the Outline Business Case Procuring the Solution and Preparing the Full Business Case Implementation and monitoring Evaluation and feedback Making the Case for Change Agree on the strategic context Determine spending objectives, existing arrangements, and business needs Determine potential business scope and key service requirements Determine benefits, risks, constraints, and dependencies Exploring the Preferred Way Forward Agree on critical success factors Determine long list options and SWOT analysis Recommend a preferred way forward Determining Potential Value for Money Revisit the short list Prepare the economic appraisal for short-listed options Undertake benefits appraisal Undertake risk appraisal Select preferred option and undertake sensitivity analysis Preparing for the Potential Deal Determine the procurement strategy Determine service streams and required outputs Outline potential risk apportionment Outline potential payment mechanisms Ascertain contractual issues and accountancy treatment Ascertaining Affordability and Funding Requirement Prepare the financial model Prepare the financial appraisals Planning for Successful Delivery Plan programme / project management Plan change and contract management Plan benefits realization Plan risk management Plan programme / project assurance and post-project evaluation Procuring the Value for Money Solution Revisit the case for change Revisit the OBC options Detail procurement process and evaluation of best and final offers (BAFOs) Contracting for the Deal Set out the negotiated deal and contractual arrangements Set out the financial implications of the deal Ensuring Successful Delivery Finalize project management arrangements and plans Finalize change management arrangements and plans Finalize benefits realization arrangements and plans Finalize risk management arrangements and plans Finalize contract management arrangements and plans Finalize post-project evaluation arrangements and plans

Better Business Cases Foundation & Practitioner: In-House
Delivered in London or UK Wide or OnlineFlexible Dates
£3,990