• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

2679 Character courses

Understanding Behaviors and Personality Types Using the DISC Assessment

By Nexus Human

Duration 2 Days 12 CPD hours Overview Create heightened self-awareness and personal discovery Establish a space of mutual respect by adapting your communication Work with resistance to gain commitment and buy-in Recognize and enhance trust by leading from any position Distinguish among varying attitudes and behaviors to make your teams work as a stronger unit One of DISC?s most intriguing applications is leveraging behavioral identification and adaptability. This workshop will guide you on the path of heightened self-awareness and personal discovery. You can make this your cornerstone seminar, revealing your unique behavioral style blend and how to apply that knowledge prescriptively to others, based on their style blend; thus boosting communication effectiveness. Studies indicate that 92% of workplace conflict is the result of misunderstanding and communication breakdowns. Your entire organization can apply DISC?s prescriptive lessons of behavioral adaptability to reduce employee conflict and turnover, increase productivity, and optimize team performance. Private classes on this topic are available. We can address your organization?s issues, time constraints, and save you money, too. Contact us to find out how. 1. Understanding The World Of Disc What is DISC? Breaking down the four main styles: Dominant Influencing Steady Conscientious Determining behaviors to read styles: Indirect vs. Direct Open vs. Guarded 2. Building Stronger Self-Awareness Rating your own style Understanding the Platinum Rule Grid Breaking down your profile Natural Style Adapted Style 3. Reading And Adapting To Others? Behaviors Applying the Platinum Rule Identifying characteristics in others Communication strategies with others Adapting your approaches 4. Getting Buy-In From Others Selling yourself to others Getting buy-in from each profile Understanding the cycle of getting buy-in Assessing Solving Confirming agreement Assuring satisfaction 5. Trust-Based Leadership High performance leadership characteristics The key to listening to build trust Motivating strategies with each profile 6. Making Teams Work Understanding how we each make decisions Seeing the power in each style as a role Blending team styles for teamwork Reviewing the team needs to optimize effectiveness

Understanding Behaviors and Personality Types Using the DISC Assessment
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Introducing IP Fundamentals of Cisco Fabric for Media v2.0 (IPFMFD)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course is designed for broadcast engineers with no previous IP experience. Overview After taking this course, you should be able to: Identify the components of a computer network and describe their basic characteristics. Describe network fundamentals,and explain a simple LAN. Describe hardware and wiring that is used to build a network. Describe the Open Systems Interconnection (OSI) reference model. Explain the datalink layer characteristics, Ethernet protocol, and switch operation. Introduce students to key network layer components, definitions, and standards. Explain the purpose and functions of the transport layer. Describe end-to-end packet delivery. Describe routing. Describe multicast networks, applications, and protocols. Explain data center architecture in each layer and describe new leaf-spine topology approaches. Explain virtualization and software-defined networking (SDN). The Introducing IP Fundamentals of Cisco Fabric for Media(IPFMFD) v2.0 course introduces you to Internet Protocol (IP) technologies. This course covers Ethernet functions and standards, the basic principles of IP, the Transmission Control Protocol/Internet Protocol (TCP/IP) stack, and other technologies used in modern networks. Lab exercises focus on configuring basic IP functionality on switches and servers. Course Outline Course Introduction Ethernet Hardware Describing the OSI and TCP/IP Models Understanding Ethernet and Switch Operation Describing IPv4 Network Layer Addressing Understanding the TCP/IP Transport Layer Packet Delivery Process Describing Routing IP Multicast Describing Data Center Network Architectures Virtualization and Software-Defined Networking Additional course details: Nexus Humans Cisco Introducing IP Fundamentals of Cisco Fabric for Media v2.0 (IPFMFD) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Introducing IP Fundamentals of Cisco Fabric for Media v2.0 (IPFMFD) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Introducing IP Fundamentals of Cisco Fabric for Media v2.0 (IPFMFD)
Delivered OnlineFlexible Dates
Price on Enquiry

AWS Cloud Essentials for Business Leaders

By Nexus Human

Duration 0.5 Days 3 CPD hours This course is intended for This course is intended for: Line of Business (LoB) owners, IT leaders, and executives Overview In this course, you will learn to: Explain the role of information technology (IT) in an organization for business transformation Explain the customer value proposition for using the cloud across industries Define key characteristics of cloud computing Explain the cloud business model Identify key security practices of cloud computing Frame the cloud business value using the Cloud Value Framework In this course, you will learn the fundamental concepts of cloud computing and how a cloud strategy can help companies meet business objectives. It explores the advantages and possibilities of cloud computing. It also introduces addresses concepts such as security and compliance to help facilitate better discussions with line of business (LOB) professionals, information technology (IT) LoB, IT leaders, and executives. Module 1: Course Introduction Course Introduction Module 2: Information Technology for Business Transformation Role of IT in an organization for business transformation Brief history of IT Legacy approach to IT What drives customers to move from traditional infrastructure to the cloud Module 3: Cloud Computing Define cloud computing Key characteristics of cloud technology The cloud business model Key security practices within the cloud Module 4: Business Value of the Cloud The customer value proposition Identify who is using cloud computing Industry trends Customer examples Module 5: The Cloud Value Framework Introduction to the Cloud Value Framework Cost Savings Staff Productivity Operational Resilience Business Agility Module 6: Business Value Activity Business Value Activity Additional course details: Nexus Humans AWS Cloud Essentials for Business Leaders training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AWS Cloud Essentials for Business Leaders course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

AWS Cloud Essentials for Business Leaders
Delivered OnlineFlexible Dates
Price on Enquiry

Millennial Onboarding

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is intended for managers and supervisors engaged in working with the Millennial generation workforce. Overview Upon successful completion of this course, participants will be able to define onboarding, discuss the characteristics of Millennials, and develop action plans for working with them. In this course, participants will learn to build an onboarding process that recognizes the challenges and strengths of the Millennial workforce. Getting Started Workshop Objectives Action Plan Purpose of Onboarding Start Up Costs Employee Anxiety Employee Turnover Realistic Expectations Practical Illustration Introduction Why Onboarding? Importance of Onboarding Making Employees Feel Welcome First Day Checklist Practical Illustration Millennials and Onboarding Who are Millennials? How Do Millennials Differ from Other Workers? Investiture Socialization ? Let Them Be Themselves! Informal Rather than Formal Onboarding Processes Practical Illustration Onboarding Checklist Pre-Arrival Arrival First Day First Week First Month Practical Illustration Engaging the Millennial Employee Create an Informal Program Engage Employees One-on-one The Role of Human Resources The Role of Managers Practical Illustration Following Up with the Millennial Employee Initial Check-In ? One-on-one Following up ? Regular, Informal Follow Ups Setting Schedules ? Millennials and Work-Life Mentoring and the Millennial Practical Illustration Setting Expectations with the Millennial Employee Define Requirements ? Provide Specific Instructions Identify Opportunities for Improvement and Growth Set Verbal Expectations Put It in Writing Practical Illustration Mentoring the Millennial Be Hands-On and Involved Serial Mentoring Be a Mentor, Not an Authority Figure Focus Millennia?s Exploratory Drive on Work Practical Illustration Assigning Work to the Millennial Employee Provide Clear Structure and Guidelines Provide Specific Benchmarks Set Boundaries and Provide Reality Checks Practical Illustration Providing Feedback Millennials Thrive on Feedback! Characteristics of Quality Feedback Informal Feedback Formal Feedback Practical Illustration Wrapping Up Words From the Wise Additional course details: Nexus Humans Millennial Onboarding training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Millennial Onboarding course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Millennial Onboarding
Delivered OnlineFlexible Dates
Price on Enquiry

Customer Service (Second Edition)

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is intended for customer service professionals with any level of experience who want to expand their knowledge, improve their skill set, and increase the understanding of customer benefits. Overview In this course, you will develop the skills to coach for results. You will:  Describe the benefits of customer service, identify internal customers, identify the benefits to you of giving good customer service, and identify how you can help your company to excel. Identify the major trends in customer service today and the combination of criteria required for customer satisfaction. Identify the benefits of bringing respect, emotional support, and a personal touch to customer interactions, and apply the personal touch to customer interactions. Identify the six categories of face-to-face communication, the critical success factors in face-to-face communication, and the benefits of actively listening to your customers. Identify remote customer service communication channels and apply remote customer service best practices. Identify guidelines for handling unreasonable customers, explore ways to handle angry customers, and identify guidelines for handling unhelpful colleagues. Take action to increase the loyalty of the customers you serve. You will also identify guidelines for dealing with moments of truth, identify the benefits of customer complaints, identify the steps in the service recovery process, and analyze the moments of truth in a real-life situation. As a customer service representative, you are expected to handle customer interactions in the best way possible. The expectations of both your company and your customers hinge on your ability to provide the right service in the right way. In this course, you will explore the background and techniques of customer interactions.Providing quality customer care ensures that every single contact with your company is a positive experience. Customers can range from external consumers to internal employees in other departments. Knowing how to provide the same level of service to all customers will enrich your time spent at work by establishing positive business relationships. Recognizing crucial points throughout customer interactions increases your ability to solve problems and offer affirmative solutions. Applying this knowledge to trends in service and consumer desires allows you to contribute to the company?s bottom line and make a customer?s life a little easier. Understanding Customer Service Describe Customer Service Benefits Recognize the Importance of Internal Customer Service Identify How Customer Service Benefits You Excel with Customer Service Identifying How Customers Define the Success of Your Company Recognize Trends in Customer Service Identify Criteria for Customer Satisfaction Increasing Customer Satisfaction Identify Characteristics of the Personal Touch Create Lasting Positive Impressions on Your Customers Providing Face-to-Face Customer Service Identify Categories of Face-to-Face Contact Understand the Critical Success Factors in Face-to-Face Customer Service Identify the Characteristics of Active Listening Providing Remote Customer Service Identify Remote Customer Service Communication Channels Apply Remote Customer Service Best Practices Engaging Difficult Customers Serve Difficult Customers Manage Angry Customers Deal with Difficult or Unhelpful Colleagues Increasing Customer Loyalty Optimize Moments of Truth Recognize the Value of Customer Complaints Identify the Stages of the Service Recovery Process

Customer Service (Second Edition)
Delivered OnlineFlexible Dates
Price on Enquiry

R Programming for Data Science (v1.0)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for students who want to learn the R programming language, particularly students who want to leverage R for data analysis and data science tasks in their organization. The course is also designed for students with an interest in applying statistics to real-world problems. A typical student in this course should have several years of experience with computing technology, along with a proficiency in at least one other programming language. Overview In this course, you will use R to perform common data science tasks.You will: Set up an R development environment and execute simple code. Perform operations on atomic data types in R, including characters, numbers, and logicals. Perform operations on data structures in R, including vectors, lists, and data frames. Write conditional statements and loops. Structure code for reuse with functions and packages. Manage data by loading and saving datasets, manipulating data frames, and more. Analyze data through exploratory analysis, statistical analysis, and more. Create and format data visualizations using base R and ggplot2. Create simple statistical models from data. In our data-driven world, organizations need the right tools to extract valuable insights from that data. The R programming language is one of the tools at the forefront of data science. Its robust set of packages and statistical functions makes it a powerful choice for analyzing data, manipulating data, performing statistical tests on data, and creating predictive models from data. Likewise, R is notable for its strong data visualization tools, enabling you to create high-quality graphs and plots that are incredibly customizable. This course will teach you the fundamentals of programming in R to get you started. It will also teach you how to use R to perform common data science tasks and achieve data-driven results for the business. Lesson 1: Setting Up R and Executing Simple Code Topic A: Set Up the R Development Environment Topic B: Write R Statements Lesson 2: Processing Atomic Data Types Topic A: Process Characters Topic B: Process Numbers Topic C: Process Logicals Lesson 3: Processing Data Structures Topic A: Process Vectors Topic B: Process Factors Topic C: Process Data Frames Topic D: Subset Data Structures Lesson 4: Writing Conditional Statements and Loops Topic A: Write Conditional Statements Topic B: Write Loops Lesson 5: Structuring Code for Reuse Topic A: Define and Call Functions Topic B: Apply Loop Functions Topic C: Manage R Packages Lesson 6: Managing Data in R Topic A: Load Data Topic B: Save Data Topic C: Manipulate Data Frames Using Base R Topic D: Manipulate Data Frames Using dplyr Topic E: Handle Dates and Times Lesson 7: Analyzing Data in R Topic A: Examine Data Topic B: Explore the Underlying Distribution of Data Topic C: Identify Missing Values Lesson 8: Visualizing Data in R Topic A: Plot Data Using Base R Functions Topic B: Plot Data Using ggplot2 Topic C: Format Plots in ggplot2 Topic D: Create Combination Plots Lesson 9: Modeling Data in R Topic A: Create Statistical Models in R Topic B: Create Machine Learning Models in R

R Programming for Data Science (v1.0)
Delivered OnlineFlexible Dates
Price on Enquiry

NIST Cyber Security Professional (NCSP) Practitioner

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course assumes the student has successfully taken and passed the NCSF Foundation 2.0 course based on the NIST Cybersecurity Framework version 1.1, release April 2018. Following the course introduction, the course provides an introduction to the intersection between digital transformation and cybersecurity, which is followed by an overview of the threat landscape. Following an approach to the implementation of cybersecurity controls, the course delves into an organizational approach to cybersecurity that starts governance, management, and a supportive culture,Finally, the course provides additional guidance for the cybersecurity practitioner to determine the current state, the desired state, and a plan to close the gap - and to do this over and over again to inculcate it into organizational DNA. Overview This course looks at the impact of digital transformation on cybersecurity risks, an understanding of the threat landscape, and an approach to the application of cybersecurity controls. It provides guidance for students on the best approach to design and build a comprehensive cybersecurity program. Executives are keenly aware of the risks but have limited knowledge on the best way to mitigate these risks. This course also enables our executives to answer the critical question - Are we secure? The class includes lectures, informative supplemental reference materials, quizzes, exercises, and formal examination. The exercises are a critical aspect of the course; do not skip them. Outcomes and benefits from this class is a practical approach that students can use to build and maintain comprehensive cybersecurity and cyber-risk management programs. This course is targeted at IT and Cybersecurity professionals looking to become certified on how to operationalize the NIST Cybersecurity Framework (NCSP) across an enterprise and its supply chain. Digital Transformation Explores what the Practitioner needs to know about the relationship between digital transformation and cybersecurity Explain how to determine the impact of cybersecurity on DX. Explain the relationships between culture and digital transformation from the perspective of a practitioner. Explain the delivery of value to stakeholders in a DX & cybersecurity environment. Illustrate the interdependent relationship between cybersecurity and DX. Threat Landscape The Practitioner needs to understand what threat actors do and their capabilities. Compare the evolving attack type impact to the threat environment. Apply knowledge about the threat landscape to maintain a readiness to respond. Develop a risk profile based on business impact analysis Establish the relationship between awareness and training in the continual improvement of cybersecurity posture. Develop and treat training & awareness as a critical aspect of deterrence Use knowledge about the threat landscape as a predicate to the adoption and adaptation of your cybersecurity posture. The Controls This chapter provides a sample set of controls based on an informative reference. Understand the purpose goals & objectives for each control. Characterize & explain the informative reference controls Discover how to apply the controls in an organizational context. Adopt & Adapt Adopt is a decision about governance; adapt is the set of management decisions that result from the decision to adopt. Distinguish Adopt, Adapt, Management & Governance. Develop an approach to adoption & adaptation. Distinguish & demonstrate the impact of organizational culture on developing cybersecurity as a capability. Develop an assessment approach to define current state. Adaptive Way of Working Threat actors are agile and highly adaptive. The cybersecurity Practitioner must develop the same capabilities Break down what constitutes an adaptive approach. Characterize & apply the need for crossfunctional teams. Recognize and prioritize the first steps (get started). Demonstrate & establish cybersecurity phases. Break down the impact of the flows. Rapid Adoption & Rapid Adaptation FastTrack FastTrack? is an approach to allow organizations to learn to adapt to an evolving threat landscape rapidly. Approach: Establish what it takes to adopt CS. Determine how that impacts management adaptation of CS. Determine how that impacts the capability to assess. CS Capability: Determine the gap between existing & needed capabilities. Establish what must be developed. Develop appropriate risk management profile. Discover how cybersecurity impacts people, practice & technology impacts organization. Differentiate CIS Implementation groups. Determine appropriate implementation group & approach. Develop appropriate phase approaches. CIIS Practice Cybersecurity is an ongoing game of cat and mouse. Organizations must learn how to inculcate cybersecurity improvement into their DNA. Break down & develop mechanisms for ongoing cybersecurity improvement that includes developing a learning organization. Illustrate an improvement plan based on the NIST 7-Step Approach. Illustrate an improvement plan based on the Improvement GPS Demonstrate understanding of Cybersecurity Maturity Model Certification Break down the balancing loop & how it fits into the escalation archetype Use the Fast Track? (improvement & implementation) cycles.

NIST Cyber Security Professional (NCSP) Practitioner
Delivered OnlineFlexible Dates
Price on Enquiry

AWS Developing Serverless Solutions on AWS

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Developers who have some familiarity with serverless and experience with development in the AWS Cloud Overview In this course, you will learn to: Apply event-driven best practices to a serverless application design using appropriate AWS services Identify the challenges and trade-offs of transitioning to serverless development, and make recommendations that suit your development organization and environment Build serverless applications using patterns that connect AWS managed services together, and account for service characteristics, including service quotas, available integrations, invocation model, error handling, and event source payload Compare and contrast available options for writing infrastructure as code, including AWS CloudFormation, AWS Amplify, AWS Serverless Application Model (AWS SAM), and AWS Cloud Development Kit (AWS CDK) Apply best practices to writing Lambda functions inclusive of error handling, logging, environment re-use, using layers, statelessness, idempotency, and configuring concurrency and memory Apply best practices for building observability and monitoring into your serverless application Apply security best practices to serverless applications Identify key scaling considerations in a serverless application, and match each consideration to the methods, tools, or best practices to manage it Use AWS SAM, AWS CDK, and AWS developer tools to configure a CI/CD workflow, and automate deployment of a serverless application Create and actively maintain a list of serverless resources that will assist in your ongoing serverless development and engagement with the serverless community This course gives developers exposure to and practice with best practices for building serverless applications using AWS Lambda and other services in the AWS serverless platform. You will use AWS frameworks to deploy a serverless application in hands-on labs that progress from simpler to more complex topics. You will use AWS documentation throughout the course to develop authentic methods for learning and problem-solving beyond the classroom. Introduction Introduction to the application you will build Access to course resources (Student Guide, Lab Guide, and Online Course Supplement) Thinking Serverless Best practices for building modern serverless applications Event-driven design AWS services that support event-driven serverless applications API-Driven Development and Synchronous Event Sources Characteristics of standard request/response API-based web applications How Amazon API Gateway fits into serverless applications Try-it-out exercise: Set up an HTTP API endpoint integrated with a Lambda function High-level comparison of API types (REST/HTTP, WebSocket, GraphQL) Introduction to Authentication, Authorization, and Access Control Authentication vs. Authorization Options for authenticating to APIs using API Gateway Amazon Cognito in serverless applications Amazon Cognito user pools vs. federated identities Serverless Deployment Frameworks Overview of imperative vs. declarative programming for infrastructure as code Comparison of CloudFormation, AWS CDK, Amplify, and AWS SAM frameworks Features of AWS SAM and the AWS SAM CLI for local emulation and testing Using Amazon EventBridge and Amazon SNS to Decouple Components Development considerations when using asynchronous event sources Features and use cases of Amazon EventBridge Try-it-out exercise: Build a custom EventBridge bus and rule Comparison of use cases for Amazon Simple Notification Service (Amazon SNS) vs. EventBridge Try-it-out exercise: Configure an Amazon SNS topic with filtering Event-Driven Development Using Queues and Streams Development considerations when using polling event sources to trigger Lambda functions Distinctions between queues and streams as event sources for Lambda Selecting appropriate configurations when using Amazon Simple Queue Service (Amazon SQS) or Amazon Kinesis Data Streams as an event source for Lambda Try-it-out exercise: Configure an Amazon SQS queue with a dead-letter queue as a Lambda event source Writing Good Lambda Functions How the Lambda lifecycle influences your function code Best practices for your Lambda functions Configuring a function Function code, versions and aliases Try-it-out exercise: Configure and test a Lambda function Lambda error handling Handling partial failures with queues and streams Step Functions for Orchestration AWS Step Functions in serverless architectures Try-it-out exercise: Step Functions states The callback pattern Standard vs. Express Workflows Step Functions direct integrations Try-it-out exercise: Troubleshooting a Standard Step Functions workflow Observability and Monitoring The three pillars of observability Amazon CloudWatch Logs and Logs Insights Writing effective log files Try-it-out exercise: Interpreting logs Using AWS X-Ray for observability Try-it-out exercise: Enable X-Ray and interpret X-Ray traces CloudWatch metrics and embedded metrics format Try-it-out exercise: Metrics and alarms Try-it-out exercise: ServiceLens Serverless Application Security Security best practices for serverless applications Applying security at all layers API Gateway and application security Lambda and application security Protecting data in your serverless data stores Auditing and traceability Handling Scale in Serverless Applications Scaling considerations for serverless applications Using API Gateway to manage scale Lambda concurrency scaling How different event sources scale with Lambda Automating the Deployment Pipeline The importance of CI/CD in serverless applications Tools in a serverless pipeline AWS SAM features for serverless deployments Best practices for automation Course wrap-up Additional course details: Nexus Humans AWS Developing Serverless Solutions on AWS training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AWS Developing Serverless Solutions on AWS course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

AWS Developing Serverless Solutions on AWS
Delivered OnlineFlexible Dates
Price on Enquiry

55320 Programming with HTML, CSS, and JavaScript

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for students new to computer programming or experienced programmers who are new to client-side web development. Overview After completing this course, you will be able to: Describe the technologies involved in web development. Create HTML pages with links and images. Explain the benefits of CSS. Style HTML pages with CSS. Explain the concepts of objects, methods, and properties. Work with JavaScript variables. Create their own custom functions in JavaScript. Write flow control logic in JavaScript. Write JavaScript code that listens for and handles events, such as mouse clicks and page loads. Create forms with HTML and validate them with JavaScript. Use regular expressions in JavaScript for advanced form validation. This course is intended for IT professionals interested in becoming client-side web developers. who need to get a jump start on all three technologies. The course includes more than 30 exercises, providing a rapid hands-on introduction to the three major client-side languages: HTML, CSS, and JavaScript. Students should be prepared to cover a lot of ground quickly.This material updates and replaces course Microsoft course 20480 which was previously published under the title Programming in HTML5 with JavaScript and CSS3. Module 1: A Quick Overview of Web Development HTML is Part of a Team Client-side Programming Server-side Programming Web Development Technologies Module 2: Introduction to HTML Exercise: A Simple HTML Document Getting Started with a Simple HTML Document HTML Elements, Attributes, and Comments The HTML Skeleton Viewing the Page Source Special Characters HTML Elements and Special Characters History of HTML The lang Attribute Module 3: Paragraphs, Headings, and Text Paragraphs Heading Levels Breaks and Horizontal Rules Exercise: Paragraphs, Headings, and Text The div Tag Creating an HTML Page Quoted Text Preformatted Text Inline Semantic Elements Exercise: Adding Inline Elements Module 4: HTML Links Links Introduction Text Links Absolute vs. Relative Paths Targeting New Tabs Email Links Exercise: Adding Links Lorem Ipsum The title Attribute Linking to a Specific Location on the Page Targeting a Specific Location on the Page Module 5: HTML Images Inserting Images Image Links Adding Images to the Document Exercise: Adding Images to the Page Providing Alternative Images Module 6: HTML Lists Unordered Lists Ordered Lists Definition Lists Exercise: Creating Lists Module 7: Crash Course in CSS Benefits of Cascading Style Sheets CSS Rules Selectors Combinators Precedence of Selectors How Browsers Style Pages CSS Resets CSS Normalizers External Stylesheets, Embedded Stylesheets, and Inline Styles Exercise: Creating an External Stylesheet Exercise: Creating an Embedded Stylesheet Exercise: Adding Inline Styles div and span Exercise: Styling div and span Media Types Units of Measurement Inheritance Module 8: CSS Fonts font-family @font-face font-size font-style font-variant font-weight line-height font shorthand Exercise: Styling Fonts Module 9: Color and Opacity About Color and Opacity Color and Opacity Values Color Opacity Exercise: Adding Color and Opacity to Text Module 10: CSS Text letter-spacing text-align text-decoration text-indent text-shadow text-transform white-space word-break word-spacing Exercise: Text Properties Module 11: JavaScript Basics JavaScript vs. EcmaScript The HTML DOM JavaScript Syntax Accessing Elements Where Is JavaScript Code Written? JavaScript Objects, Methods, and Properties Exercise: Alerts, Writing, and Changing Background Color Module 12: Variables, Arrays, and Operators JavaScript Variables A Loosely Typed Language Google Chrome DevTools Storing User-Entered Data Exercise: Using Variables Constants Arrays Exercise: Working with Arrays Associative Arrays Playing with Array Methods JavaScript Operators The Modulus Operator Playing with Operators The Default Operator Exercise: Working with Operators Module 13: JavaScript Functions Global Objects and Functions Exercise: Working with Global Functions User-defined Functions Exercise: Writing a JavaScript Function Returning Values from Functions Module 14: Built-In JavaScript Objects Strings Math Date Helper Functions Exercise: Returning the Day of the Week as a String Module 15: Conditionals and Loops Conditionals Short-circuiting Switch / Case Ternary Operator Truthy and Falsy Exercise: Conditional Processing Loops while and do?while Loops for Loops break and continue Exercise: Working with Loops Array: forEach() Module 16: Event Handlers and Listeners On-event Handlers Exercise: Using On-event Handlers The addEventListener() Method Anonymous Functions Capturing Key Events Exercise: Adding Event Listeners Benefits of Event Listeners Timers Typing Test Module 17: The HTML Document Object Model CSS Selectors The innerHTML Property Nodes, NodeLists, and HTMLCollections Accessing Element Nodes Exercise: Accessing Elements Dot Notation and Square Bracket Notation Accessing Elements Hierarchically Exercise: Working with Hierarchical Elements Accessing Attributes Creating New Nodes Focusing on a Field Shopping List Application Exercise: Logging Exercise: Adding EventListeners Exercise: Adding Items to the List Exercise: Dynamically Adding Remove Buttons to the List Items Exercise: Removing List Items Exercise: Preventing Duplicates and Zero-length Product Names Manipulating Tables Module 18: HTML Forms How HTML Forms Work The form Element Form Elements Buttons Exercise: Creating a Registration Form Checkboxes Radio Buttons Exercise: Adding Checkboxes and Radio Buttons Fieldsets Select Menus Textareas Exercise: Adding a Select Menu and a Textarea HTML Forms and CSS Module 19: JavaScript Form Validation Server-side Form Validation HTML Form Validation Accessing Form Data Form Validation with JavaScript Exercise: Checking the Validity of the Email and URL Fields Checking Validity on Input and Submit Events Adding Error Messages Validating Textareas Validating Checkboxes Validating Radio Buttons Validating Select Menus Exercise: Validating the Ice Cream Order Form Giving the User a Chance Module 20: Regular Expressions Getting Started Regular Expression Syntax Backreferences Form Validation with Regular Expressions Cleaning Up Form Entries Exercise: Cleaning Up Form Entries A Slightly More Complex Example

55320 Programming with HTML, CSS, and JavaScript
Delivered OnlineFlexible Dates
Price on Enquiry

MS Publisher Course

4.6(12)

By PCWorkshops

Publisher Courses. With MS Publisher, combine text and photos illustrations to make professional newsletters publications. At our MS Publisher course, learn how to.

MS Publisher Course
Delivered Online & In-PersonFlexible Dates
FREE