• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

5653 Computing & IT courses in Cowdenbeath delivered Online

Professional Certificate Course in Understanding International Business System in London 2024

4.9(261)

By Metropolitan School of Business & Management UK

The Professional Certificate Course in Understanding International Business Systems provides a comprehensive understanding of the global business landscape. The course covers topics such as the International Monetary System, New Trade Theory, and how the World Bank, IMF, and current monetary environment impact business operations. Additionally, students will learn about Strategic Trade Policy, Culture and International Business in Emerging Markets, International Ethics, and Social Responsibility. The course also delves into Corporate Social Responsibility (CSR), Stakeholder Analysis, and Ethics Monitoring and Enforcement. Upon completion of the course, students will have the knowledge and skills required to navigate the complexities of international business and make informed decisions to enhance their organization's global competitiveness. The Professional Certificate Course in Understanding International Business Systems covers a range of topics such as International Monetary System, Trade Theory, and Ethics & Social Responsibility in International Business. The course equips students with the knowledge and skills required to navigate the complexities of global business operations and make informed decisions to enhance their organization's global competitiveness.After the successful completion of the course, you will be able to learn about the following, What is International Monetary System New trade theory How the World Bank, the IMF, and the Current Monetary Environment Affect Business. Strategic Trade Policy. Culture and International Business in Emerging Markets International Ethics and Social Responsibility Corporate social responsibility (CSR) Stakeholder Analysis Ethics Monitoring and Enforcement The Professional Certificate Course in Understanding International Business Systems provides a comprehensive understanding of the global business landscape. The course covers topics such as the International Monetary System, New Trade Theory, and how the World Bank, IMF, and current monetary environment impact business operations. Additionally, students will learn about Strategic Trade Policy, Culture and International Business in Emerging Markets, International Ethics, and Social Responsibility. The course also delves into Corporate Social Responsibility (CSR), Stakeholder Analysis, and Ethics Monitoring and Enforcement. Upon completion of the course, students will have the knowledge and skills required to navigate the complexities of international business and make informed decisions to enhance their organization's global competitiveness. VIDEO - Course Structure and Assessment Guidelines Watch this video to gain further insight. Navigating the MSBM Study Portal Watch this video to gain further insight. Interacting with Lectures/Learning Components Watch this video to gain further insight. Understanding International Business System The course provide an overview of how international business works. Understanding International Business System Put your knowledge to the test with this quiz. Read each question carefully and choose the response that you feel is correct. All MSBM courses are accredited by the relevant partners and awarding bodies. Please refer to MSBM accreditation in about us for more details. There are no strict entry requirements for this course. Work experience will be added advantage to understanding the content of the course. The certificate is designed to enhance the learner's knowledge in the field. This certificate is for everyone eager to know more and get updated on current ideas in their respective field. We recommend this certificate for the following audience. Business Professionals International Trade Experts Government Officials Academics and Researchers Students pursuing business degrees Entrepreneurs Multinational Corporation Executives Investors Non-profit Organization Managers Diplomats and Foreign Service Officers. Average Completion Time 2 Weeks Accreditation 3 CPD Hours Level Advanced Start Time Anytime 100% Online Study online with ease. Unlimited Access 24/7 unlimited access with pre-recorded lectures. Low Fees Our fees are low and easy to pay online.

Professional Certificate Course in Understanding International Business System in London 2024
Delivered Online On Demand14 days
£33

Learn to code with HTML5 - Beginner to Expert Level

By Xpert Learning

About Course Master the fundamental building block of the web and learn to create beautiful and functional websites with HTML5. In this comprehensive course, you will learn: The basics of HTML syntax, including elements, attributes, and tags. How to structure your web pages using HTML5 semantic elements. How to add images, videos, and other multimedia content to your websites. How to create interactive web pages using forms and buttons. How to style your websites using CSS. This course is perfect for beginners with no prior experience in HTML. However, if you have some programming experience, you will be able to learn the material more quickly. You will learn from an experienced web developer who will teach you the concepts and skills you need to succeed. By the end of this course, you will be able to: Create and structure web pages using HTML5. Add multimedia content and interactive elements to your websites. Style your websites using CSS. Build a portfolio of real-world websites Throughout the course, you will work on a variety of hands-on projects to build your skills and create a portfolio of real-world websites. Join a supportive community of learners You will have access to a dedicated student forum where you can ask questions and get help from the instructor and other students. Enroll today and start your journey to becoming a web developer! Bonus: Get access to the instructor's personal collection of HTML5 resources. Why learn HTML5? HTML5 is the latest version of HTML, and it is the most widely used markup language in the world. It is used to create the structure and content of web pages. HTML5 is a powerful tool that can be used to create a variety of websites, from simple static pages to complex dynamic applications. Here are some of the benefits of learning HTML5: HTML5 is easy to learn, even for beginners. HTML5 is a versatile language that can be used to create a variety of websites. HTML5 is in high demand, and there are many job opportunities for HTML5 developers. HTML5 is a valuable skill to have, even if you are not planning to become a web developer. So what are you waiting for? Enroll in this course today and start your journey to becoming a web developer! What Will You Learn? Become a modern and confident HTML developer, no prior knowledge needed! Learn to quickly apply CHatGPT AI skills for your website development Design and build a stunning real-world project for your portfolio from scratch A web design framework with easy-to-use rules and guidelines to design eye-catching websites How to make websites work on every possible mobile device (responsive design) You will learn quickly prompt engineering skills to make real-world websites Learn to Publish your website on production servers using FTP app Course Content Getting Started Introduction to Getting Started Course Curriculum How to Get Pre - Requisites Getting Started on Windows, Linux or Mac How to Ask Great Questions FAQ's HTML Setting Up Local Environment Introduction to HTML Choosing Code Editor Installing Code Editor (Sublime Text) Overview of a Webpage Structure of a Full HTML Webpage First Hello World Webpage Summary HTML Basic Introduction Heading Tags Paragraph Formatting Text List Items Unordered List Items Ordered Classes IDs Comments Summary HTML Intermediate Introduction Images Forms Form Actions Br Tag Marquee Text Area Tables Links Navbar - Menu HTML Entities Div Tag Google Maps Summary HTML Advanced Introduction HTML5 Audio HTML5 Video Progress Bar Drag and Drop Canvas Iframes Input Types Input Attributes YouTube Video Linking Creating Responsive Page Summary HTML Expert Introduction Registration Form Login Form About Us Form Contact Us Form Footer Form Integrate All Together Coding Exercise Solution for Coding Exercise Summary Publish Your Website Live Introduction Installing Free FTP Solution (FileZilla) Setting Up FTP (File Transfer Protocol) Publish Website to Hosting Server Summary HTML Website Project Introduction Challenge - HTML 5 Clock Face with Numbers Project Overview Conclusion on Project Summary A course by Sekhar Metla IT Industry Expert RequirementsNo coding or design experience necessary for this courseAny computer works - Windows, Linux or macOSYou don't need to buy any software - we will use the best free code editor in the world

Learn to code with HTML5 - Beginner to Expert Level
Delivered Online On Demand5 hours 41 minutes
£9.99

Advanced Diploma in Cyber Security at QLS Level 7

4.7(47)

By Academy for Health and Fitness

Are you concerned about the increasing threats to cyber security? Do you want to have a comprehensive understanding of cyber law and its application in the digital world? Our Cyber Security Training course is your answer! In this course, we dive deep into the world of cyber law, exploring everything from the fundamentals to the latest developments in the field. With a focus on theoretical knowledge and academic analysis, this course equips you with the tools you need to navigate the complex world of cyber security. You'll gain a comprehensive understanding of cyber law, cyber ethics, online gambling, cyber crime, cyber security, trust in cyberspace, computer threats, cyber terrorism, fraud, and jurisdiction. Our team of experienced educators will guide you through the course, ensuring that you gain a solid understanding of the key concepts and theories in cyber law. You'll engage with a range of resources, including academic texts, case studies, and online forums, allowing you to develop a nuanced understanding of the subject matter. Courses Are Included in this Cyber Security Training Bundle Course 01: Cyber Security Law at QLS Level 7 With our Cyber Security Law Training course, you'll be equipped with the knowledge you need to tackle the challenges of the digital world. So why wait? Enrol now and join the growing community of cyber law experts! This Advanced Diploma in Cyber Security Law at QLS Level 7 course is endorsed by The Quality Licence Scheme and accredited by CPD QS (with 180 CPD points) to make your skill development & career progression more accessible than ever! Learning Outcomes of Cyber Security Training: After completing the course, you can expect to: Understand the fundamentals of cyber law and its application in the digital world. Analyse cyber ethics and its relationship with online gambling. Evaluate cybercrime and its impact on cyber security and trust in cyberspace. Identify different computer threats and assess the risks posed by cybercriminals, organised crimes, hacktivists, and nation-states. Discuss the concept of cyberterrorism and the evolving threat of the deep web. Apply jurisdiction principles to cyber law cases. Why Prefer This Cyber Security Training Course? Opportunity to earn certificate a certificate endorsed by the Quality Licence Scheme & another accredited by CPD QS after completing the Cyber Security Law Training course Get a free student ID card with Cyber Security Get instant access to this Cyber Security course. Learn cyber security essentials from anywhere in the world Cyber Security course is affordable and simple to understand Cyber Security is entirely online, interactive lesson with voiceover audio Lifetime access to the Cyber Security course materials Cyber Security course comes with 24/7 tutor support ****Course Curriculum of Cyber Security Training**** Here is the curriculum breakdown of this Cyber Security Law Training- 01 Ethical Hacking 02 Professional Hacking 03 Penetration Testing I 04 Penetration Testing II 05 Web Application Security 06 Security Leadership 07 Security Sentinel 08 Vulnerability Assessment Assessment Process of Cyber Security Training You have to complete the assignment questions given at the end of the course and score a minimum of 60% to pass each exam.Our expert trainers will assess your assignment and give you feedback after you submit the assignment. After passing the Advanced Diploma in Cyber Security Law at QLS Level 7 course exam, you will be able to request a certificate at an additional cost that has been endorsed by the Quality Licence Scheme. CPD 180 CPD hours / points Accredited by CPD Quality Standards Who is this course for? This Cyber Security Training is ideal for: Professionals seeking to enhance their understanding of cyber law and its implications in the digital world. Law students and legal practitioners interested in exploring the field of cyber law. Business owners and managers are concerned about cyber security and privacy in their organisations. Anyone interested in gaining a comprehensive understanding of cyber law. Career path Cyber Security Training Cybersecurity Lawyer Information Security Manager Data Protection Officer Cybercrime Analyst Digital Forensic Analyst Risk Analyst Please note that these salary ranges are approximate and may vary depending on qualifications, experience, and other factors. Certificates Certificate of completion Digital certificate - £10 Advanced Diploma in Cyber Security Law at QLS Level 7 Hard copy certificate - £139 Show off Your New Skills with a Certificate of Completion After successfully completing the Advanced Diploma in Cyber Security Law at QLS Level 7, you can order an original hardcopy certificate of achievement endorsed by the Quality Licence Scheme. The certificate will be home-delivered, with a pricing scheme of - £139 inside the UK £10 (including postal fees) for International Delivery Certificate Accredited by CPD QS £29 for Printed Hard Copy Certificate inside the UK £39 for Printed Hard Copy Certificate outside the UK (International Delivery)

Advanced Diploma in Cyber Security at QLS Level 7
Delivered Online On Demand4 weeks
£12

Electrical Engineering - Portable Appliance Testing Course

5.0(14)

By Training Express

Portable Appliance Testing course teaches you everything on the Electrical Engineering topic thoroughly from scratch so you can claim a certificate of achievement for free to showcase your achievement in professional life. This Portable Appliance Testing course is a comprehensive, instructor-guided course, designed to provide a detailed understanding of the nature of the related sector and your key roles within it. To become successful in your Portable Appliance Testing profession, you must have a specific set of skills Portable Appliance Testing to succeed in today's competitive world. In this in-depth training course, you will develop the most in-demand skills Portable Appliance Testing to kickstart your career, as well as upgrade your existing knowledge & skills. The training Portable Appliance Testing materials of this course are available online for you to learn at your own pace and fast-track your career with ease. PAT - Portable Appliance Testing Training Course This Course is designed to help you familiarise with testing technical appliances, training you to be able to know how to assess and minimise risks, carry out inspections and understand the safety procedures that need to be in place when using portable appliances at work. Key Features of the Portable Appliance Testing Course : Instant e-certificate and hard copy dispatch by next working day Fully online, interactive course with audio voiceover Developed by qualified professionals in the field Self-paced learning and laptop, tablet, smartphone-friendly 24/7 Learning Assistance Discounts on bulk purchases *** Additional Gifts *** Free Life Coaching Course Portable Appliance Testing Course offers Premium Course Free PDF Certificate Free Life coaching Course Instant Access *** (Offer Ends Soon) *** Course Curriculum of PAT - Portable Appliance Testing Training Course The detailed curriculum outline of our PAT - Portable Appliance Testing Training Course is as follows: Module 01: Introduction to PAT Module 02: Relevant Statutory Provisions for PAT Module 03: Risk Assessment Module 04: Reducing and Controlling Risks Module 05: Electrical Units and Appliance Classification Module 06: Initial Visual Examination Module 07: Instruments for Testing and Equipment Inspection Module 08: Electrical Installation Testing Module 09: Safety Precautions in Electrical Testing Module 10: Reporting and Record-keeping Accreditation All of our courses, including this course, are fully accredited, providing you with up-to-date skills and knowledge and helping you to become more competent and effective in your chosen field. Certification Once you've successfully completed your course, you will immediately be sent a digital certificate. Also, you can have your printed certificate delivered by post (shipping cost £3.99). Our certifications have no expiry dates, although we do recommend that you renew them every 12 months. Assessment At the end of the course, there will be an online assessment, which you will need to pass to complete the course. Answers are marked instantly and automatically, allowing you to know straight away whether you have passed. If you haven't, there's no limit on the number of times you can take the final exam. All this is included in the one-time fee you paid for the course itself. CPD 10 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Anyone with a knack for learning new skills can take this course. While this comprehensive training is popular for preparing people for job opportunities in the relevant fields, it also helps to advance your career for promotions. Disclaimer: This course will help you strengthen your theoretical knowledge of the subject matter, but please be advised completing this course alone will not allow you to work professionally. Requirements Learners do not require any prior qualifications to enrol on this course. Certificates Certificate of completion Digital certificate - Included Certificate of completion Hard copy certificate - Included You will get the hard copy certificates for Free! The delivery charge of the hard copy certificate inside the UK is £3.99 each.

Electrical Engineering - Portable Appliance Testing Course
Delivered Online On Demand1 hour
£12

Full Stack Development encompasses the complete creation of end-to-end development of both the front-end and back-end of an application. LSET Bridges The Gap Between Education And Employment

FULL STACK JAVA
Delivered in Internationally or OnlineFlexible Dates
Price on Enquiry

DevOps Project - 2022: CI/CD with Jenkins Ansible Kubernetes

By Packt

If you know various DevOps tools such as Git, Jenkins, Maven, Ansible, Docker, and Kubernetes, and are not sure how they work collaboratively, then this course is for you. Learn to create a simple DevOps project using Git as the local version control system, GitHub as the distributor version control system, Jenkins as the continuous integration tool, Maven as a build tool, Ansible as configuration management and deployment tool, Docker for containerization, Kubernetes as a container management tool, and all this environment is set up on AWS.

DevOps Project - 2022: CI/CD with Jenkins Ansible Kubernetes
Delivered Online On Demand6 hours 14 minutes
£37.99

Business Intelligence Analyst Course

By The Teachers Training

Unlock the potential of business intelligence with our specialized Business Intelligence Analyst Course. Learn to analyze data, extract insights, and drive strategic decisions to optimize business performance. Gain practical skills in data visualization, reporting, and predictive analytics using industry-leading tools and techniques. Whether you're a business professional or aspiring analyst, this course equips you with the expertise to excel in leveraging data for business intelligence.

Business Intelligence Analyst Course
Delivered Online On Demand6 hours
£15

SonicWALL Network Security Administrator For Sonic OS 7 - SNSA v7 - NA

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Security professionals, System engineers, channel partners, service partners, and end users with at least one year of experience in implementing IT security technologies (Network, Applications, and Systems). Overview This course will enable students to configure, monitor, manage, and optimize the SonicWall Network Security firewall appliances running the new SonicOS 7 to effectively defend against limitless network and cyberthreats and implement SonicWall Boundless Cybersecurity safeguards for seamless protection. Upon completion of the course, students will be able to configure the SonicWall firewall for Secure and Remote Connectivity, Network Optimization, and Advanced Threat Protection. The SonicWall Network Security Administrator (SNSA) for SonicOS 7.0curriculum provides students the required background, knowledge, and hands-on experience to begin designing, implementing, and troubleshooting SonicWall Network Security products. SonicOS 7 is SonicWall?s brand new and most advanced security operating system and is at the core of its latest physical and virtual firewalls, including models from the TZ, NSv, NSa and NSsp Series. SonicOS 7.0 features advanced security, simplified policy management, and critical networking and management capabilities for distributed enterprises and small- to medium-sized businesses with SD-branch support. Course Outline Setting up Basic Firewall Components Unified Threat Management Secure Access Deep Packet Inspection for SSL (DPI-SSL) Content Filtering Services Application Control Scalability and Reliability SD-WAN High Availability Troubleshooting Tools

SonicWALL Network Security Administrator For Sonic OS 7 - SNSA v7 - NA
Delivered OnlineFlexible Dates
Price on Enquiry

NetApp ONTAP 9 Cluster Administration and Data Protection Bundle

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Network Engineers Channel Partners System Engineers Overview By the end of this course, you will be able to: Describe how ONTAP 9 fits into NetApp?s Cloud and Data Fabric strategy Identify supported ONTAP platforms Define ONTAP cluster components Create a cluster Manage ONTAP administrators Configure and manage storage resources Configure and manage networking resources Describe a Storage Virtual Machine?s (SVM?s) role in NetApp?s storage architecture Create and configure an SVM Create and manage FlexVols Implement storage efficiency features Create protocol servers within an SVM Upgrade and revert ONTAP patches and releases Describe the levels on which ONTAP protects data Describe the ONTAP 9 data protection features Understand the various data mirroring relationships available with ONTAP 9 Configure and operate SnapMirror and SnapVault data replication Demonstrate Storage Virtual Machine data protection Explain the components and configuration involved with SyncMirror and MetroCluster Describe NDMP protocol operation, configuration and management Pre/Post Assessment The ONTAP 9.0 Cluster Administration and Data Protection combo course uses lecture and hands-on exercises to teach basic administration and configuration of a cluster as well as the core backup and restore technologies found in ONTAP 9. The hands-on labs allow you to practice working with ONTAP features and manage your storage and network resources using the cluster shell and OnCommand System Manager. You will learn how to implement and manage SnapMirror, SnapVault, and SnapLock technology which are used to replicate and restore mission-critical data in the enterprise. The course also surveys real-world scenarios and use cases to teach you when to use each of the NetApp protection solutions. Backup and restore operations are taught using the command line and OnCommand System Manager.Includes: ONTAP commands for software versions 8.3.x to 9.0 The ONTAP 9.0 Cluster Administration and Data Protection combo course uses lecture and hands-on exercises to teach basic administration and configuration of a cluster as well as the core backup and restore technologies found in ONTAP 9. The hands-on labs allow you to practice working with ONTAP features and manage your storage and network resources using the cluster shell and OnCommand System Manager. You will learn how to implement and manage SnapMirror, SnapVault, and SnapLock technology which are used to replicate and restore mission-critical data in the enterprise. The course also surveys real-world scenarios and use cases to teach you when to use each of the NetApp protection solutions. Backup and restore operations are taught using the command line and OnCommand System Manager. Includes: ONTAP commands for software versions 8.3.x to 9.0

NetApp ONTAP 9 Cluster Administration and Data Protection Bundle
Delivered OnlineFlexible Dates
Price on Enquiry

Symantec Endpoint Protection 14.X - Configure And Protect

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is for Network, IT security, and systems administration professionals in a Security Operations position who are tasked with configuring optimum security settings for endpoints protected by Symantec Endpoint Protection 14. Overview At the completion of the course, you will be able to: Protect against Network Attacks and Enforcing Corporate Policies using the Firewall Policy. Blocking Threats with Intrusion Prevention. Introducing File-Based Threats. Preventing Attacks with SEP. Layered Security. Securing Windows Clients. Secure Mac Clients. Secure Linux Clients. Controlling Application and File Access. Restricting Device Access for Windows and Mac Clients. Hardening Clients with System Lockdown. Customizing Policies based on Location. Managing Security Exceptions. This course is designed for the network, IT security, and systems administration professionals in a Security Operations position who are tasked with configuring optimum security settings for endpoints protected by Symantec Endpoint Protection 14. Introduction Course environment Lab environment Introducing Network Threats Describing how Symantec Endpoint Protection protects each layer of the network stack Discovering the tools and methods used by attackers Describing the stages of an attack Protecting against Network Attacks and Enforcing Corporate Policies using the Firewall Policy Preventing network attacks Examining Firewall Policy elements Evaluating built-in rules Creating custom firewall rules Enforcing corporate security policy with firewall rules Blocking network attacks using protection and stealth settings Configuring advanced firewall feature Blocking Threats with Intrusion Prevention Introducing Intrusion Prevention technologies Configuring the Intrusion Prevention policy Managing custom signatures Monitoring Intrusion Prevention events Introducing File-Based Threats Describing threat types Discovering how attackers disguise their malicious applications Describing threat vectors Describing Advanced Persistent Threats and a typical attack scenario Following security best practices to reduce risks Preventing Attacks with SEP Layered Security Virus and Spyware protection needs and solutions Describing how Symantec Endpoint Protection protects each layer of the network stack Examining file reputation scoring Describing how SEP protects against zero-day threats and threats downloaded through files and email Describing how endpoints are protected with the Intelligent Threat Cloud Service Describing how the emulator executes a file in a sandbox and the machine learning engine?s role and function Securing Windows Clients Platform and Virus and Spyware Protection policy overview Tailoring scans to meet an environment?s needs Ensuring real-time protection for clients Detecting and remediating risks in downloaded files Identifying zero-day and unknown threats Preventing email from downloading malware Configuring advanced options Monitoring virus and spyware activity Securing Mac Clients Touring the SEP for Mac client Securing Mac clients Monitoring Mac clients Securing Linux Clients Navigating the Linux client Tailoring Virus and Spyware settings for Linux clients Monitoring Linux clients Providing Granular Control with Host Integrity Ensuring client compliance with Host Integrity Configuring Host Integrity Troubleshooting Host Integrity Monitoring Host Integrity Controlling Application and File Access Describing Application Control and concepts Creating application rulesets to restrict how applications run Monitoring Application Control events Restricting Device Access for Windows and Mac Clients Describing Device Control features and concepts for Windows and Mac clients Enforcing access to hardware using Device Control Discovering hardware access policy violations with reports, logs, and notifications Hardening Clients with System Lockdown What is System Lockdown? Determining to use System Lockdown in Whitelist or Blacklist mode Creating whitelists for blacklists Protecting clients by testing and Implementing System Lockdown Customizing Policies based on Location Creating locations to ensure the appropriate level of security when logging on remotely Determining the criteria and order of assessment before assigning policies Assigning policies to locations Monitoring locations on the SEPM and SEP client Managing Security Exceptions Creating file and folder exceptions for different scan types Describing the automatic exclusion created during installation Managing Windows and Mac exclusions Monitoring security exceptions

Symantec Endpoint Protection 14.X - Configure And Protect
Delivered OnlineFlexible Dates
Price on Enquiry