• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

2676 Code courses in Sheffield delivered Online

Beginners' Guide to Practical Quantum Computing with IBM Qiskit

By Packt

This course is intended for beginner-level individuals who are fascinated about quantum computing and want to learn more about it. It uses Jupyter notebook and IBM Qiskit tool to execute your learning into the actual computation.

Beginners' Guide to Practical Quantum Computing with IBM Qiskit
Delivered Online On Demand5 hours 19 minutes
£80.99

Introduction to SQLite Databases for Python Programming

By Packt

Learn to use SQLite databases with Python through a hands-on approach

Introduction to SQLite Databases for Python Programming
Delivered Online On Demand1 hour 27 minutes
£137.99

Logging, Monitoring and Observability in Google Cloud

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This class is intended for the following customer job roles: Cloud architects, administrators, and SysOps personnel Cloud developers and DevOps personnel Overview This course teaches participants the following skills: Plan and implement a well-architected logging and monitoring infrastructure Define Service Level Indicators (SLIs) and Service Level Objectives (SLOs) Create effective monitoring dashboards and alerts Monitor, troubleshoot, and improve Google Cloud infrastructure Analyze and export Google Cloud audit logs Find production code defects, identify bottlenecks, and improve performance Optimize monitoring costs This course teaches you techniques for monitoring, troubleshooting, and improving infrastructure and application performance in Google Cloud. Guided by the principles of Site Reliability Engineering (SRE), and using a combination of presentations, demos, hands-on labs, and real-world case studies, attendees gain experience with full-stack monitoring, real-time log management and analysis, debugging code in production, tracing application performance bottlenecks, and profiling CPU and memory usage. Introduction to Google Cloud Monitoring Tools Understand the purpose and capabilities of Google Cloud operations-focused components: Logging, Monitoring, Error Reporting, and Service Monitoring Understand the purpose and capabilities of Google Cloud application performance management focused components: Debugger, Trace, and Profiler Avoiding Customer Pain Construct a monitoring base on the four golden signals: latency, traffic, errors, and saturation Measure customer pain with SLIs Define critical performance measures Create and use SLOs and SLAs Achieve developer and operation harmony with error budgets Alerting Policies Develop alerting strategies Define alerting policies Add notification channels Identify types of alerts and common uses for each Construct and alert on resource groups Manage alerting policies programmatically Monitoring Critical Systems Choose best practice monitoring project architectures Differentiate Cloud IAM roles for monitoring Use the default dashboards appropriately Build custom dashboards to show resource consumption and application load Define uptime checks to track aliveness and latency Configuring Google Cloud Services for Observability Integrate logging and monitoring agents into Compute Engine VMs and images Enable and utilize Kubernetes Monitoring Extend and clarify Kubernetes monitoring with Prometheus Expose custom metrics through code, and with the help of OpenCensus Advanced Logging and Analysis Identify and choose among resource tagging approaches Define log sinks (inclusion filters) and exclusion filters Create metrics based on logs Define custom metrics Link application errors to Logging using Error Reporting Export logs to BigQuery Monitoring Network Security and Audit Logs Collect and analyze VPC Flow logs and Firewall Rules logs Enable and monitor Packet Mirroring Explain the capabilities of Network Intelligence Center Use Admin Activity audit logs to track changes to the configuration or metadata of resources Use Data Access audit logs to track accesses or changes to user-provided resource data Use System Event audit logs to track GCP administrative actions Managing Incidents Define incident management roles and communication channels Mitigate incident impact Troubleshoot root causes Resolve incidents Document incidents in a post-mortem process Investigating Application Performance Issues Debug production code to correct code defects Trace latency through layers of service interaction to eliminate performance bottlenecks Profile and identify resource-intensive functions in an application Optimizing the Costs of Monitoring Analyze resource utilization cust for monitoring related components within Google Cloud Implement best practices for controlling the cost of monitoring within Google Cloud

Logging, Monitoring and Observability in Google Cloud
Delivered OnlineFlexible Dates
Price on Enquiry

Cyber Security

By Compete High

Overview   With the ever-increasing demand for Cyber Security in personal & professional settings, this online training aims at educating, nurturing, and upskilling individuals to stay ahead of the curve - whatever their level of expertise in Cyber Security may be.   Learning about Cyber Security or keeping up to date on it can be confusing at times, and maybe even daunting! But that's not the case with this course from Compete High. We understand the different requirements coming with a wide variety of demographics looking to get skilled in Cyber Security. That's why we've developed this online training in a way that caters to learners with different goals in mind. The course materials are prepared with consultation from the experts of this field and all the information on Cyber Security is kept up to date on a regular basis so that learners don't get left behind on the current trends/updates.   The self-paced online learning methodology by compete high in this Cyber Security course helps you learn whenever or however you wish, keeping in mind the busy schedule or possible inconveniences that come with physical classes. The easy-to-grasp, bite-sized lessons are proven to be most effective in memorising and learning the lessons by heart. On top of that, you have the opportunity to receive a certificate after successfully completing the course!   Instead of searching for hours, enrol right away on this Cyber Security course from Compete High and accelerate your career in the right path with expert-outlined lessons and a guarantee of success in the long run.   Who is this course for?   While we refrain from discouraging anyone wanting to do this Cyber Security course or impose any sort of restrictions on doing this online training, people meeting any of the following criteria will benefit the most from it: Anyone looking for the basics of Cyber Security, Jobseekers in the relevant domains, Anyone with a ground knowledge/intermediate expertise in Cyber Security, Anyone looking for a certificate of completion on doing an online training on this topic, Students of Cyber Security, or anyone with an academic knowledge gap to bridge, Anyone with a general interest/curiosity   Career Path   This Cyber Security course smoothens the way up your career ladder with all the relevant information, skills, and online certificate of achievements. After successfully completing the course, you can expect to move one significant step closer to achieving your professional goals - whether it's securing that job you desire, getting the promotion you deserve, or setting up that business of your dreams.  Course Curriculum Module 01 - Introduction to Cyber Security Introduction to Cyber Security 00:00 Module 02 - Attacks, Techniques & Motivations Attacks, Techniques & Motivations 00:00 Module 03 - Exploitation Exploitation 00:00 Module 04 - Malicious code Malicious code 00:00 Module 05 - Legal, Ethical & Professional Practice Legal, Ethical & Professional Practice 00:00 Module 06 - Present day tools Present day tools 00:00

Cyber Security
Delivered Online On Demand6 hours
£25

VMware vRealize Automation: Orchestration and Extensibility [v8.6]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Experienced VMware administrators, automation and orchestration specialists, system integrators, and private cloud and public cloud administrators Overview By the end of the course, you should be able to meet the following objectives: Describe the features and benefits of integrating vRealize Orchestrator and vRealize Automation Describe the role of vRealize Orchestrator workflows and content elements in automation Use the vRealize Orchestrator client to access and navigate the vRealize Orchestrator platform Use the vRealize Orchestrator client to import and run vRealize Orchestrator library workflows Design, develop, and run custom reusable vRealize Orchestrator workflows Integrate vRealize Automation with vRealize Orchestrator to deliver custom IT services Use the vRealize Automation event broker service to trigger specific vRealize Orchestrator workflows or ABX Actions Leverage the event broker to extend IaaS (Infrastructure-as-a-Service) machine lifecycle processes Use XaaS to extend vRealize Automation into other enterprise systems Use VMware APIs to run vRealize Orchestrator workflows Use the vSphere Client Code Capture feature During this five-day course, you focus on using VMware vRealize© Orchestrator? to extend the functionality of VMware vRealize© Automation?. You learn how to provide XaaS (Anything as a Service) and implement Machine Lifecycle Extensibility using the VMware vRealize© Automation? Event Broker. You also learn how to create vRealize Orchestrator workflows and vRealize Automation ABX actions. You learn about various features, including basic scripting implementation along with logic processing to implement a variety of functions to use in your environment. This course teaches implementing debugging, loops, conditions, and user interactions in vRealize Orchestrator. The course introduces the new vRealize Orchestrator HTML 5 interface, along with API calls and REST functions, to give you the groundwork to implement a variety of plugins and scripts. This course is designed to give you the tools to craft custom solutions in the product. Course Introduction Introductions and course logistics Course objectives Overview of vRealize Automation and vRealize Orchestrator Define the purpose of vRealize Automation Outline the purpose of vRealize Orchestrator Describe the main components of vRealize Automation Describe the main components of vRealize Orchestrator Creating Schema Elements Invoking JavaScript from a vRealize Orchestrator workflow Invoking a vRealize Orchestrator Workflow from a vRealize Orchestrator workflow Invoking an action from a vRealize Orchestrator workflow Using vRealize Orchestrator workflows both synchronously and asynchronously Working with Variables Defining inputs, outputs, and variables in vRealize Orchestrator workflows Binding variables in vRealize Orchestrator workflows Wrapping vRealize Orchestrator workflows Using APIs and the API Explorer Creating actions in vRealize Orchestrator Using vRealize Orchestrator input forms Handling user interactions in vRealize Orchestrator Handling Exceptions, Logging, and Debugging Handling exceptions in vRealize Orchestrator workflows Using logs in vRealize Orchestrator workflows Debugging vRealize Orchestrator workflows Branching and Looping Using branching in vRealize Orchestrator workflows Using loops in vRealize Orchestrator workflows Working with Assets Using configuration elements in vRealize Orchestrator Using resources in vRealize Orchestrator Using packages in vRealize Orchestrator Working with Plug-Ins Downloading and installing Plug-Ins Using the SSH plug-In in vRealize Orchestrator Using the REST plug-in in vRealize Orchestrator Using the vRealize Automation plug-in in vRealize Orchestrator Using the PowerShell plug-in in vRealize Orchestrator Working with Versioning and Git Using versioning in vRealize Orchestrator Using Git in vRealize Orchestrator Scheduling, Sleeping, and Waiting Using scheduling in vRealize Orchestrator Using sleeping in vRealize Orchestrator Using waiting in vRealize Orchestrator Introduction to vRealize Automation Extensibility Introduction to extensibility Using ABX actions Using Python Using Nodejs Using PowerShell Using vRealize Automation Lifecycle Extending vRealize Automation with Event Broker Overview of vRealize Automation Event Broker Creating vRealize Automation subscriptions Data exchange between vRealize Automation and vRealize Orchestrator Using ABX Actions Overview of Action Based Extensibility (ABX) Comparison of vRealize Orchestrator and ABX Creating ABX Actions scripts, REST, and flows Using Day-2 Actions in vRealize Automation Describe the visualization capabilities of NSX Network Detection and Response Working with Services, Custom Resources, and Resource Actions Using vRealize Orchestrator as a content source in vRealize Automation Creating custom resources in vRealize Automation Creating resource actions in vRealize Automation Using Day-2 Actions in vRealize Automation Using vSphere Client Code Capture Enabling vSphere Client code capture Using vSphere Client code capture to capture code in vRO, Javascript, PowerCLI or other languages. Using the captured code in vRealize Orchestrator workflows or actions.

VMware vRealize Automation: Orchestration and Extensibility [v8.6]
Delivered OnlineFlexible Dates
Price on Enquiry

Good Practice: Ethics for the caring professions

By Human Givens College

Essential knowledge – for counsellors, psychotherapists and anyone else working with distressed people This new online course is designed to stimulate deeper thinking about the ethical dilemmas and professional difficulties you may encounter when working with people suffering emotional distress. It gives you sound principles to remember and realistic guidelines to follow whenever difficult ethical situations arise. Whilst primarily designed for counsellors and psychotherapists, anyone interested in thinking more clearly about ethical matters, including social workers, occupational therapists, mental health workers, medical and legal professionals, can complete the course. The guidance offered is not a list of static ‘rules’ but a framework of interlocking ideas and insights through which it is possible to create clear and reasonable codes of professional conduct to help ensure we act ethically. The discussions between the tutors raise important considerations – deriving from real case histories – and give you valuable insights about the evolution of ethical behaviour and the nature of ethical problems today. Why this course is needed We live in a world that, despite technological progress, seems to have lost its moral compass. It should go without saying that all therapists should act ethically with their patients, but some don’t. The consequences of this can prove distressing and even damaging for the client involved, and, for the practitioner, can mean anything from public censure, suspension from practice, or full-scale striking off. So, in addition to following guidelines and a code of practice, therapists need to develop a sound inner intuition of what the right thing to do is in any particular circumstance. However, developing this intuition requires us to escape from our mental pigeon-holes so that we can develop richer patterns of thought, through consideration of a wide range of potential pitfalls and ethical dilemmas, to draw upon and return to throughout our professional lives. What will you explore The foundations of ethics Ethics and human nature The difference between ethics, morals and the law The reason ethical dilemmas arise The HG Code of Ethics Examples of modern ethical quandaries Living in a ‘victim culture’ that’s obsessed with blaming Why ethical behaviour is socially conditioned The importance of learning from mistakes Why relying on systems can inhibit flexibility of thought and behaviour Why organisational rigidity drives bureaucracies to behave unethically What determines our individual nature, character and mental health The assumptions we make that get in the way of ethical decision making Typical case histories dealt with by the HGI’s Registration and Professional Standards Committee Ethics: needs and wants Ethics, tribalism and political correctness Our inbuilt range of moral emotional responses The illusion of shared perceptions Three ethical safeguards arising from the Human Givens approach The importance of spare capacity when helping others The danger of patients putting therapists on a pedestal Why technology, using artificial intelligence, raises ethical questions Accredited CPD certificate and much more… Counts towards a Diploma By taking this course, you could be on your way to completing Part 1 of the Human Givens Diploma – a flexible, part-time psychotherapy course which will deepen your psychological knowledge and increase your ability to help people effectively and quickly.  Course Programme Part 1The nature of ethical problems Part 2Ethical Foundations Part 3Practitioners Code of Conduct Part 4Case Histories What's included? 24 Videos 30 Quizzes Life-long access CPD Certificate Course format This online ethics course is delivered by four distinguished Fellows of the HGI, Sue Saunders, Ian Thomson, Ivan Tyrrell and Denise Winn – their discussions provide much food for thought and draw on real case histories that have come before the HGI’s Registration and Professional Standards Committee. As with all our online courses, you are required to answer multiple-choice questions designed to add to your knowledge and deepen your understanding: an enjoyable, thought-provoking part of the learning process. Once you have completed the course, you will receive an Accredited CPD certificate, which counts towards the Human Givens Diploma. This course has been independently assessed by the internationally recognised CPD Standards Office for 6 hours of CPD training. Meet your tutors Ivan Tyrrell Ivan Tyrrell worked for many years as a psychotherapist and now spends most of his time lecturing and writing. Read more Sue Saunders Sue has worked in training, coaching and psychotherapy for over 30 years. She also has extensive experience in the corporate world. Read more Ian Thompson Ian Thomson is the former deputy chair of the HGI Registration and Professional Standards Committee Read more Denise Winn Denise is a journalist, editor and author specialising in psychology – who has also practised as a human givens therapist since 2000. Read more

Good Practice: Ethics for the caring professions
Delivered Online On Demand6 hours
£127.20

MERN eCommerce from Scratch

By Packt

Welcome to our hands-on video course, where you will learn technologies, such as React, Redux Toolkit, Express, and MongoDB. You will learn how to structure your code using Redux Toolkit, implement powerful features with React, and create a robust backend using Express and MongoDB. An understanding of modern JS fundamentals and the basics of React will be an add-on.

MERN eCommerce from Scratch
Delivered Online On Demand13 hours 7 minutes
£93.99

Learn Java from Scratch - A Beginner's Guide

By Packt

Learn Java programming step-by-step with 250 core features and 200+ code examples, perfect for absolute beginners. This hands-on course covers everything from basic concepts to advanced topics such as functional programming and exception handling using JShell and Eclipse as an IDE. Gain a solid foundation in Java and kickstart your programming career.

Learn Java from Scratch - A Beginner's Guide
Delivered Online On Demand33 hours 29 minutes
£134.99

1-1 Shamanic Yoga Session

4.9(30)

By School of Shamanism

A personalized 1-1 session of Shamanic Yoga is a session of healing of the body according to the blockages and limitations that appear to your eyes, which give us the key to solve in a marvellous way what your soul needs. This yoga is suitable to everyone and it is very easy and creative.  SHAMANIC YOGA  is ancestral, ancient, pre-vedic. It has the element of ecstasy, of a non ordinary state of consciousness, where you work with nature, animals, yantras, mantras, mudras, rituals, initiations in the imaginal forest, in the natural code, non the social code. Merceliade says that this yoga is the oldest form of yoga and we find it in various traditions: Hindu tradition (Shaktism), Himalayan (Naropa, Milarepa etc), South America (Andean yoga), Siberia, Mongolia, Japan (Yamabushi), Taoism, Alchemy. Shamanic yoga is not an exercise of the body, but a mystical, esoteric and initiatory healing practice that is distinguished by two characteristics; the first is ecstasy, the ability to communicate with the invisible, regaining the state of non-duality that is the typical goal of the yogin’s path. Ecstasy is not achieved by hypnosis or drugs or external means, but by means of instruments such as the drum, the breath and is not the trance of the medium. The shaman does not speak through the voice of spirits but draws knowledge directly from them. The second characteristic is the ability to bring back through narration or storytelling what has been grasped in the invisible worlds, during the shamanic journey, and to convince the matter to transform into reality what is told. Through narrative I awaken forces that then I can bring to life.  Giada’s teachings are also combined with INTEGRAL OR PURNA YOGA founded by Sri Aurobindo “Purna’ means ‘complete’ and Purna Yoga distils and integrates the vast aspects of yoga into an invaluable set of tools for transformation and healing. It offers more than just physical exercise. Purna Yoga teaches the mind, body and emotions how to be at home with the spirit. Purna Yoga is the art of loving oneself by living from the heart. By attending to our classes, workshops, 1 to 1 sessions and retreats you agree to our TERMS AND CONDITIONS Payment  Bookings are non-refundable.  Disclaimer  By booking a class or workshop or retreat or 1-1 session -online or any other venues – with us, you release Giada Gaslini, Invisible Caims and any business partners working with Invisible Caims from any liability arising out of any personal injuries, emotional or physical release, death, expectations of results, theft in the venue or damages that may happen to people and objects while attending. We recommend that you consult your GP regarding the suitability of undertaking an exercise programme, if the class you are booking includes it like with yoga or similar, and following all the safety instructions required before beginning to exercise. When participating in an exercise, there is the possibility of sustaining a physical injury. If you engage in this exercise programme, you agree that you do so at your own risk, are voluntarily participating in these activities and assume all risk of injury to yourself. You acknowledge that coaching, shamanic healing and counselling are not to be used as a substitute for psychotherapy, psychoanalysis, mental health care, or other professional advice by legal, medical or other professionals. Our sessions are aimed at inner research, problem solving and personal growth, they do not replace the work of doctors and psychotherapists because they do not consider, treat or aim to solve pathologies and symptoms that are strictly medical. All contracts subject to and governed by the law according to my current insurance.   Added element of the disclaimer If the class happens in any venue and you are causing any damage to the property, you are taking responsibility of your actions. It is down to the individual to take personal responsibility when participating in physical activity and when entering a space that is used and shared by other parties. Invisible Caims does not take any responsibility about possible risks that may arise but can only advise and enforce guidelines and legal requirements as defined by the Scottish Government and local authorities.   

1-1 Shamanic Yoga Session
Delivered in Edinburgh or UK Wide or OnlineFlexible Dates
£45

General Data Protection Regulation Foundation (GDPR F)

By Packt

Implement and manage a compliance framework to protect personal data using GDPR Foundation training.

General Data Protection Regulation Foundation (GDPR F)
Delivered Online On Demand5 hours 47 minutes
£93.99