• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

5596 Computing & IT courses in Scarborough delivered Online

Professional Certificate Course in Recognizing Information Systems Development and Globalization in London 2024

4.9(261)

By Metropolitan School of Business & Management UK

This course aims to provide learners with a comprehensive understanding of the nature and process of Information Systems Development, Software Development Process, Programming Language, Globalization and the role of IT, Information Systems Ethics, Acceptable Use Policies, Intellectual Property, Privacy in Information Systems and future trends. After the successful completion of the course, you will be able to learn about the following, Understand the nature and process of Information Systems Development, its lifecycle, and Implementation Methodologies. Learn about Software Development Processes, models and technologies. Understand the nature, generations and types of Programming Language. Appreciate the concept of Globalization and the role of IT in Globalization. Learn about Information Systems Ethics and the Code of Ethics. Appreciate Acceptable Use Policies and Intellectual Property in IT. The concept of Privacy in Information Systems, its challenges and future trends. This course will provide learners with an understanding of the nature and process of Information Systems Development and Implementation Methodologies. The course will cover the Software Development Process, including models and technologies, and the nature, generations, and types of Programming Language. Learners will also learn about the role of IT in Globalization and the impact of Information Systems on the global economy. This course will provide learners with an understanding of the nature and process of Information Systems Development and Implementation Methodologies. The course will cover the Software Development Process, including models and technologies, and the nature, generations, and types of Programming Language. Learners will also learn about the role of IT in Globalization and the impact of Information Systems on the global economy. VIDEO - Course Structure and Assessment Guidelines Watch this video to gain further insight. Navigating the MSBM Study Portal Watch this video to gain further insight. Interacting with Lectures/Learning Components Watch this video to gain further insight. Recognizing Information Systems Development and Globalisation Self-paced pre-recorded learning content on this topic. Recognizing Information Systems Development and Globalization Put your knowledge to the test with this quiz. Read each question carefully and choose the response that you feel is correct. All MSBM courses are accredited by the relevant partners and awarding bodies. Please refer to MSBM accreditation in about us for more details. There are no strict entry requirements for this course. Work experience will be added advantage to understanding the content of the course. The certificate is designed to enhance the learner's knowledge in the field. This certificate is for everyone eager to know more and get updated on current ideas in their respective field. We recommend this certificate for the following audience. IT Professionals Software Developers Programmers Business Owners & Entrepreneurs Managers and Executives Average Completion Time 2 Weeks Accreditation 3 CPD Hours Level Advanced Start Time Anytime 100% Online Study online with ease. Unlimited Access 24/7 unlimited access with pre-recorded lectures. Low Fees Our fees are low and easy to pay online.

Professional Certificate Course in Recognizing Information Systems Development and Globalization in London 2024
Delivered Online On Demand14 days
£40

IT Security Training Course

By Training Tale

IT Security: IT Security Training Course If you are looking to start a career in IT Security Training Course or want to develop your knowledge in the IT security field, then this IT Security course is ideal for you. This exclusive IT Security course will give you a solid foundation to become a confident IT Security professional. An IT security specialist must be familiar with operating environments in order to succeed in the IT security industry. Our IT Security Training Course is designed by industry experts to provide you a thorough understanding of IT Security, including key concepts, implementation strategies, and in-depth knowledge. Enrol in our IT Security Training Course right now and start your career in the IT industry. Special Offers of this IT Security: IT Security Training Course This IT Security: IT Security Training Course includes a FREE PDF Certificate. Lifetime access to this IT Security Training Course Instant access to this IT Security Training Course Get FREE Tutor Support from Monday to Friday in this IT Security Training Course Main Course: IT Security Training Course Free Courses: Course 01: GDPR Training Course 02: Cyber Security Course [ Note: Free PDF certificate will provide as soon as completing the IT Security: IT Security Training Course] IT Security: IT Security Training Course Industry Experts Designed this IT Security course into 06 detailed modules. Course Curriculum of IT Security Training Course Module 01: Understanding IT Security Module 02: Types of Malware Module 03: IT Security Tools & Techniques Module 04: Computer Forensics Module 05: Developing IT Security Policies Module 06: Developing IT Security and Risk Mitigation Plan Assessment Method of IT Security Training Course After completing each module of the IT Security Training Course, you will find automated MCQ quizzes. To unlock the next module, you need to complete the quiz task and get at least 60% marks. Certification of IT Security Training Course After completing the MCQ/Assignment assessment for this IT Security Training Course, you will be entitled to a Certificate of Completion from Training Tale. Who is this course for? IT Security: IT Security Training Course This IT Security Training Course is suitable for anyone interested in learning about IT security or cybersecurity. Requirements IT Security: IT Security Training Course Students who intend to enrol in this IT Security: IT Security Training Course must meet the following requirements: IT Security: Good command of the English language IT Security: Must be vivacious and self-driven IT Security: Basic computer knowledge IT Security: A minimum of 16 years of age is required Career path IT Security: IT Security Training Course

IT Security Training Course
Delivered Online On Demand18 hours
£12

IT Support Technician Training Course

By Compliance Central

Are you looking to enhance your IT Support Technician skills? If yes, then you have come to the right place. Our comprehensive course on IT Support Technician will assist you in producing the best possible outcome by mastering the IT Support Technician skills. The IT Support Technician is for those who want to be successful. In the IT Support Technician, you will learn the essential knowledge needed to become well versed in IT Support Technician. Our IT Support Technician starts with the basics of IT Support Technician and gradually progresses towards advanced topics. Therefore, each lesson of this IT Support Technician is intuitive and easy to understand. Why would you choose the IT Support Technician from Compliance Central: Lifetime access to IT Support Technician materials Full tutor support is available from Monday to Friday with the IT Support Technician Learn IT Support Technician skills at your own pace from the comfort of your home Gain a complete understanding of IT Support Technician Accessible, informative IT Support Technician learning modules designed by expert instructors Get 24/7 help or advice from our email and live chat teams with the IT Support Technician course Study IT Support Technician in your own time through your computer, tablet or mobile device. A 100% learning satisfaction guarantee with your IT Support Technician Improve your chance of gaining in demand skills and better earning potential by completing the IT Support Technician IT Support Technician Curriculum Breakdown of the IT Support Technician Section 01: How People Use Computers The Case for Computer Literacy Features Common to Every Computing Device Common General-Purpose Computing Devices Networks of Computing Devices Remotely-Accessed Computer Systems Specialized Computer Systems Specialty I/O Devices Section 02: System Hardware CPUs Passive and Active Cooling RAM and Active Memory Motherboards Power Supplies AMA - Ask Me Anything about System Hardware Section 03: Device Ports and Peripherals Ports and Connectors General Use I/O Devices AMA - Ask Me Anything about I/O, Ports and Peripherals Section 04: Data Storage and Sharing Basics of Binary Storage Technologies Mass Storage Variation AMA - Ask Me Anything about Data Storage and Sharing Section 05: Understanding Operating Systems Operating System Functions Operating System Interfaces AMA - Ask Me Anything about Understanding OS's Section 06: Setting Up and Configuring a PC Preparing the Work Area Setting up a Desktop PC Completing PC Setup AMA - Ask Me Anything about Setting up and Configuring a PC Section 07: Setting Up and Configuring a Mobile Device Personalizing a Tablet AMA - Ask Me Anything about Mobile Devices Part 1 AMA - Ask Me Anything about Mobile Devices Part 2 Section 08: Managing Files File Management Tools File Manipulation Backups AMA - Ask Me Anything about Managing Files Section 09: Using and Managing Application Software Walking Survey of Applications Managing Applications Applications and Extensions AMA - Ask Me Anything about Working with Applications Section 10: Configuring Network and Internet Connectivity Wi-Fi Setup Going High Speed Setting Up and Sharing Printers AMA - Ask Me Anything about Networks and Internet Connectivity Part 1 AMA - Ask Me Anything about Networks and Internet Connectivity Part 2 Section 11: IT Security Threat Mitigation Physical Security Dealing with Malware Password Management Clickworthy Perils of Public Internet AMA - Ask Me Anything about IT Threat Mitigation Part 1 AMA - Ask Me Anything about IT Threat Mitigation Part 2 Section 12: Computer Maintenance and Management Power Management Cleaning and Maintaining Computers Trash it or Stash it? AMA - Ask Me Anything about Computer Maintenance and Management Section 13: IT Troubleshooting Troubleshooting 101 AMA - Ask Me Anything about Troubleshooting Computers Part 1 AMA - Ask Me Anything about Troubleshooting Computers Part 2 Section 14: Understanding Databases Introduction to Databases Database Details AMA - Ask Me Anything about Databases Section 15: Developing and Implementing Software Introduction to Programming Programming with a PBJ Sandwich AMA - Ask Me Anything about Programming CPD 10 CPD hours / points Accredited by CPD Quality Standards Who is this course for? The IT Support Technician helps aspiring professionals who want to obtain the knowledge and familiarise themselves with the skillsets to pursue a career in IT Support Technician. It is also great for professionals who are already working in IT Support Technician and want to get promoted at work. Requirements To enrol in this IT Support Technician, all you need is a basic understanding of the English Language and an internet connection. Career path The IT Support Technician will enhance your knowledge and improve your confidence in exploring opportunities in various sectors related to IT Support Technician. Certificates CPD Accredited PDF Certificate Digital certificate - Included CPD Accredited PDF Certificate CPD Accredited Hard Copy Certificate Hard copy certificate - £10.79 CPD Accredited Hard Copy Certificate Delivery Charge: Inside the UK: Free Outside of the UK: £9.99

IT Support Technician Training Course
Delivered Online On Demand5 hours
£12

From Small Talk to Big Opportunities

5.0(10)

By We Are In Business

From Small Talk to Big Opportunities - your perfect introduction to business networking. Networking can be intimidating and a bit daunting if you’re new to it, but it doesn't have to be.  In this online introduction to business networking course, you'll discover...  The benefits of networking. We’ll help you to recognise networking opportunities that will suit you. Know how to prepare for an event. How to follow up. And best of all, we’ll help you to create your own elevator pitch with our Pitch Building Template. This is your perfect introduction to the world of business networking, ideal for beginners who want to increase their confidence and feel more empowered. We understand the power of a network. Our passion for networking and helping others succeed is truly contagious, and we can't wait to share our knowledge and expertise with you. The main goal of this taster session is to help you overcome any fears or hesitations you might have about networking. We’ll guide you through the ins and outs of networking, leaving you feeling more confident about attending your next event, whether online or Face to Face. Don't let your fears hold you back any longer – Join us for this interactive this taster session that will set you on the path to networking success! This course is for you if… You’ve very little networking experience and you want to know where to start. You experience anxiety about meeting new people for business. You’re not comfortable in networking events. You want to develop your business You want to further a career or get a promotion.

From Small Talk to Big Opportunities
Delivered OnlineFlexible Dates
£10

Digital Product Management - CPD Accredited Course

5.0(2)

By Training Express

The Digital Product Management - CPD Accredited Course is designed to equip learners with the strategic mindset and techniques needed to manage digital products in today's fast-paced market. In an era where technology drives business success, this course offers a deep dive into the methodologies and frameworks used by top-tier product managers. Whether you're aspiring to break into the field or aiming to refine your skills, this course ensures you gain a robust understanding of digital product lifecycles, from ideation to launch and beyond. Delivered entirely online, this course will guide you through the latest tools, trends, and challenges in digital product management. The curriculum blends theory with insight into current industry practices, focusing on the strategies required to steer digital products toward success. With a strong emphasis on data-driven decision-making, you’ll be able to navigate the complexities of user experience, market research, and cross-functional collaboration. If you’re looking to master the art of managing digital products effectively, this course is the perfect choice for you. Enrol with confidence, train with Training Express and supercharge your career in no time. Course Curriculum: Module 01: Basics of Digital Product Management Module 02: Understanding Market and Customers Module 03: Strategy Development Module 04: Roadmap Module 05: Development Methodologies Module 06: Analytics and Metrics Module 07: Marketing Module 08: Legal Aspects Course Assessment You will immediately be given access to a specifically crafted MCQ test upon completing an online module. For each test, the pass mark will be set to 60%. Accredited Certificate After successfully completing this Digital Product Management - CPD Accredited course, you will qualify for the CPD Quality Standards (CPD QS) certificate from Training Express. CPD 10 CPD hours / points Accredited by The CPD Quality Standards (CPD QS) Who is this course for? The Digital Product Management - CPD Accredited training is ideal for highly motivated individuals or teams who want to enhance their skills and efficiently skilled employees. Requirements There are no formal entry requirements for the course, with enrollment open to anyone! Career path Learn the essential skills and knowledge you need to excel in your professional life with the help & guidance from our Digital Product Management - CPD Accredited training.

Digital Product Management - CPD Accredited Course
Delivered Online On Demand1 hour
£23

CompTIA Security+

By CTC Institute

Security+ Course

CompTIA Security+
Delivered Online On Demand30 minutes
FREE

LangChain Masterclass - Build 15 OpenAI and LLAMA 2 LLM Apps Using Python

By Packt

This comprehensive course unlocks the boundless potential of LangChain, Pinecone, OpenAI, and LLAMA 2 LLM, guiding you from AI novice to expert. Dive into 15 different practical projects, from dynamic chatbots to data analysis tools, and cultivate a profound understanding of AI, empowering your journey into the future of language-based applications.

LangChain Masterclass - Build 15 OpenAI and LLAMA 2 LLM Apps Using Python
Delivered Online On Demand9 hours 59 minutes
£14.99

TS619G IBM Spectrum Protect version 8.1.12 Implementation and Administration

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Implementers and administrators who are new to IBM Spectrum Protect data management. Overview Describe the purpose of IBM Spectrum Protect Install and configure the IBM Spectrum Protect components Use the administrative and client interfaces Discuss storage methodology options and create storage pool Customize data movement and retention policies to meet business requirements Configure the IBM Spectrum Protect database and storage pools for protection Optimize client configuration Perform backup, restore, archive and retrieve operations Organize daily tasks required to protect the IBM Spectrum Protect environment Automate and monitor client and administrative tasks and events IBM Spectrum Protect 8.1.12 is a data backup and recovery solution designed to help you manage your data retention, reduce the cost of storage, and provide appropriate recovery point objectives to meet any service level agreement. IBM Spectrum Protect offers improved efficiency and flexibility using object-based data management and policy driven retention.This five-day course will focus on implementation and basic administration of an IBM Spectrum Protect environment. The hands-on lab exercises are performed on a Windows 2016 environment. The course materials include examples of AIX and Linux commands, when different from Windows. Unit 1 Concepts and components Unit 2 Installation and configuration Unit 3 Interfaces and monitoring Unit 4 Storage pools and devices Unit 5 Policy management, data movement, and expiration Unit 6 Server database and storage pool management Unit 7 Client configuration and management Unit 8 Client data protection Unit 9 Daily operations and maintenance Unit 10 Schedules and reports Additional course details: Nexus Humans TS619G IBM Spectrum Protect version 8.1.12 Implementation and Administration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the TS619G IBM Spectrum Protect version 8.1.12 Implementation and Administration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

TS619G IBM Spectrum Protect version 8.1.12 Implementation and Administration
Delivered OnlineFlexible Dates
Price on Enquiry

Symantec PGP Universal Server 3.2 and PGP Desktop 10.2 Administration

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for those responsible for the installation, configuration, maintenance, or troubleshooting of PGP Universal Server or PGP Desktop. Overview This course provides instruction on PGP Universal Server 3.2 and PGP Desktop 10.2.At the completion of the course, you will be able to: Describe the features, concepts, components, and terminology of both the PGP Universal Server 3.2 and PGP Desktop 10.2products. Install PGP Universal Server 3.2 and complete setup using the most commonly configured options. Install a managed and customized PGP Desktop 10.2 client. Configure, complete administration tasks for, and use PGP Whole Disk Encryption and other PGP Desktop features. Configure policy-based messaging security for internal and external recipients. Create and modify users, user policies, and groups using either manual or directory integration methods. Combine two or more PGP Universal Servers into a cluster. This is designed to provide you with the fundamental knowledge a nd hands-on lab experience to install, administer, and troubleshoot the PGP Universal Management Server and primary client product. Cryptography Essentials Cryptography defined Caesar cipher Symmetric-Key Cryptography Public-Key Cryptography PGP Public-Key Cryptography Digital Signatures Trust Models Keys, Key Signatures and Key properties Verifying keys with key fingerprints Passphrases Certificates PGP Product Information PGP Universal Server PGP Desktop PGP Command Line PGP Support Package for BlackBerry PGP Mobile PGP iOS Viewer Installing PGP Universal Server PGP Universal Server overview Installation tasks and options Completing the PGP Universal Server Setup Assistant Administrative Keys A review of trust and verification The Organization Key The Organization Certificate Configuration and usage of the Additional Decryption Key Other certificates used for trust on PGP Universal Server Ignition key types and features Consumers and Groups Consumers and Groups PGP product user definition Consumer groups Introduction to consumer policy How users, groups, and policy work together Server Messaging Learn Mode In-depth look at Mail Proxy configuration Description of server mail flow and typical configurations Monitoring and Reporting Server monitoring and logging Updates, backups, and restoring Mail Policy Definition of policy chains and rules Rule conditions, actions, and key searches Default mail flow and message policy Adding custom chains to mail flow Overview of various types of policy chains Demonstration and detailed explanation of adding a rule Special messaging actions and dictionaries Key Not Found Problems that require a Key Not Found policy Introduction to Key Not Found configuration Web Messenger Definition of Web Messenger Description of functionality Demonstration of end-user inbox creation Inbox and service administration Inbox replication and backup Customization templates Regular Email option for Web Messenger PDF Messenger statement and certified delivery How the Out of Mail Stream Consumer Policy option functions PGP public key directories Smart Trailer invitation option overview PGP Desktop / S/MIME option overview PGP Universal Satellite overview Preparing Universal Server for PGP Desktop Clients Introduction to directory synchronization High-level overview of LDA P How the server uses a directory to add and assign users to groups Configuring PGP Universal Server Directory Synchronization Keys Managed key configuration Key modes Subkeys Key usage flags Smart card Introduction to key management services Installing PGP Desktop System requirements Citrix and TS compatibility Downloading a custom PGP Desktop installer Modifying installed components Configuring Client Enrollment Definition of enrollment Email, LDA P, and Silent enrollment type overview General PGP Desktop Policy General PGP Desktop Policy Options on the General Card of the PGP Desktop settings of a consumer policy Licensing managed PGP Desktop clients Updating settings for managed installations PGP Desktop Messaging How PGP Desktop affects messaging infrastructure Options on the Messaging Card of the PGP Desktop settings of a consumer policy MAPI encrypt and sign buttons and offline mail processing Configuring PGP Whole Disk Encryption What is Whole Dis k Encryption Configuring WDE PGP Whole Disk Encryption for Windows PGP Whole Disk Encryption for Mac OSX PGP w hole Disk Encryption for Linux PGP Whole Disk Encryption Management and Recover The pgpwd command-line tool Logon failure and reporting The WDE-ADMIN group for large-scale administration PGP Whole Disk Encryption in the PGP Desktop settings of a consumer policy, including authentication methods and user per missions Recovery options PGP NetShare Defining PGP NetShare Encrypted folder creation Configuration of the PGP Universal Server Consumer Policy options for NetShare, including automated folder protection and application-based file protection Client-side administration features for PGP NetShare Miscellaneous compatibility and feature information about PGP NetShare Active Directory Group integration and PGP NetShare usage demonstrations Other PGP Desktop Utilities PGP Zip file and folder protection Securely erasing information using PGP Shredder and the Shred Free Space features PGP Virtual Disk secure volumes Usage cases and PGP Portable definition Clustering How PGP Universal Server Clustering works Using the DMZ Clustering Zone Cluster failover Web Messenger inbox replication Demonstration of cluster creation

Symantec PGP Universal Server 3.2 and PGP Desktop 10.2 Administration
Delivered OnlineFlexible Dates
Price on Enquiry

TS617 IBM Spectrum Protect - Implementation and Administration (v8.1.6)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Implementers and administrators who are new to IBM Spectrum Protect data management. Overview At the end of this course you should be able to: Describe the purpose of IBM Spectrum Protect Install and configure the IBM Spectrum Protect components Use the administrative and client interfaces Discuss storage methodology options and create storage pool Customize data movement and retention policies to meet business requirements Configure the IBM Spectrum Protect database and storage pools for protection Optimize client configuration Perform backup, restore, archive and retrieve operations Organize daily tasks required to protect the IBM Spectrum Protect environment Automate and monitor client and administrative tasks and events IBM Spectrum© Protect 8.1.6 is a data backup and recovery solution designed to help you manage your data retention, reduce the cost of storage, and provide appropriate recovery point objectives to meet any service level agreement. IBM Spectrum© Protect offers improved efficiency and flexibility using object-based data management and policy driven retention.This course will focus on implementation and basic administration of a IBM Spectrum© Protect environment. The hands-on lab exercises are performed on a Windows 2012 environment. The course materials include examples of AIX and Linux commands, when different from Windows. Components and conceptsInstallation and configurationInterfaces and monitoringStorage pools and devicesPolicy management, data movement, and explorationDatabase and storage pool managementClient configuration and managementClient data protectionDaily operations and maintenanceSchedules and reports Additional course details: Nexus Humans TS617 IBM Spectrum Protect - Implementation and Administration (v8.1.6) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the TS617 IBM Spectrum Protect - Implementation and Administration (v8.1.6) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

TS617 IBM Spectrum Protect - Implementation and Administration (v8.1.6)
Delivered OnlineFlexible Dates
Price on Enquiry