• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

899 Educators providing Computing courses in Banstead

Foundation for International Education

foundation for international education

London

Over 20 years of expertise in developing and managing experiential learning experiences Immersive study abroad programs in the UK, Ireland, and Spain We enable you to transform life-changing cultural experiences into personal and professional advantages Active participation in British, Irish, or Spanish culture Academic courses that are supported by cocurricular activities such as study tours that foster community connection and understanding Internships - gain real-world experience and build connections with a broader network of people Unique summer program focusing on peace and conflict resolution in Amman, Jordan Our Programs London, Dublin, and Madrid study abroad programs with Internships Study programs in Barcelona Semester and Quarter programs Spring, Summer, and Fall programs Cocurricular and extracurricular activities across the UK, Ireland, and Spain Online Internships Summer Conflict and the Struggle for Peace program in Amman, Jordan No application fee Significant number of scholarships available FIE IN THE WORDS OF OUR STUDENTS On FIE redefining the classroom experience “We understand a topic not just based on lectures but by going to talk to local people, doing field trips.” ”You get immersed and see things for yourself that you are taught in the class” On FIE’s supportive environment “They are a family away from home: FIE professors, students and staff” “You do it all by yourself but you know FIE supports you all the time”

City of Westminster College

city of westminster college

London

We provide hundreds of courses to thousands of students every year and are conveniently located minutes from Edgware Road, Paddington, Marylebone and Maida Vale underground stations. We are proud to be the first choice for students from all over the Greater London area. Here are just some of the reasons why we think you should make us your first choice: We offer a wide range of courses to suit all needs - there's got to be one for you! We're committed to supporting and guiding you though your journey with us and we care about getting you ready for further study and the world of work. This year, we were named Central London's Top Vocational College - for the 3rd year running! We are also Central London's Top College for Results and have achieved the best results for Apprenticeships in the UK. Our students take part in annual national competitions and events, such as WorldSkills, National Theatre Connections and London Citizens. We have an amazing team of supportive and dedicated advisors who will help you with career guidance, financial support and mentoring while you're studying with us. Our Paddington Green Campus offers an award winning learning environment, with state of the art facilities, including photography studios, recording studio, TV studio, motor vehicle workshop, dance studio, theatre, science labs, Sport England standard sports hall and an airplane cabin training room. Our newly refurbished Maida Vale Campus offers a mix of informal and formal teaching spaces, including a multi-sensory room for our students with learning difficulties and disabilities and an employability centre offering advice and support for those seeking employment. We have a dedicated Work Experience (WEX) hub and team who are committed to getting you the best work placements available. Come and visit us! Our Open Days are a great way for you to find out more about us and get a feel for what it's like to be a student at City of Westminster College. You'll meet teachers, students, course and student advisors, find out about our courses and get a chance to see our great facilities. All centres are wheelchair accessible.

Migration Museum

migration museum

London

About the Migration Museum The Migration Museum explores how the movement of people to and from Britain across the ages has shaped who we are – as individuals, as communities, and as a nation. Migration is a pressing contemporary issue and is at the centre of polarised political and online debate. But there’s an underlying story of comings and goings stretching back many centuries. And this story goes to the heart of who we are today. Britain has thousands of museums, but none comprehensively focused on this important theme that connects us all. The time is right for a highly relevant, accessible visitor attraction that shines a light on who we are, where we come from and where we are going. From our current home in the heart of Lewisham Shopping Centre, we stage engaging exhibitions and dynamic events, alongside a far-reaching education programme for primary, secondary, university and adult learners. We have a growing digital presence and convene a knowledge-sharing Migration Network of museums and galleries across the UK. The story so far The Migration Museum was founded by Barbara Roche, who first made the case for a migration museum for Britain almost 20 years ago, stemming from her time as Britain’s immigration minister, and from visiting similar museums in other parts of the world – notably Ellis Island in New York. Barbara assembled a founding team of people from different professional backgrounds who shared her passionate belief that Britain’s migration history should be placed at the heart of our national story. Together, they began to scope what a national migration museum might look like. Sophie Henderson, a former immigration judge and barrister, came on board as Director in 2013. Between 2013 and 2017, the Migration Museum staged pop-up exhibitions and events and ran education workshops at a wide range of venues across the UK, including the Southbank Centre, the National Maritime Museum and City Hall in London, the Museum of Oxford, Leicester railway station, and the National Records of Scotland in Edinburgh. From 2017 to 2019, the Migration Museum was ba

Breech Birth Network

breech birth network

Kingston upon Thames

Hello!! My name is Muge and I am the founder of My Breathing Path! I was born in Istanbul, Turkey and I lived there until 2018. I was working in the Turkish finance industry for more than 10 years and during that time I was suffering from an advanced hernia in my neck. Working in a high stress environment and dealing with lots of problems at the same time, made me a super-achiever. I first came across breathwork in a workshop in 2010. It was extremely powerful but also it was completely different to the other techniques that I had tried before. As I continued to go to the sessions, it helped me to understand my behaviour as a perfectionist and its subsequent consequences for my life, the hernia and my unbalanced relationship with my family, friends and colleagues. After experiencing healing and transformation myself, I decided to become a facilitator. Since 2014, I have been working in the field of Transformational Breath as a Certified Transformational Breath Facilitator in private sessions, workshops and seminars while I continued to work in my finance career. I have experience in working with a wide variety of people – each possessing their own set of needs and goals. My further qualifications, Basic DNA Theta Healing Practitioner and Reiki II Certification are used in conjunction with Transformational Breath sessions to help people reach their potential and achieve their goals. Life is a combination of different journeys and within my new journey in the UK, I look forward to sharing my experiences through transformational breathing sessions with others, who want to discover more about themselves with transformation in their life, increase their self-awareness and live a healthier lifestyle.

Courses matching "Computing"

Show all 444

Java Bootcamp | 8 weeks | 8 lessons

4.6(12)

By PCWorkshops

Full stack, in-depth, comprehensive in classroom 2 month training on Java programming. 1 lesson a week; the other days you work on your own on structured homework and are supported with a 1-1 mentor.

Java Bootcamp | 8 weeks | 8 lessons
Delivered In-Person in London + more
£880

Essential Cloud Technologies

5.0(3)

By Systems & Network Training

Cloud technologies training course description This course provides an introduction to cloud technologies, including, configuration and deployment, security, maintenance, and management. It covers all aspects of cloud computing infrastructure. It will help you to master the fundamental concepts, terminology, and characteristics of cloud computing. . What will you learn Contrast and compare AWS, GCP and Azure. Explain the different cloud services, models and characteristics. Explain cloud virtualization components and options. Explain cloud security options. Describe cloud automation, orchestration, monitoring and performance options. Cloud technologies training course details Who will benefit: Anyone working with or looking to work with cloud technologies. Prerequisites: None. Duration 2 days Cloud technologies training course contents What is the cloud? The Internet Cloud computing Benefits Disadvantages Cloud services IaaS, PaaS, SaaS, others. Cloud service providers AWS, GCP Microsoft Azure, others Cloud architectures Private, public, hybrid others Cloud based delivery The cloud and virtualization Virtual Machines, networks, storage, deployment. Accessing the Virtual Machine Secure cloud environments Security considerations. Data privacy considerations Automation and orchestration Monitoring and performance Performance Cost issues Cost containment

Essential Cloud Technologies
Delivered in Internationally or OnlineFlexible Dates
£1,497

Cloud deployment

5.0(3)

By Systems & Network Training

Cloud deployment training course description This course covers the important topics every cloud professional needs, including, configuration and deployment, security, maintenance, management, and troubleshooting. It covers all aspects of cloud computing infrastructure and administration, with a practical focus on real-world skills. It will help you to master the fundamental concepts, terminology, and characteristics of cloud computing. Deploy and implement cloud solutions, manage the infrastructure, and monitor performance. You will also be able to install, configure, and manage virtual machines. What will you learn Cloud services, models, and characteristics. Virtualization components, installation, and configuration. Infrastructure configurations and optimization. Resource management and specific allocations. IT security concepts, tools, and best practices. Recovery, availability and continuity in the cloud. Cloud deployment training course details Who will benefit: IT professionals looking to deploy and implement cloud solutions, manage the infrastructure, and monitor performance, Install, configure, and manage virtual machines. Prerequisites: Introduction to virtualization. Duration 5 days Cloud deployment training course contents Preparing to Deploy Cloud Solutions Deploying a Pilot Project Testing Pilot Project Deployments Designing a Secure and Compliant Cloud Infrastructure Designing and Implementing a Secure Cloud Environment Planning Identity and Access Management for Cloud Deployments Determining CPU and Memory Sizing for Cloud Deployments Determining Storage Requirements for Cloud Deployments Analysing Workload Characteristics to Ensure Successful Migration Maintaining Cloud Systems Implementing Backup, Restore, Disaster Recovery, and Business Continuity Measures Analysing Cloud Systems for Performance Analysing Cloud Systems for Anomalies and Growth Forecasting Troubleshooting Deployment, Capacity, Automation, and Orchestration Issues Troubleshooting Connectivity Issues Troubleshooting Security Issues

Cloud deployment
Delivered in Internationally or OnlineFlexible Dates
£2,797

Computing - Computer Coding - In Person Tuition, London, Lambeth, Wandsworth, Merton, Southwark, Kensington & Chelsea

5.0(8)

By GLA Tutors Home or Online

We use 'Scratch' for computer coding. Scratch is the world’s largest coding community for children and a coding language with a simple visual interface that allows young people to create digital stories, games, and animations. Scratch is designed, developed, and moderated by the Scratch Foundation, a nonprofit organization. Scratch promotes computational thinking and problem solving skills; creative teaching and learning; self-expression and collaboration; and equity in computing. Scratch is designed especially for ages 8 to 16, but is used by people of all ages. Millions of people are creating Scratch projects in a wide variety of settings, including homes, schools, museums, libraries, and community centers.  The ability to code computer programs is an important part of literacy in today’s society. When people learn to code in Scratch, they learn important strategies for solving problems, designing projects, and communicating ideas. 

Computing - Computer Coding - In Person Tuition, London, Lambeth, Wandsworth, Merton, Southwark, Kensington & Chelsea
Delivered In-Person in LondonFlexible Dates
£60

Definitive network forensics for engineers

5.0(3)

By Systems & Network Training

Network forensics training course description This course studies network forensics-monitoring and analysis of network traffic for information gathering, intrusion detection and legal evidence. We focus on the technical aspects of network forensics rather than other skills such as incident response procedures etc.. Hands on sessions follow all the major sections. What will you learn Recognise network forensic data sources. Perform network forensics using: Wireshark NetFlow Log analysis Describe issues such as encryption. Network forensics training course details Who will benefit: Technical network and/or security staff. Prerequisites: TCP/IP foundation for engineers. Duration 3 days Network forensics training course contents What is network forensics? What it is, host vs network forensics, purposes, legal implications, network devices, network data sources, investigation tools. Hands on whois, DNS queries. Host side network forensics Services, connections tools. Hands on Windows services, Linux daemons, netstat, ifoconfig/ipconfig, ps and Process explorer, ntop, arp, resource monitor. Packet capture and analysis Network forensics with Wireshark, Taps, NetworkMiner. Hands on Performing Network Traffic Analysis using NetworkMiner and Wireshark. Attacks DOS attacks, SYN floods, vulnerability exploits, ARP and DNS poisoning, application attacks, DNS ANY requests, buffer overflow attacks, SQL injection attack, attack evasion with fragmentation. Hands on Detecting scans, using nmap, identifying attack tools. Calculating location Timezones, whois, traceroute, geolocation. Wifi positioning. Hands on Wireshark with GeoIP lookup. Data collection NetFlow, sflow, logging, splunk, splunk patterns, GRR. HTTP proxies. Hands on NetFlow configuration, NetFlow analysis. The role of IDS, firewalls and logs Host based vs network based, IDS detection styles, IDS architectures, alerting. Snort. syslog-ng. Microsoft log parser. Hands on syslog, Windows Event viewer. Correlation Time synchronisation, capture times, log aggregation and management, timelines. Hands on Wireshark conversations. Other considerations Tunnelling, encryption, cloud computing, TOR. Hands on TLS handshake in Wireshark.

Definitive network forensics for engineers
Delivered in Internationally or OnlineFlexible Dates
£3,497

Internet of Things demystified

5.0(3)

By Systems & Network Training

Internet of Things training course description A concise overview course covering The Internet of Things and the technologies involved. Particular emphasis is placed on the high level architecture of IoT and the benefits achievable. What will you learn Describe the structure of the IoT List the technologies involved in IoT. Explain how IoT works. Internet of Things training course details Who will benefit: Non-technical staff working with IoT. Prerequisites: None. Duration 1 day Internet of Things training course contents What is IoT The Internet, what is IoT? IoT and M2M, IoT technologies, IoT architecture. Wired and wireless communication. IoT applications; Smart houses, smart cities, smart cars, wearable, environment, other domain specific IoTs. IoT architecture Physical objects, virtual objects, cloud computing, data capture, communications. Big data. Components Hardware, sensors, actuators, chips, firmware, embedded systems. Open source platforms. Power options: Battery, solar, PoE. IoT communication RF, ZigBee, Bluetooth, Bluetooth LE, RFID, WiFi, 802.11ah, mobile technologies. Wired. Arduino (as an example) Microcontrollers, the platform, development, Arduino software, reading from sensors, I2C, SPI. Arduino and the Internet, HTTP, WiFi, GSM. The cloud and IoT: Pachube, nimbits, ThingSpeak Security in IoT Authentication, Encryption, secure booting, firewalls.

Internet of Things demystified
Delivered in Internationally or OnlineFlexible Dates
£967

Total NTP and PTP for engineers

5.0(3)

By Systems & Network Training

NTP and PTP training course description This course looks at timing and synchronization as provided by NTP and PTP. Hands on sessions primarily involve using Wireshark to analyse the protocols. What will you learn Recognise the importance of timing and synchronisation. Explain how NTP works. Explain how PTP works. NTP and PTP training course details Who will benefit: Anyone using NTP or PTP but particularly relevant for those in the broadcast industry. Prerequisites: TCP/IP foundation for engineers Duration 1 day NTP and PTP training course contents Introduction Clock drift. Timing and synchronization. Importance in computing. Importance in broadcasting. NTP NTP versions, v0 to v4. Architecture. The intersection algorithm. Accuracy. Clock strata, Stratum 0, 1, 2 and 3. Protocol modes. Hands on NTP configuration More NTP NTP packet header. Timestamps. Variables in the header. Clock synchronization algorithm. SNTP. The Windows Time service. Hands on Wireshark and NTP analysis. PTP PTP v2, IEEE 1588. Architecture. Accuracy. Synchronization with PTP. Offset and delay. Hands on Analysing PTP packet flows. More PTP Ordinary clocks, boundary clocks, masters and grandmasters. PTP specific switch types. Hardware time stamping. SMPTE ST2059-2. PTP packet header. PTP domains. Best master clock algorithm. Hands on More Wireshark and PTP.

Total NTP and PTP for engineers
Delivered in Internationally or OnlineFlexible Dates
£967

Securing Kubernetes and Containers

5.0(3)

By Systems & Network Training

Securing Kubernetes training course description This course introduces concepts, procedures, and best practices to harden Kubernetes based systems and container-based applications against security threats. It deals with the main areas of cloud-native security: Kubernetes cluster setup, Kubernetes cluster hardening, hardening the underlying operating system and networks, minimizing microservices vulnerabilities, obtaining supply chain security as well as monitoring, logging, and runtime security. What will you learn Harden Kubernetes systems and clusters. Harden containers. Configure and use Kubernetes audit logs. Securing Kubernetes training course details Who will benefit: Technical staff working with Kubernetes Prerequisites: Kubernetes_for_engineers_course.htm Definitive Docker for engineers Duration 2 days Securing Kubernetes training course contents This course does not only deal with the daily security administration of Kubernetes-based systems but also prepares delegates for the official Certified Kubernetes Security Specialist (CKS) exams of the Cloud Native Computing Foundation (CNCF). Structure: 50% theory 50% hands on lab exercise Module 1: User and authorization management Users and service accounts in Kubernetes Authenticating users Managing authorizations with RBAC Module 2: Supply chain security Vulnerabilit checking for images Image validation in Kubernetes Reducing image footprint Secure image registries Module 3: Validating cluster setup and penetration testing Use CIS benchmark to review the security configuration of Kubernetes components. Modify the cluster components' configuration to match the CIS Benchmark. Penetration testing Kubernetes for known vulnerabilities. Module 4: System hardening Use kernel hardening tools Setup appropriate OS level security domains Container runtime sandboxes Limit network access Module 5: Monitoring and logging Configure Kubernetes audit logs Configure Audit Policies Monitor applications behaviour with Falco

Securing Kubernetes and Containers
Delivered in Internationally or OnlineFlexible Dates
£1,727

Complete VBA programming

5.0(3)

By Systems & Network Training

Complete VBA programming training course description This course helps you extend the capabilities of the entire Office suite using Visual Basic for Applications (VBA). Even if you have no programming experience, you'll be automating routine computing processes quickly using the simple, yet powerful VBA programming language. We start at the beginning to get you acquainted with VBA so you can start recording macros right away. You'll then build upon that foundation to utilize the full capabilities of the language in Word, Excel, Outlook, and PowerPoint. What will you learn Record, write and run macros. Work with VBA Editor. Use the huge library of built-in functions. Create simple dialog boxes and complex forms. Customize Word, Excel, PowerPoint, Outlook, and Access. Program the Office 2016 ribbon. Complete VBA programming training course details Who will benefit: Anyone looking to extend the capabilities of the entire Office suite using VBA. Prerequisites: None. Duration 5 days Complete VBA programming training course contents Macros and getting started in VBA VBA syntax, variables, constants, and enumerations, array variables, finding objects, methods, and properties. Working with VBA 1 VBA syntax, variables, constants, and enumerations, array variables, finding objects, methods, and properties. Decisions, loops and functions Built-in functions, creating your own functions, making decisions in your code, using loops to repeat actions. Using message boxes, input boxes, and dialog boxes Getting user input with message boxes and input boxes, creating simple custom dialog boxes, creating complex forms. Creating effective code Building modular code and using classes, debugging your code and handling errors, building well-behaved code, exploring VBA's security features. Programming the Office applications The Word object model and key objects, working with widely used objects in Word, the Excel object model and key objects, working with widely used objects in Excel, the PowerPoint object, model and key objects, working with shapes and running slide shows, the Outlook object model and key objects, working with events in Outlook, the Access object model and key objects, manipulating the data in an Access database via VBA, accessing one application from another application, programming the Office 2016 ribbon.

Complete VBA programming
Delivered in Internationally or OnlineFlexible Dates
£3,697

UNIX Virtualization and High Availability

5.0(3)

By Systems & Network Training

UNIX Virtualization and High Availability course description This course covers administering UNIX enterprise-wide with an emphasis on virtualization and high availability. What will you learn Manage Virtual Machines. Manage containers. Manage HA clusters. Manage HA cluster storage. UNIX Virtualization and High Availability course details Who will benefit: Enterprise-level UNIX professional. UNIX professionals working with virtualization and/or High availability. Prerequisites: Linux network administration 2 (LPIC-2) Duration 5 days UNIX Virtualization and High Availability course contents VIRTUALIZATION Virtualization concepts and theory Terminology, Pros and Cons of virtualization, variations of Virtual Machine monitors, migration of physical to VMs, migration of VMs between host systems, cloud computing. Xen Xen architecture, networking and storage, Xen configuration, Xen utilities, troubleshooting Xen installations, XAPI, XenStore, Xen Boot Parameters, the xm utility. KVM KVM architecture, networking and storage, KVM configuration, KVM utilities, troubleshooting KVM installations. Other virtualization solutions OpenVZ and LXC, other virtualization technologies, virtualization provisioning tools. Libvirt and Related Tools libvirt architecture, networking and storage, basic technical knowledge of libvirt and virsh, oVirt. Cloud Management Tools Basic feature knowledge of OpenStack and CloudStack, awareness of Eucalyptus and OpenNebula. Containers Containers versus VMs, Docker, Kubernetes. Load balanced clusters of LVS/IPVS, VRRP, configuration of keepalived, configuration of ldirectord, backend server network configuration. HAProxy, configuration of HAProxy. Failover clusters Pacemaker architecture and components (CIB, CRMd, PEngine, LRMd, DC, STONITHd), Pacemaker cluster configuration, Resource classes (OCF, LSB, Systemd, Upstart, Service, STONITH, Nagios), Resource rules and constraints (location, order, colocation), Advanced resource features (templates, groups, clone resources, multi-state resources), Pacemaker management using pcs, Pacemaker management using crmsh, configuration and management of corosync in conjunction with Pacemaker, other cluster engines (OpenAIS, Heartbeat, CMAN). HIGH AVAILABILITY CLUSTER STORAGE DRBD/cLVM DRBD resources, states and replication modes, configuration of DRBD resources, networking, disks and devices, configuration of DRBD automatic recovery and error handling, management of DRBD using drbdadm. drbdsetup and drbdmeta, Integration of DRBD with Pacemaker, cLVM, integration of cLVM with Pacemaker. Clustered File Systems Principles of cluster file systems. Create, maintain and troubleshoot GFS2 file systems in a cluster, create, maintain and troubleshoot OCFS2 file systems in a cluster, Integration of GFS2 and OCFS2 with Pacemaker, the O2CB cluster stack, other commonly used clustered file systems.

UNIX Virtualization and High Availability
Delivered in Internationally or OnlineFlexible Dates
£3,697