• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1410 C++ courses

Advanced Training for Trauma Treatment of Complex PTSD

4.8(9)

By Skill Up

Gain the solid skills and knowledge to kickstart a successful career and learn from the experts with this

Advanced Training for Trauma Treatment of Complex PTSD
Delivered Online On Demand16 hours 8 minutes
£25

Effective Email Marketing

4.8(9)

By Skill Up

Gain the skills and credentials to kickstart a successful career and learn from the experts with this step-by-step

Effective Email Marketing
Delivered Online On Demand51 minutes
£25

Effective Email Marketing

4.9(27)

By Apex Learning

Overview This comprehensive course on Effective Email Marketing will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Effective Email Marketing comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this Effective Email Marketing. It is available to all students, of all academic backgrounds. Requirements Our Effective Email Marketing is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 1 sections • 16 lectures • 00:51:00 total length •Course Promo: Email Marketing Revolution: 00:02:00 •Lesson 01 - Email Marketing Revolution - Intro Lesson: 00:03:00 •Lesson 02 - Email marketing an overview: 00:03:00 •Lesson 03 - Grow and organize your email list: 00:03:00 •Lesson 04 - Autoresponders and email apps every marketer should know: 00:04:00 •Lesson 05 - Email designing and copyright strategies: 00:03:00 •Lesson 06 - Email deliverability strategies - A How to keep your email out of the spam box: 00:04:00 •Lesson 07 - Email deliverability strategies - B Top delivery tools for internet marketers: 00:03:00 •Lesson 08 - The art of targeting and segmentation: 00:04:00 •Lesson 09 - Email program management _ optimization strategies - A Planning and email marketing calendar: 00:03:00 •Lesson 10 - Email program management _ optimization strategies - B common email market mistakes to avoid: 00:03:00 •Lesson 11 - Email program management _ optimization strategies - C Determining the optimal email frequency: 00:02:00 •Lesson 12 - Email program management and optimization strategies C how to use split testing AB testing: 00:03:00 •Lesson 13 - Funnel creation and drip marketing: 00:03:00 •Lesson 14 - Transactional emails - The 7 best services: 00:04:00 •Lesson 15 - Email styles to boost your profits: 00:04:00

Effective Email Marketing
Delivered Online On Demand51 minutes
£12

Microsoft OneNote (Desktop App)

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is intended for people in a variety of roles and fields who have a basic understanding of Microsoft 365 and want to incorporate digital note taking and note collaboration by using Microsoft OneNote. Overview In this course, you will develop note-taking skills by creating, modifying, and managing OneNote notebooks that work with other Microsoft 365 applications. You will: Navigate and customize the OneNote environment and create your first notebook. Add and format various types of notes and note elements, including text, links, and drawing objects. Add images, video, audio, Excel spreadsheets, and other types of files to a notebook. Organize, categorize, and search notebook content. Finalize notebook content by checking spelling, printing copies, and password-protecting notebooks. Manage notebooks by exporting content and working with history and backups. Share notebooks using Outlook and collaborate with colleagues using OneDrive. In our fast-paced digital world, the need to capture ideas, meeting notes, and to-do items is ever present. Microsoft's OneNote app provides a way for you to efficiently create and collect your notes in an electronic notebook. This course will help you use OneNote notebooks to store a wide variety of content in an organized structure, access the content from anywhere, and also share it with others. Additionally, learning how OneNote and other applications in the Microsoft 365 suite are integrated will increase your productivity. Lesson 1: Getting Started with OneNote Topic A: Navigate the OneNote Environment Topic B: Create Notebook Pages from Page Templates Topic C: Customize the OneNote User Interface Lesson 2: Adding and Formatting Notebook Content Topic A: Format Notebook Content Topic B: Add Quick Notes and Linked Notes to a Notebook Topic C: Use Drawing Tools in a Notebook Topic D: Use Dictation in a Notebook Lesson 3: Adding Files to Notebooks Topic A: Insert Images, Video, and Audio into a Notebook Topic B: Embed Excel Spreadsheets in a Notebook Topic C: Attach Other File Types to a Notebook Lesson 4: Organizing Notebook Content Topic A: Use Tags to Categorize Notes Topic B: Organize and Search Notebooks Lesson 5: Finalizing Notebooks Topic A: Proof and Print a Notebook Topic B: Configure Password Protection and Notebook Properties Lesson 6: Managing Notebooks Topic A: Export Content from a Notebook Topic B: Manage Notebook History Lesson 7: Sharing OneNote Content Topic A: Send Notebook Pages to Others Topic B: Work with Integrated Outlook Features Topic C: Collaborate on Notebooks Additional course details: Nexus Humans Microsoft OneNote (Desktop App) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Microsoft OneNote (Desktop App) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Microsoft OneNote (Desktop App)
Delivered OnlineFlexible Dates
Price on Enquiry

CMMC: Organizational Foundations v2.2

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course provides an immersive learning experience for business and technical professionals who need a thorough understanding of the CMMC program. It does this by taking the point of view of a CMMC Certified Professional. Students might consider taking this course to learn more about the overall CMMC program, how DoD contractors are assessed, and how to help their organizations prepare for a CMMC Assessment. Overview In this course, you will learn about the CMMC Model, framework, context, and application within the DoD, as well as the expectations and requirements imposed upon organizations that do business with the DoD. You will: Identify the threats to the Defense Supply Chain and the established regulations and standards for managing the risk. Identify the sensitive information that needs to be protected within the Defense Supply Chain and how to manage it. Describe how the CMMC Model ensures compliance with federal acquisitions regulations. Identify responsibilities of the Certified CMMC Professional, including appropriate ethical behavior. Establish the Certification and Assessment scope boundaries for evaluating the systems that protect regulated information. Prepare the OSC for an Assessment by evaluating readiness. Use the CMMC Assessment Guides to determine and assess the Evidence for practices. Implement and evaluate practices required to meet CMMC Level 1. Identify the practices required to meet CMMC Level 2. Work through the CMMC Assessment process. The Cybersecurity Maturity Model Certification (CMMC), managed by The Cyber AB (formerly known as the CMMC Accreditation Body or the CMMC-AB), is a program through which an organization's cybersecurity program maturity is measured by their initial and ongoing compliance with applicable cybersecurity practices, as well as their integration of corresponding policies and plans into their overall business operations. Once rule-making has concluded and CMMC 2.0 has been implemented, all organizations providing products or services to the United States Department of Defense (DoD) must comply with the requirements of their applicable CMMC Level. This course provides a complete review of the key elements of this important program. Lesson 1: Managing Risk within the Defense Supply Chain Topic A: Identify Threats to the Defense Supply Chain Topic B: Identify Regulatory Responses against Threats Lesson 2: Handling Sensitive Information Topic A: Identify Sensitive Information Topic B: Manage the Sensitive Information Lesson 3: Ensuring Compliance through CMMC Topic A: Describe the CMMC Model Architecture Topic B: Define the CMMC Program and Its Ecosystem Topic C: Define Self-Assessments Lesson 4: Performing CCP Responsibilities Topic A: Identify Responsibilities of the CCP Topic B: Demonstrate Appropriate Ethics and Behavior Lesson 5: Scoping Certification and Assessment Boundaries Topic A: Use the CMMC Assessment Scope Documentation Topic B: Get Oriented to the OSC Environment Topic C: Determine How Sensitive Information Moves Topic D: Identify Systems in Scope Topic E: Limit Scope Lesson 6: Preparing the OSC Topic A: Foster a Mature Cybersecurity Culture Topic B: Evaluate Readiness Lesson 7: Determining and Assessing Evidence Topic A: Determine Evidence Topic B: Assess the Practices Using the CMMC Assessment Guides Lesson 8: Implementing and Evaluating Level 1 Topic A: Identify CMMC Level 1 Domains and Practices Topic B: Perform a CMMC Level 1 Gap Analysis Topic C: Assess CMMC Level 1 Practices Lesson 9: Identifying Level 2 Practices Topic A: Identify CMMC Level 2 Practices Lesson 10: Working through an Assessment Topic A: Identify Assessment Roles and Responsibilities Topic B: Plan and Prepare the Assessment Topic C: Conduct the Assessment Topic D: Report the Assessment Results Topic E: Conduct the CMMC POA&M Close-Out Assessment

CMMC: Organizational Foundations v2.2
Delivered OnlineFlexible Dates
Price on Enquiry

Level 3 Law Diploma & Contract Law

By Kingston Open College

Premium Bundle of all Time | Ofqual Regulation + ATHE Awards + CPD Accreditation | Assessment & Tutor Support Included

Level 3 Law Diploma & Contract Law
Delivered Online On Demand3 weeks
£899

EC-Council Certified Threat Intelligence Analyst (C|TIA)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Organizations today demand a professional-level cybersecurity threat intelligence analyst who can extract the intelligence from data by implementing various advanced strategies. Such professional-level programs can only be achieved when the core of the curricula maps with and is compliant to government and industry published threat intelligence frameworks. Ethical Hackers Security Practitioners, Engineers, Analysts, Specialist, Architects, and Managers Threat Intelligence Analysts, Associates, Researchers, Consultants Threat Hunters SOC Professionals Digital Forensic and Malware Analysts Incident Response Team Members Any mid-level to high-level cybersecurity professionals with a minimum of 2 years of experience. Individuals from the information security profession and who want to enrich their skills and knowledge in the field of cyber threat intelligence. Individuals interested in preventing cyber threats. Overview This program will benefit students who are looking to build effective threat intelligence for their organization in order to combat modern-day cyber-attacks and prevent future attacks. Certified Threat Intelligence Analyst (C|TIA) is designed and developed in collaboration with cybersecurity and threat intelligence experts across the globe to help organizations identify and mitigate business risks by converting unknown internal and external threats into known threats. It is a comprehensive, specialist-level program that teaches a structured approach for building effective threat intelligence. Introduction to Threat Intelligence Understanding Intelligence Understanding Cyber Threat Intelligence Overview of Threat Intelligence Lifecycle and Frameworks Cyber Threats and Kill Chain Methodology Understanding Cyber Threats Understanding Advanced Persistent Threats (APTs) Understanding Cyber Kill Chain Understanding Indicators of Compromise (IoCs) Requirements, Planning, Direction, and Review Understanding Organization?s Current Threat Landscape Understanding Requirements Analysis Planning Threat Intelligence Program Establishing Management Support Building a Threat Intelligence Team Overview of Threat Intelligence Sharing Reviewing Threat Intelligence Program Data Collection and Processing Overview of Threat Intelligence Data Collection Overview of Threat Intelligence Collection Management Overview of Threat Intelligence Feeds and Sources Understanding Threat Intelligence Data Collection and Acquisition Understanding Bulk Data Collection Understanding Data Processing and Exploitation Data Analysis Overview of Data Analysis Understanding Data Analysis Techniques Overview of Threat Analysis Understanding Threat Analysis Process Overview of Fine-Tuning Threat Analysis Understanding Threat Intelligence Evaluation Creating Runbooks and Knowledge Base Overview of Threat Intelligence Tools Intelligence Reporting and Dissemination Overview of Threat Intelligence Reports Introduction to Dissemination Participating in Sharing Relationships Overview of Sharing Threat Intelligence Overview of Delivery Mechanisms Understanding Threat Intelligence Sharing Platforms Overview of Intelligence Sharing Acts and Regulations Overview of Threat Intelligence Integration

EC-Council Certified Threat Intelligence Analyst (C|TIA)
Delivered OnlineFlexible Dates
Price on Enquiry

Advanced Programming Techniques with Python

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is designed for existing Python programmers who have at least one year of Python experience and who want to expand their programming proficiency in Python 3. Overview In this course, you will expand your Python proficiencies. You will: Select an object-oriented programming approach for Python applications. Create object-oriented Python applications. Create a desktop application. Create a data-driven application. Create and secure web service-connected applications. Program Python for data science. Implement unit testing and exception handling. Package an application for distribution.   Python continues to be a popular programming language, perhaps owing to its easy learning curve, small code footprint, and versatility for business, web, and scientific uses. Python is useful for developing custom software tools, applications, web services, and cloud applications. In this course, you'll build upon your basic Python skills, learning more advanced topics such as object-oriented programming patterns, development of graphical user interfaces, data management, creating web service-connected apps, performing data science tasks, unit testing, and creating and installing packages and executable applications. Selecting an Object-Oriented Programming Approach for Python Applications Topic A: Implement Object-Oriented Design Topic B: Leverage the Benefits of Object-Oriented Programming Creating Object-Oriented Python Applications Topic A: Create a Class Topic B: Use Built-in Methods Topic C: Implement the Factory Design Pattern Creating a Desktop Application Topic A: Design a Graphical User Interface (GUI) Topic B: Create Interactive Applications Creating Data-Driven Applications Topic A: Connect to Data Topic B: Store, Update, and Delete Data in a Database Creating and Securing a Web Service-Connected App Topic A: Select a Network Application Protocol Topic B: Create a RESTful Web Service Topic C: Create a Web Service Client Topic D: Secure Connected Applications Programming Python for Data Science Topic A: Clean Data with Python Topic B: Visualize Data with Python Topic C: Perform Linear Regression with Machine Learning Implementing Unit Testing and Exception Handling Topic A: Handle Exceptions Topic B: Write a Unit Test Topic C: Execute a Unit Test Packaging an Application for Distribution Topic A: Create and Install a Package Topic B: Generate Alternative Distribution Files Additional course details: Nexus Humans Advanced Programming Techniques with Python training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Advanced Programming Techniques with Python course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Advanced Programming Techniques with Python
Delivered OnlineFlexible Dates
Price on Enquiry

Using Microsoft Windows 10

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is designed for end users who are familiar with computers and who need to use the features and functionality of the Windows 10 operating system for personal and/or professional reasons. In this course, students will learn the features and functionality of the Windows 10 operating system for professional and personal use. Accessing Windows 10 Topic A: Navigate the Windows 10 Desktop Topic B: Manage the Start Menu Topic C: Sign In to Windows 10 Using Windows Apps and Desktop Applications Topic A: Navigate Desktop Applications Topic B: Navigate Windows Apps Features Topic C: Navigate the Cortana Virtual Assistant App Working with Files and Folders Topic A: Manage Files and Folders with File Explorer Topic B: Store and Share Files with OneDrive Topic C: Multitask with Open Apps Accessing the Internet using Microsoft Edge Topic A: Use Microsoft Edge Topic B: Customize Microsoft Edge Customizing the Windows 10 Environment Topic A: Customize the Start Screen Topic B: Customize the Desktop Installing and Removing Devices Topic A: Manage Printers Topic B: Manage Peripheral Devices Using Windows 10 Security Features Topic A: Manage Passwords and Privacy Levels Topic B: Use Windows Defender Additional course details: Nexus Humans Using Microsoft Windows 10 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Using Microsoft Windows 10 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Using Microsoft Windows 10
Delivered OnlineFlexible Dates
Price on Enquiry

C40M03 - Safe Isolation of supplies (classroom)

5.0(1)

By Ember Compliance

It is a requirement within codes of practice e.g., BS 5839-1, and within legislation e.g., Health & Safety at Work Act 1974, that duties are placed upon employers and employees regarding health & safety and in particular electrical safety.

C40M03 - Safe Isolation of supplies (classroom)
Delivered In-Person in Broxburn + more
£99