• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

5595 Computing & IT courses in Greenock delivered Online

DevOps Project - 2022: CI/CD with Jenkins Ansible Kubernetes

By Packt

If you know various DevOps tools such as Git, Jenkins, Maven, Ansible, Docker, and Kubernetes, and are not sure how they work collaboratively, then this course is for you. Learn to create a simple DevOps project using Git as the local version control system, GitHub as the distributor version control system, Jenkins as the continuous integration tool, Maven as a build tool, Ansible as configuration management and deployment tool, Docker for containerization, Kubernetes as a container management tool, and all this environment is set up on AWS.

DevOps Project - 2022: CI/CD with Jenkins Ansible Kubernetes
Delivered Online On Demand6 hours 14 minutes
£37.99

Introduction to Investment Banking

5.0(2)

By Online Training Academy

Unlock the fundamentals of Investment Banking with our comprehensive course designed for aspiring financial professionals. Whether you're starting your career or aiming to deepen your understanding, our "Introduction to Investment Banking" covers everything you need to know. Key Features: CPD Certified Free Certificate Developed by Specialist Lifetime Access This course on Introduction to Investment Banking covers essential topics that equip learners with a deep understanding of the field. Students will gain knowledge about the principles and practices of investment banking, including its ethical considerations. They will explore the intricate structures and various aspects involved in investment banking operations. A focus on valuation methods will enable learners to assess the worth of companies and assets accurately. They will also delve into the processes of Initial Public Offerings (IPOs), understanding how companies go public. Additionally, the course covers Merger and Acquisition (M&A) transactions, providing insights into how companies merge or acquire others. Lastly, learners will study Leveraged Buyouts (LBOs), learning about the financial strategies used to acquire companies using borrowed funds. Overall, this curriculum offers a comprehensive foundation in investment banking, preparing students for roles where financial expertise and strategic insights are crucial. Course Curriculum Module 01: Introduction to Investment Banking Module 02: Ethics in Investment Banking Module 03: Structure and Sides of Investment Banking Module 04: Valuation Methods in Investment Banking Module 05: Initial Public Offering (IPO) Module 06: Merger and Acquisition (M&A) Module 07: Leveraged Buyout (LBO) Learning Outcomes: Understand fundamentals of Investment Banking operations and terminology. Apply ethical principles in various scenarios within Investment Banking. Analyse the structure and functions of Investment Banking organisations. Utilise different valuation methods for financial analysis in Investment Banking. Evaluate processes involved in Initial Public Offerings (IPOs) in Investment Banking. Examine strategies and implications of Mergers and Acquisitions (M&A) in finance. CPD 10 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Graduates seeking finance sector careers. Professionals in finance exploring Investment Banking. Individuals interested in financial markets and corporate finance. Business students focusing on finance and banking. Anyone aiming for roles in financial advisory services. Career path Investment Analyst Corporate Finance Manager Mergers and Acquisitions Specialist Financial Advisor Equity Research Analyst Certificates Digital certificate Digital certificate - Included Certificate of Completion Digital certificate - Included Will be downloadable when all lectures have been completed.

Introduction to Investment Banking
Delivered Online On Demand2 minutes
£12

Financial Investigator Training

5.0(2)

By Online Training Academy

Are you fascinated by the world of financial crime? Ready to delve into the intricate art of investigation? Our comprehensive Financial Investigator Training is designed just for you! Key Features: CPD Certified Free Certificate Developed by Specialist Lifetime Access In the Financial Investigator Training, learners will explore the fundamentals of financial investigation, including the various types and characteristics of financial crimes. They will gain a comprehensive understanding of the laws and regulations aimed at combating financial fraud. Through practical exercises, they will develop skills in collecting, preserving, and analyzing evidence crucial to financial investigations. Additionally, participants will learn about the role and responsibilities of a financial investigator, along with the essential components of a financial crime response plan. This curriculum equips learners with the knowledge and techniques necessary to identify, investigate, and respond to various forms of financial crime effectively. Course Curriculum Module 01: Introduction to Financial Investigation Module 02: Introduction to Financial Investigator Module 03: Categories of Financial Crimes Module 04: Characteristics of Financial Crimes Module 05: Laws against Financial Fraud Module 06: Collecting, Preserving and Gathering Evidence Module 07: Financial Crime Response Plan Learning Outcomes: Identify key concepts in financial investigation techniques for introductory understanding. Recognize the role and responsibilities of a financial investigator proficiently. Classify various types of financial crimes accurately and categorically. Describe essential characteristics distinguishing different forms of financial crimes concisely. Summarise relevant laws concerning financial fraud adequately and comprehensively. Demonstrate proficiency in collecting, preserving, and handling evidentiary material meticulously. CPD 10 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Law enforcement professionals seeking financial investigation specialisation. Financial analysts aiming to broaden their skill set in investigation techniques. Compliance officers wishing to enhance their understanding of financial crimes. Legal professionals interested in gaining expertise in financial fraud investigation. Anyone looking to pursue a career in financial crime investigation. Career path Financial Investigator Fraud Analyst Compliance Officer Intelligence Analyst Law Enforcement Officer Forensic Accountant Certificates Digital certificate Digital certificate - Included Certificate of Completion Digital certificate - Included Will be downloadable when all lectures have been completed.

Financial Investigator Training
Delivered Online On Demand2 minutes
£12

Business Intelligence Analyst Course

By The Teachers Training

Unlock the potential of business intelligence with our specialized Business Intelligence Analyst Course. Learn to analyze data, extract insights, and drive strategic decisions to optimize business performance. Gain practical skills in data visualization, reporting, and predictive analytics using industry-leading tools and techniques. Whether you're a business professional or aspiring analyst, this course equips you with the expertise to excel in leveraging data for business intelligence.

Business Intelligence Analyst Course
Delivered Online On Demand6 hours
£15

Advanced AutoLISP Programming

By Course Cloud

The comprehensive Advanced AutoLISP Programming has been designed by industry experts to provide learners with everything they need to enhance their skills and knowledge in their chosen area of study. Enrol on the Advanced AutoLISP Programming today, and learn from the very best the industry has to offer! This best selling Advanced AutoLISP Programming has been developed by industry professionals and has already been completed by hundreds of satisfied students. This in-depth Advanced AutoLISP Programming is suitable for anyone who wants to build their professional skill set and improve their expert knowledge. The Advanced AutoLISP Programming is CPD-accredited, so you can be confident you're completing a quality training course will boost your CV and enhance your career potential. The Advanced AutoLISP Programming is made up of several information-packed modules which break down each topic into bite-sized chunks to ensure you understand and retain everything you learn. After successfully completing the Advanced AutoLISP Programming , you will be awarded a certificate of completion as proof of your new skills. If you are looking to pursue a new career and want to build your professional skills to excel in your chosen field, the certificate of completion from the Advanced AutoLISP Programming will help you stand out from the crowd. You can also validate your certification on our website. We know that you are busy and that time is precious, so we have designed the Advanced AutoLISP Programming to be completed at your own pace, whether that's part-time or full-time. Get full course access upon registration and access the course materials from anywhere in the world, at any time, from any internet-enabled device.  Our experienced tutors are here to support you through the entire learning process and answer any queries you may have via email.

Advanced AutoLISP Programming
Delivered Online On Demand
£25

Full Stack Development encompasses the complete creation of end-to-end development of both the front-end and back-end of an application. LSET Bridges The Gap Between Education And Employment

FULL STACK JAVA
Delivered in Internationally or OnlineFlexible Dates
Price on Enquiry

MS InfoPath 2013: Working With InfoPath 2013 in SharePoint

4.3(43)

By John Academy

Description Do you want to know how to be an expert in creating forms and gathering data? Are you looking for the easiest method regarding MS InfoPath? You may look at the MS InfoPath 2013: Working With InfoPath 2013 in SharePoint course. This course may assist you to get an approximate idea about this field. The MS InfoPath 2013: Working With InfoPath 2013 in SharePoint course incorporates some basic ideas regarding the use of MS InfoPath. It enables to know you how to make forms and collect data by using Infopath within SharePoint. It also teaches you how to edit, create, and publish a form along with a strong command of associated properties. It gives you a proper direction to use Infopath forms by utilizing WebParts. After the end of the course, you will be an expert on some advanced functions of InfoPath that enables you to modify data source and work with it vivid sections. Assessment: This course does not involve any MCQ test. Students need to answer assignment questions to complete the course, the answers will be in the form of written work in pdf or word. Students can write the answers in their own time. Once the answers are submitted, the instructor will check and assess the work. Certification: After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. Who is this Course for? MS InfoPath 2013: Working With InfoPath 2013 in SharePoint is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. Requirements Our MS InfoPath 2013: Working With InfoPath 2013 in SharePoint is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Introduction Introduction FREE 00:01:00 SharePoint and InfoPath Using InfoPath with SharePoint 00:04:00 Exploring the InfoPath Interface 00:03:00 Creating a Form from an Existing List 00:03:00 Creating a new List and Form within InfoPath 00:04:00 Creating a Form in InfoPath Using SharePoint Designer 00:02:00 Editing a Form 00:02:00 Publishing a Form 00:02:00 Restoring the Default SharePoint Form 00:03:00 Working with List Forms Components of the InfoPath Form 00:03:00 Formatting Text in the Form 00:03:00 Spellcheck Your Form 00:02:00 Inserting or Deleting a Table 00:02:00 Formatting a Table 00:03:00 Add or Remove Rows and Columns 00:02:00 Merging and Splitting Cells 00:04:00 Adding or Removing a Field 00:03:00 Resizing and Formatting a Field 00:03:00 Changing Field Controls 00:05:00 Inserting a Section 00:03:00 Inserting a Picture 00:02:00 Inserting a Button 00:05:00 Inserting a Calculated Value 00:04:00 Setting Default Field Values 00:05:00 Creating a Validation Rule 00:04:00 Creating a Formatting Rule 00:04:00 Creating an Action Rule 00:05:00 Modifying or Deleting a Rule 00:02:00 Setting the Form Load Rules 00:03:00 Advanced InfoPath Features Exploring the Fields Pane 00:02:00 Creating a Data Source 00:05:00 Modifying and Deleting a Data Source 00:02:00 Creating a View 00:03:00 Configuring View Settings 00:03:00 Creating Cascading Columns 00:06:00 Understanding Repeating Sections and Tables 00:03:00 Creating a Repeating Section 00:04:00 Using Repeating Tables to Add Multiple Items to a List 00:08:00 Using Repeating Sections to Show Existings Records 00:07:00 Hiding a Form Section Based on Field Values 00:05:00 InfoPath Forms Within SharePoint Using the InfoPath Form WebPart on a SP Page 00:04:00 Using Form Views for Different Groups 00:06:00 InfoPath Form WebPart and WebPart Filters 00:08:00 Conclusion Course Recap 00:01:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

MS InfoPath 2013: Working With InfoPath 2013 in SharePoint
Delivered Online On Demand2 hours 38 minutes
£25

SonicWALL Network Security Administrator For Sonic OS 7 - SNSA v7 - NA

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Security professionals, System engineers, channel partners, service partners, and end users with at least one year of experience in implementing IT security technologies (Network, Applications, and Systems). Overview This course will enable students to configure, monitor, manage, and optimize the SonicWall Network Security firewall appliances running the new SonicOS 7 to effectively defend against limitless network and cyberthreats and implement SonicWall Boundless Cybersecurity safeguards for seamless protection. Upon completion of the course, students will be able to configure the SonicWall firewall for Secure and Remote Connectivity, Network Optimization, and Advanced Threat Protection. The SonicWall Network Security Administrator (SNSA) for SonicOS 7.0curriculum provides students the required background, knowledge, and hands-on experience to begin designing, implementing, and troubleshooting SonicWall Network Security products. SonicOS 7 is SonicWall?s brand new and most advanced security operating system and is at the core of its latest physical and virtual firewalls, including models from the TZ, NSv, NSa and NSsp Series. SonicOS 7.0 features advanced security, simplified policy management, and critical networking and management capabilities for distributed enterprises and small- to medium-sized businesses with SD-branch support. Course Outline Setting up Basic Firewall Components Unified Threat Management Secure Access Deep Packet Inspection for SSL (DPI-SSL) Content Filtering Services Application Control Scalability and Reliability SD-WAN High Availability Troubleshooting Tools

SonicWALL Network Security Administrator For Sonic OS 7 - SNSA v7 - NA
Delivered OnlineFlexible Dates
Price on Enquiry

NetApp ONTAP 9 Cluster Administration and Data Protection Bundle

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Network Engineers Channel Partners System Engineers Overview By the end of this course, you will be able to: Describe how ONTAP 9 fits into NetApp?s Cloud and Data Fabric strategy Identify supported ONTAP platforms Define ONTAP cluster components Create a cluster Manage ONTAP administrators Configure and manage storage resources Configure and manage networking resources Describe a Storage Virtual Machine?s (SVM?s) role in NetApp?s storage architecture Create and configure an SVM Create and manage FlexVols Implement storage efficiency features Create protocol servers within an SVM Upgrade and revert ONTAP patches and releases Describe the levels on which ONTAP protects data Describe the ONTAP 9 data protection features Understand the various data mirroring relationships available with ONTAP 9 Configure and operate SnapMirror and SnapVault data replication Demonstrate Storage Virtual Machine data protection Explain the components and configuration involved with SyncMirror and MetroCluster Describe NDMP protocol operation, configuration and management Pre/Post Assessment The ONTAP 9.0 Cluster Administration and Data Protection combo course uses lecture and hands-on exercises to teach basic administration and configuration of a cluster as well as the core backup and restore technologies found in ONTAP 9. The hands-on labs allow you to practice working with ONTAP features and manage your storage and network resources using the cluster shell and OnCommand System Manager. You will learn how to implement and manage SnapMirror, SnapVault, and SnapLock technology which are used to replicate and restore mission-critical data in the enterprise. The course also surveys real-world scenarios and use cases to teach you when to use each of the NetApp protection solutions. Backup and restore operations are taught using the command line and OnCommand System Manager.Includes: ONTAP commands for software versions 8.3.x to 9.0 The ONTAP 9.0 Cluster Administration and Data Protection combo course uses lecture and hands-on exercises to teach basic administration and configuration of a cluster as well as the core backup and restore technologies found in ONTAP 9. The hands-on labs allow you to practice working with ONTAP features and manage your storage and network resources using the cluster shell and OnCommand System Manager. You will learn how to implement and manage SnapMirror, SnapVault, and SnapLock technology which are used to replicate and restore mission-critical data in the enterprise. The course also surveys real-world scenarios and use cases to teach you when to use each of the NetApp protection solutions. Backup and restore operations are taught using the command line and OnCommand System Manager. Includes: ONTAP commands for software versions 8.3.x to 9.0

NetApp ONTAP 9 Cluster Administration and Data Protection Bundle
Delivered OnlineFlexible Dates
Price on Enquiry

Symantec Endpoint Protection 14.X - Configure And Protect

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is for Network, IT security, and systems administration professionals in a Security Operations position who are tasked with configuring optimum security settings for endpoints protected by Symantec Endpoint Protection 14. Overview At the completion of the course, you will be able to: Protect against Network Attacks and Enforcing Corporate Policies using the Firewall Policy. Blocking Threats with Intrusion Prevention. Introducing File-Based Threats. Preventing Attacks with SEP. Layered Security. Securing Windows Clients. Secure Mac Clients. Secure Linux Clients. Controlling Application and File Access. Restricting Device Access for Windows and Mac Clients. Hardening Clients with System Lockdown. Customizing Policies based on Location. Managing Security Exceptions. This course is designed for the network, IT security, and systems administration professionals in a Security Operations position who are tasked with configuring optimum security settings for endpoints protected by Symantec Endpoint Protection 14. Introduction Course environment Lab environment Introducing Network Threats Describing how Symantec Endpoint Protection protects each layer of the network stack Discovering the tools and methods used by attackers Describing the stages of an attack Protecting against Network Attacks and Enforcing Corporate Policies using the Firewall Policy Preventing network attacks Examining Firewall Policy elements Evaluating built-in rules Creating custom firewall rules Enforcing corporate security policy with firewall rules Blocking network attacks using protection and stealth settings Configuring advanced firewall feature Blocking Threats with Intrusion Prevention Introducing Intrusion Prevention technologies Configuring the Intrusion Prevention policy Managing custom signatures Monitoring Intrusion Prevention events Introducing File-Based Threats Describing threat types Discovering how attackers disguise their malicious applications Describing threat vectors Describing Advanced Persistent Threats and a typical attack scenario Following security best practices to reduce risks Preventing Attacks with SEP Layered Security Virus and Spyware protection needs and solutions Describing how Symantec Endpoint Protection protects each layer of the network stack Examining file reputation scoring Describing how SEP protects against zero-day threats and threats downloaded through files and email Describing how endpoints are protected with the Intelligent Threat Cloud Service Describing how the emulator executes a file in a sandbox and the machine learning engine?s role and function Securing Windows Clients Platform and Virus and Spyware Protection policy overview Tailoring scans to meet an environment?s needs Ensuring real-time protection for clients Detecting and remediating risks in downloaded files Identifying zero-day and unknown threats Preventing email from downloading malware Configuring advanced options Monitoring virus and spyware activity Securing Mac Clients Touring the SEP for Mac client Securing Mac clients Monitoring Mac clients Securing Linux Clients Navigating the Linux client Tailoring Virus and Spyware settings for Linux clients Monitoring Linux clients Providing Granular Control with Host Integrity Ensuring client compliance with Host Integrity Configuring Host Integrity Troubleshooting Host Integrity Monitoring Host Integrity Controlling Application and File Access Describing Application Control and concepts Creating application rulesets to restrict how applications run Monitoring Application Control events Restricting Device Access for Windows and Mac Clients Describing Device Control features and concepts for Windows and Mac clients Enforcing access to hardware using Device Control Discovering hardware access policy violations with reports, logs, and notifications Hardening Clients with System Lockdown What is System Lockdown? Determining to use System Lockdown in Whitelist or Blacklist mode Creating whitelists for blacklists Protecting clients by testing and Implementing System Lockdown Customizing Policies based on Location Creating locations to ensure the appropriate level of security when logging on remotely Determining the criteria and order of assessment before assigning policies Assigning policies to locations Monitoring locations on the SEPM and SEP client Managing Security Exceptions Creating file and folder exceptions for different scan types Describing the automatic exclusion created during installation Managing Windows and Mac exclusions Monitoring security exceptions

Symantec Endpoint Protection 14.X - Configure And Protect
Delivered OnlineFlexible Dates
Price on Enquiry