• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

134 C1 courses delivered Live Online

C To Master Skill: Learn C Programming Technique

By simplivlearning

Step by Step explanation of each topics in C Language with lots of programs.

C To Master Skill: Learn C Programming Technique
Delivered OnlineFlexible Dates
£10

C Card North Wales - new providers training (October 25)

5.0(9)

By Cwmni Addysg Rhyw - Sex Education Company

One day foundation course in sexual health for staff who want to deliver the C Card in North Wales. This course is for staff who are not currently trained to deliver the C Card. We are also holding refresher courses for staff already trained - contact us for more details. We will cover: What is C Card? What needs to be in place for C Card providers to deliver the scheme What stock and support we provide The law and sex including Fraser Guidelines Key sexual health issues, including contraception and STI's Condoms, lube, dams, etc Inclusive practice How to use the online admin system - QES If you have any questions please get in touch with us at ccard@sexeducationcompany.org

C Card North Wales - new providers training (October 25)
Delivered Online
FREE

Coding (HTML, C++, Python, JavaScript & IT)

By NextGen Learning

Course Overview This comprehensive course on Coding (HTML, C++, Python, JavaScript & IT) offers a structured introduction to the world of coding and information technology. It covers an expansive array of programming languages and technologies, including HTML, CSS, JavaScript, C++, Python, and PHP, alongside key IT concepts such as cybersecurity, cloud computing, and network security. Learners will develop a deep understanding of programming logic, software development, web development, and essential IT operations. Whether you're aiming to explore programming for the first time or expand your technical skill set, this course equips you with the knowledge required to navigate modern computing systems and coding environments. Upon completion, learners will be better prepared to pursue roles in web development, programming, system administration, and IT support across various industries. Course Description This course delivers an in-depth exploration of both coding and IT fundamentals, offering a diverse curriculum that spans core programming languages such as HTML, C++, Python, JavaScript, and R. It extends into cybersecurity, Linux scripting, ethical hacking, and computer networking—creating a well-rounded foundation for digital fluency. Learners are introduced to the design and development of web applications, front-end and back-end technologies, and essential tools such as GitHub, Heroku, and MySQL. The course further includes IT administration, encryption methods, cloud infrastructure, and system troubleshooting, ensuring coverage of key concepts necessary in today’s tech-driven world. With a focus on conceptual clarity and structured progression, learners will gain valuable knowledge aligned with current industry needs and expectations. Course Modules Module 01: Introduction to Coding With HTML, CSS, & Javascript Module 02: C++ Development: The Complete Coding Guide Module 03: Python Programming: Beginner To Expert Module 04: Learn Ethical Hacking From A-Z: Beginner To Expert Module 05: Bash Scripting, Linux and Shell Programming Module 06: JavaScript Project – Game Development with JS Module 07: R Programming for Data Science Module 08: Secure Programming of Web Applications Module 09: Advanced Diploma in PHP Web Development with MySQL, GitHub & Heroku Module 10: The Complete Front-End Web Development Course! Module 11: The Complete MySQL Server from Scratch: Bootcamp Module 12: Cyber Security Awareness Training Module 13: Cloud Computing / CompTIA Cloud+ (CV0-002) Module 14: CompTIA A+ (220-1001) Module 15: Building Your Own Computer Module 16: Computer Networks Security from Scratch to Advanced Module 17: IT Administration and Networking Module 18: Encryption Module 19: Advance Windows 10 Troubleshooting for IT HelpDesk Module 20: Microsoft Excel Complete Course (See full curriculum) Who is this course for? Individuals seeking to understand programming languages and IT fundamentals. Professionals aiming to transition into coding or expand their IT knowledge. Beginners with an interest in computing, programming, or digital technologies. Students or career changers preparing for roles in the tech sector. Career Path Web Developer Software Programmer IT Support Technician Network Administrator Cybersecurity Analyst Cloud Computing Technician Data Analyst Systems Engineer Helpdesk Specialist IT Consultant

Coding (HTML, C++, Python, JavaScript & IT)
Delivered OnlineFlexible Dates
£9.99

Modern Greek for Adults - Advanced (C1)

5.0(14)

By The Greek Online School

What will you learn in this course? Understand newspaper articles, the news and lectures and participate in discussions on a wide range of professional and specialised topics. Communicate with native speakers in all situations - everyday and formal. Deal with simple and more complex situations related to education, health system etc. Understand a wide range of simple and demanding texts and easily identify any information presented. Express yourselves spontaneously. Use language effectively for social, academic, and professional purposes. The main topics to be covered in this course are about emotions, images, mind, learning, modern life, truth & lies, technology, environment, greek culture and much more...

Modern Greek for Adults - Advanced (C1)
Delivered OnlineFlexible Dates
Price on Enquiry

Flappy Bird Clone: Cocos2d-x C++ Game

By NextGen Learning

Flappy Bird Clone: Cocos2d-x C++ Game Course Overview: This course provides a comprehensive introduction to game development using Cocos2d-x and C++. Learners will create a fully functional Flappy Bird clone, mastering the fundamentals of game mechanics, user interface design, and game physics. The course covers essential topics in object-oriented programming, handling user input, collision detection, and scene management. By the end, learners will have the knowledge to design and develop their own 2D games, making this course an excellent starting point for anyone interested in game development. The practical value lies in learning how to implement complex game features, which can be used in future projects or professional roles. Course Description: In this course, learners will dive into the process of developing a 2D game using C++ and Cocos2d-x. Starting with the basics of game creation, the course introduces essential programming concepts including classes, object handling, and event-driven programming. Key topics include building the game environment, implementing gravity and jump mechanics, handling user inputs, and managing game scenes. Learners will also focus on game physics such as collision detection and the continuous movement of the game elements. The course encourages learners to break down complex game features into manageable components while using a leading game engine. By the end of the course, participants will be equipped with a strong foundation in game programming and the skills needed to create their own games. Flappy Bird Clone: Cocos2d-x C++ Game Curriculum: Module 01: Introduction to Cocos2d-x and C++ (See full curriculum) Who is this course for? Individuals seeking to start a career in game development Professionals aiming to enhance their programming and game design skills Beginners with an interest in learning game development Aspiring developers looking to create their own 2D games Career Path Junior Game Developer Game Programmer Game Designer Mobile Game Developer Software Developer in the gaming industry

Flappy Bird Clone: Cocos2d-x C++ Game
Delivered OnlineFlexible Dates
£7.99

C)PEH/C)PTE Ultimate Boot Camp Mile 2

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Pen Testers Ethical Hackers Network Auditors Cybersecurity Professionals Vulnerability Assessors Cybersecurity Managers IS Managers Overview A Certified Penetration Testing Engineer imagines all of the ways that a hacker can penetrate a data system. You have to go beyond what you learned as an Ethical Hacker because pen testing explores technical and non-technical ways of breaching security to gain access to a system. Our C)PTE course is built on proven hands-on methods utilized by our international group of vulnerability consultants. In this course you will learn 5 Key Elements of Pen Testing; Information Gathering, Scanning, Enumeration, Exploitation and Reporting. Plus, discover the latest vulnerabilities and the techniques malicious hackers are using to acquire and destroy data. Additionally, you will learn more about the business skills needed to identify protection opportunities, justify testing activities and optimize security controls appropriate to the business needs in order to reduce business risk. Once you have completed this course, you will have learned everything you need know know to move forward with a career in penetration testing. A Certified Penetration Testing Engineer imagines all of the ways that a hacker can penetrate a data system.ÿ You have to go beyond what you learned as an Ethical Hacker because pen testing explores technical and non-technical ways of breaching security to gain access to a system.ÿ ÿ Our C)PTE course is built on proven hands-on methods utilized by our international group of vulnerability consultants.ÿ In this course you will learn 5 Key Elements of Pen Testing; Information Gathering, Scanning, Enumeration, Exploitation and Reporting. Plus, discover the latest vulnerabilities and the techniques malicious hackers are using to acquire and destroy data. Additionally, you will learn more about the business skills needed to identify protection opportunities, justify testing activities and optimize security controls appropriate to the business needs in order to reduce business risk. Once you have completed this course, you will have learned everything you need know know to move forward with a career in penetration testing. Course Outline Business & Technical Logistics of Pen Testing Information Gathering Reconnaissance ? Passive (External Only) Detecting Live Systems ? Reconnaissance (Active) Banner Grabbing and Enumeration Automated Vulnerability Assessment Hacking Operating Systems Advanced Assessment and Exploitation Techniques Evasion Techniques Hacking with PowerShell Networks and Sniffing Accessing and Hacking Web Techniques Mobile and IoT Hacking Report Writing Basics

C)PEH/C)PTE Ultimate Boot Camp Mile 2
Delivered OnlineFlexible Dates
Price on Enquiry

Healthcare Team Leader Programme - 2.5 Days

By The Development People

Our Team Leader Programme is designed specifically for new & existing Team Leads & Managers in Healthcare, such as General Practice, Primary & Secondary Care. This programme gives delegates the opportunity to spend time with peers, gain new tools & techniques that enable them to develop & support their team effectively. Building confidence to be able to have more proactive & challenging conversations with team members, supporting managers and reducing escalation.

Healthcare Team Leader Programme - 2.5 Days
Delivered OnlineFlexible Dates
£290

Monday Online Class

4.4(18)

By Edinburgh School of Icon Painting

The main focus of this workshop is on helping you to find your own personal style. To help you develop creative practice and find the confidence that you need to make creativity a part of your daily life.

Monday Online Class
Delivered OnlineFlexible Dates
£175

Thursday Online Classes (5 Classes)

4.4(18)

By Edinburgh School of Icon Painting

You can join us any Thursday. Cost £175 for 5 Classes. The main focus of this workshop is on helping you to find your own personal style.

Thursday Online Classes (5 Classes)
Delivered OnlineFlexible Dates
£175

Oracle 12c SQL Fundamentals

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The target audience for this textbook is all Oracle professionals, both business and systems professionals. Among the specific groups for whom this textbook will be helpful are: ? Business and non-IT professionals ? Application designers and database developers ? Business Intelligence (BI) analysts and consumers ? Database administrators ? Web server administrators Overview The first portion of this textbook considers the logical models upon which a relational database is based and the various configurations and environments in which you may work with the Oracle database. The next segment focuses on the actual SQL syntax for writing database queries. You will begin with the simplest of queries and then proceed onto moderately complex query scenarios. Finally, this textbook covers the DDL, DML and transaction control portions of the SQL language that allow one to create, maintain and manipulate application database objects and application data. This textbook takes a unique approach to SQL training in that it incorporates data modeling theory, relational database theory, graphical depictions of theoretical concepts and numerous examples of actual SQL syntax into one learning vehicle. Relational Databases & Data Models About Data Models About the Relational Model The Electronics Data Model About the Relational DBMS Selection & Setup of the Database Interface Considering Available Tools Selecting the Appropriate Tool Oracle Net Database Connections Oracle PAAS Database Connections Setup SQL Developer Setup SQL*Plus Setup Jdeveloper Using the Database Interface About Bind & Substitution Variables Using SQL Developer Using SQL*Plus Introduction to the SQL Language About the SQL Language Characteristics of SQL Introducing SQL Using Select SQL Rules The Select Statement The Select Statement Distinct/Unique Keyword Using Alias Names Restricting Results with the Where Clause About Logical Operators Equality Operator Boolean Operators REGEXP_LIKE() In Operator Sorting Data with the Order By Clause About the Order by Clause Multiple Column Sorts Specify the Sort Sequence About Null Values within Sorts Using Column Aliases Pseudo Columns, Functions & Top-N Queries Rowid Pseudo Column ORA_ROWSCN PSEUDO Column ROWNUM Pseudo Column About the Built-In Functions SYSDATE User & UID SESSIONTIMEZONE Function Using the Dual Table Row Limiting & Top-N Queries FETCH First x Rows Only Clause OFFSET x Rows Clause FETCH?PERCENT Clause The WITH TIES Option Joining Tables About Joins Inner Joins Reflexive Join Non-Key Join Outer Join Using the Set Operators About the Set Operators SQL Set Operator Examples UNION Example INTERECT Example MINUS Example UNION All Summary Functions Using Sub-Queries Finding Data with Sub-Queries Standard Sub-Queries Correlated Sub-Queries The EXISTS Operator Aggregating Data within Groups About Summary Groups Find Groups within the Tables Select Data From the Base Tables Select Groups from the Results Use DDL to Create & Manage Tables Create Table Statement Column Data Types Not Null Default Describe Alter Table Statement Drop Table Statement Table DDL Using SQL Developer Alter User Statement Alter Session Statement NLS_Language NLS_Date Use DML to Manipulate Data The Insert Statement The Delete Statement The Update Statement About Transactions Transaction Rollback Transaction Commit Transaction Savepoint The Set Transaction Statement Set Transaction Read Only Statement Rules Understanding the Data Models The Company Data Model The Electronics Data Model About the SQL-99 Standard SQL-92 & SQL-99 Cross Joins Natural Joins Inner Joins Implicit Inner Join Outer Joins Anti Joins Named Sub-Queries Enhancing Groups with Rollup & Cube Using Rollup The Grouping() Function Using Cube SQL Functions: Character Handling What are the SQL Functions? String Formatting Functions UPPER(), LOWER() Example INITCAP() Example Character Codes Functions CHR((), ASCII() Examples PAD & TRIM Functions RPAD() Example RTRIM() Example TRIM() Example String Manipulation Functions DECODE () Example SUBSTR() Example INSTR() Example TRANSLATE() Example REPLACE() Example String Comparison Functions LEAST() Example Phonetic Search Function SOUNDEX() Example SQL Functions: Numeric Handling About the Numeric Data Functions GREATEST() Example ABS() Example ROUND() Example TRUNC() Example SIGN() Example TO_NUMBER() Example & Data ype Conversions NULL VALUES FUNCTIONS NVL() & NVL2() Function NVL() Example (Character) NVL() Example (Numeric Loss of Data) NVL() Example (Numeric Output) NVL2() Example COALESCE() Function NULLIF() Function SQL Functions: Date Handling Date Formatting Functions TO_CHAR() & TO_DATE() Format Patterns TO_CHAR() Examples TO_DATE() Examples EXTRACT() Example Date Arithmetic Functions MONTHS_BETWEEN() Example ADD_MONTHS() Example LAST_DAY() Example NEXT_DAY() Example TRUNC(), ROUND() Dates Example NEW_ TIME() Example About V$TIMEZONE_NAMES CAST() FUNCTION & TIME ZONES Database Objects: About Database Objects About Database Objects About Schemas Making Object References Database Objects: Relational Views About Relations Views The Create View Statement Why Use Views? Accessing Views with DML Maintaining View Definitions Alter View Drop View DDL Using SQL Developer Database Objects: Indexes About Indexes Create & Drop Index Statements Indexes & Performance Data Dictionary Storage Database Objects: Creating Other Objects About Sequences Referencing NEXTVAL Referencing CURRVAL Within the DEFAULT Clause Alter Sequence & Drop Sequence ALTER SEQUENCE DROP SEQUENCE About Identity Columns CREATE TABLE?GENERATED AS IDENTITY ALTER TABLE?GENERATED AS IDENTITY Start With Limit Value ALTER TABLE...DROP IDENTITY About Synonyms CREATE & DROP SYNONYM Statements CREATE SYNONYM DROP SYNONYM Public Vs Private Synonyms CREATE SCHEMA AUTHORIZATION Database Objects: Object Management Using DDL The RENAME Statement TABLESPACE Placement CREATE TABLE?TABLESPACE The Comment Statement The TRUNCATE TABLE Statement Database Objects: Security About Object Security Grant Object Privileges Revoke Object Privileges Object Privileges & SQL Developer Data Integrity Using Constraints About Constraints NOT NULL Constraint NOT NULL Example CHECK Constraint UNIQUE Constraint PRIMARY KEY Constraint REFERENCES Constraint ON DELETE CASCADE Example ON DELETE SET NULL Example Constraints on Existing Tables Constraints & SQL Developer Managing Constraint Definitions RENAMING & DROPPING Constraints ENABLING & DISABLING Constraints DEFERRED Constraint Enforcement SET CONSTRAINTS Handling Constraint Exceptions Constraints with Views DATA Dictionary Storage The Data Dictionary Structure More About the Data Dictionary OBJECT-SPECIFIC Dictionary Views USER_UPDATABLE_COLUMNS The Dictionary Structure METADATA & SQL Developer Additional course details: Nexus Humans Oracle 12c SQL Fundamentals training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Oracle 12c SQL Fundamentals course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Oracle 12c SQL Fundamentals
Delivered OnlineFlexible Dates
Price on Enquiry
1...56789...14