• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

9665 Concept courses delivered Online

4th December Lil Chase #Agent121. Looking for: PICTURE BOOKS, CHAPTER BOOKS, MG, YA

5.0(1)

By I Am In Print

LOOKING FOR: PICTURE BOOKS, CHAPTER BOOKS, MG, YA Lil is an editor with over 15 years experience in the publishing industry. She’s currently freelancing and is in direct contact with many of the big publishing houses: Hachette, Bonnier Books, and book packager, Working Partners Ltd, among others. She also works with the Caroline Wakeman Literary Agency, assessing their authors’ work for commercial viability, as well as scouting for new talent. For twelve years, Lil was a Senior Commissioning Editor at Working Partners Ltd – the creatives behind massive commercial hits such as Beast Quest, Warriors and the Daisy Meadows series. There she created globally successful concepts for every age group and developed storylines so the books were unputdownable. Lil is also an author in her own right: she has written 6 books under her own name, and ghost written many others under various pseudonyms.  In every age level, Lil would like to see originality - particularly in voice. A strong character with depth, venturing on a quest that's never been undertaken before will get her excited. The 'quest' doesn't have to be epic in scale, it could be as small as petting the next-door neighbour's dog, or getting the good looking new kid to notice you, it just has to be something a reader will want to invest in. She also loves humour and is happy to see anything quirky (perhaps even downright silly!).  For picture books, Lil would like you to submit a covering letter, and 1 complete manuscript, double-spaced, with spreads marked out, in a single word or PDF doc. For chapter books, MG and YA, please send a covering letter, the first three chapters and a synopsis, double spaced, in a single Word or PDF doc. Please send EITHER picture books OR another genre, not both in one submission. By booking this session you agree to email your material to reach I Am In Print by the stated submission deadline to agent121@iaminprint.co.uk. Please note that I Am In Print take no responsibility for the advice given in your Agent121. The submission deadline is: Monday 25 November 2024

4th December Lil Chase #Agent121. Looking for: PICTURE BOOKS, CHAPTER BOOKS, MG, YA
Delivered Online + more
£72

Professional Certificate Course in the Concept of Operational Risk in London 2024

4.9(261)

By Metropolitan School of Business & Management UK

This course offers a thorough exploration of operational risk, encompassing concepts, types, and the principles of Operational Risk Management. Participants will gain insights into the Basel Accords, with a specific focus on Basel II, understanding its principles and recognizing event types. After the successful completion of the course, you will be able to learn about the following,⦁ Comprehend the concept of operational risk.⦁ Identify different types of operational risk.⦁ Understand the fundamentals of Operational Risk Management.⦁ Describe the Basel Accords.⦁ Explain the principles of Basel II.⦁ Recognize the event types under Basel II. The course begins by elucidating the foundational concept of operational risk, followed by an in-depth exploration of various risk types. Participants will then delve into the intricacies of Operational Risk Management principles. The latter part of the course is dedicated to a detailed description of the Basel Accords, with a focus on Basel II, where participants will gain knowledge about its principles and the categorization of event types. This course empowers participants to grasp the nuances of operational risk, covering its conceptual intricacies, diverse risk types, and the essential principles of Operational Risk Management. A detailed exploration of the Basel Accords, with a specific focus on Basel II principles and the identification of event types, ensures a comprehensive understanding of regulatory frameworks and their practical applications in risk management. Course Structure and Assessment Guidelines Watch this video to gain further insight. Navigating the MSBM Study Portal Watch this video to gain further insight. Interacting with Lectures/Learning Components Watch this video to gain further insight. Understanding the concept of Operational Risk Self-paced pre-recorded learning content on this topic. The Concept of Operational Risk: Put your knowledge to the test with this quiz. Read each question carefully and choose the response that you feel is correct. All MSBM courses are accredited by the relevant partners and awarding bodies. Please refer to MSBM accreditation in about us for more details. There are no strict entry requirements for this course. Work experience will be added advantage to understanding the content of the course. The certificate is designed to enhance the learner's knowledge in the field. This certificate is for everyone eager to know more and get updated on current ideas in their respective field. We recommend this certificate for the following audience. Risk Analyst Operational Risk Manager Compliance Officer Basel II Specialist Risk Management Consultant Average Completion Time 2 Weeks Accreditation 3 CPD Hours Level Advanced Start Time Anytime 100% Online Study online with ease. Unlimited Access 24/7 unlimited access with pre-recorded lectures. Low Fees Our fees are low and easy to pay online.

Professional Certificate Course in the Concept of Operational Risk in London 2024
Delivered Online On Demand14 days
£39

Professional Certificate Course in Exploring the Concept of Working Capital Management in London 2024

4.9(261)

By Metropolitan School of Business & Management UK

The course "Exploring the Concept of Working Capital Management" aims to equip learners with the knowledge and skills to manage a company's working capital effectively. After the successful completion of the course, you will be able to learn the following: Define the concept of working capital and explain its significance in a business context. Classify working capital and identify its components, including cash, inventory, accounts receivable, and accounts payable. Describe the working capital cycle and its various stages. Analyze the factors that affect the composition of working capital, such as business size, industry, and operating cycle. Differentiate between static and dynamic views of working capital, and explain their implications for effective management. Identify the determinants of working capital and explain how they impact a company's financial performance. The course "Exploring the Concept of Working Capital Management" covers various aspects of working capital management, including its definition, importance, and components. It also explores various methods and techniques for managing working capital effectively, such as cash flow analysis, inventory control, and accounts receivable and payable management. The course provides practical insights into short-term financing options and their impact on working capital management. This course explores the concept of working capital management, including the techniques and tools used to manage a company's short-term assets and liabilities. Students will learn about working capital strategies, cash management, and financial forecasting to optimize a company's cash flow and liquidity. VIDEO - Course Structure and Assessment Guidelines Watch this video to gain further insight. Navigating the MSBM Study Portal Watch this video to gain further insight. Interacting with Lectures/Learning Components Watch this video to gain further insight. Exploring the Concept of Working Capital Management Self-paced pre-recorded learning content on this topic. Exploring the Concept of Working Capital Management Put your knowledge to the test with this quiz. Read each question carefully and choose the response that you feel is correct. All MSBM courses are accredited by the relevant partners and awarding bodies. Please refer to MSBM accreditation in about us for more details. There are no strict entry requirements for this course. Work experience will be added advantage to understanding the content of the course. The certificate is designed to enhance the learner's knowledge in the field. This certificate is for everyone eager to know more and get updated on current ideas in their respective field. We recommend this certificate for the following audience. Financial Analyst Treasury Manager Cash Manager Credit Analyst Working Capital Manager Business Analyst Financial Controller CFO (Chief Financial Officer) Accountant Management Accountant Financial Consultant Risk Manager Operations Manager Supply Chain Manager Procurement Manager. Average Completion Time 2 Weeks Accreditation 3 CPD Hours Level Advanced Start Time Anytime 100% Online Study online with ease. Unlimited Access 24/7 unlimited access with pre-recorded lectures. Low Fees Our fees are low and easy to pay online.

Professional Certificate Course in Exploring the Concept of Working Capital Management in London 2024
Delivered Online On Demand14 days
£29

First Novel First Draft 2. From Concept to Plot

By London Writing School

From concept to plot: Creating a story from a spark or moment of inspiration, how your main character drives the plot and making notes on how your story will develop, starting your outline (if you want one) and developing your writing process.

First Novel First Draft 2. From Concept to Plot
Delivered Online On Demand1 hour 10 minutes
£20

AWS Security Essentials

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for Security IT business-level professionals interested in cloud security practices Security professionals with minimal to no working knowledge of AWS Overview Assimilate Identify security benefits and responsibilities of using the AWS Cloud Describe the access control and management features of AWS Explain the available methods for providing encryption of data in transit and data at rest when storing your data in AWS. Describe how to secure network access to your AWS resources Determine which AWS services can be used for monitoring and incident response This course covers fundamental AWS cloud security concepts, including AWS access control, data encryption methods, and how network access to your AWS infrastructure can be secured. Based on the AWS Shared Security Model, you learn where you are responsible for implementing security in the AWS Cloud and what security-oriented services are available to you and why and how the security services can help meet the security needs of your organization. Prerequisites Working knowledge of IT security practices and infrastructure concepts, familiarity with cloud computing concepts 1 - Security on AWS Security design principles in the AWS Cloud AWS Shared Responsibility Model 2 - Security OF the Cloud AWS Global Infrastructure Data center security Compliance and governance 3 - Security IN the Cloud ? Part 1 Identity and access management Data protection essentials Lab 01 ? Introduction to security policies 4 - Security IN the Cloud ? Part 2 Securing your infrastructure Monitoring and detective controls Lab 02 ? Securing VPC resources with Security Groups 5 - Security IN the Cloud ? Part 3 DDoS mitigation Incident response essentials Lab 03 ? Remediating issues with AWS Config Conformance Packs 6 - Course Wrap Up AWS Well-Architected tool overview Next Steps Additional course details: Nexus Humans AWS Security Essentials training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AWS Security Essentials course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

AWS Security Essentials
Delivered Online
£675

DP-900T00 Microsoft Azure Data Fundamentals

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for The audience for this course is individuals who want to learn the fundamentals of database concepts in a cloud environment, get basic skilling in cloud data services, and build their foundational knowledge of cloud data services within Microsoft Azure. Overview Describe core data concepts Identify considerations for relational data on Azure Describe considerations for working with non-relational data on Azure Describe an analytics workload on Azure In this course, students will gain foundational knowledge of core data concepts and related Microsoft Azure data services. Students will learn about core data concepts such as relational, non-relational, big data, and analytics, and build their foundational knowledge of cloud data services within Microsoft Azure. Students will explore fundamental relational data concepts and relational database services in Azure. They will explore Azure storage for non-relational data and the fundamentals of Azure Cosmos DB. Students will learn about large-scale data warehousing, real-time analytics, and data visualization. 1 - Explore core data concepts Identify data formats Explore file storage Explore databases Explore transactional data processing Explore analytical data processing 2 - Explore data roles and services Explore job roles in the world of data Identify data services 3 - Explore fundamental relational data concepts Understand relational data Understand normalization Explore SQL Describe database objects 4 - Explore relational database services in Azure Describe Azure SQL services and capabilities Describe Azure services for open-source databases 5 - Explore Azure Storage for non-relational data Explore Azure blob storage Explore Azure DataLake Storage Gen2 Explore Azure Files Explore Azure Tables 6 - Explore fundamentals of Azure Cosmos DB Describe Azure Cosmos DB Identify Azure Cosmos DB APIs 7 - Explore fundamentals of large-scale data warehousing Describe data warehousing architecture Explore data ingestion pipelines Explore analytical data stores 8 - Explore fundamentals of real-time analytics Understand batch and stream processing Explore common elements of stream processing architecture Explore Azure Stream Analytics Explore Apache Spark on Microsoft Azure 9 - Explore fundamentals of data visualization Describe Power BI tools and workflow Describe core concepts of data modeling Describe considerations for data visualization

DP-900T00 Microsoft Azure Data Fundamentals
Delivered Online
£595

Professional Certificate in Understanding the Concept and Classification of Sources of Funds in London 2024

4.9(261)

By Metropolitan School of Business & Management UK

This course is designed to provide the learner with an understanding of organizational financing sources. The learner will be able to identify, analyze and appraise different sources of finance and factors affecting the selection of the source of funds. After the successful completion of this lecture, you will be able to understand the following: Understanding the concept of sources of finance. Study the various classification of sources of funds. Understand the various merits and demerits of sources of funds. The factors affecting the sources of funds. VIDEO - Course Structure and Assessment Guidelines Watch this video to gain further insight. Navigating the MSBM Study Portal Watch this video to gain further insight. Interacting with Lectures/Learning Components Watch this video to gain further insight. Understanding the Concept and Classification of Sources of Funds Self-paced pre-recorded learning content on this topic. Quiz: Understanding The Concept And Classification Of Sources Of Funds Put your knowledge to the test with this quiz. Read each question carefully and choose the response that you feel is correct. All MSBM courses are accredited by the relevant partners and awarding bodies. Please refer to MSBM accreditation in about us for more details. There are no strict entry requirements for this course. Work experience will be added advantage to understanding the content of the course. The certificate is designed to enhance the knowledge of the learner in the field. This certificate is for everyone eager to know more and gets updated on current ideas in their respective field. We recommend this certificate for the following audience. CEO, Director, Manager, Supervisor Learning and Development Manager Finance Manager Chief Finacial Officer Accounting specialist Investment Analysis Specialist Operations Manager Team Lead Average Completion Time 2 Weeks Accreditation 1 CPD Hour Level Advanced Start Time Anytime 100% Online Study online with ease. Unlimited Access 24/7 unlimited access with pre-recorded lectures. Low Fees Our fees are low and easy to pay online.

Professional Certificate in Understanding the Concept and Classification of Sources of Funds in London 2024
Delivered Online On Demand14 days
£29

ADM940 SAP AS ABAP - Authorization Concept

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Program / Project ManagerSystem ArchitectSystem Administrator Overview Learn about the elements, strategies, and tools of the SAP authorization conceptCreate and assign authorizations using the Role Administration / Profile GeneratorLearn about the principle usage of the NetWeaver Identity Management and Central User Administration (CUA) In this course, students will learn about the elements, strategies, and tools of the SAP authorization concept, create and assign authorizations using the Role Administration/Profile Generator, & learn about the Central User Administration role. Authorizations Describing Authorization Authorization Concepts for Compliant Identity Management Designing Authorization for an AS ABAP-Based System Implementing Authorization for an AS ABAP-Based System Authorization Terminology Defining the Authorization Elements and Terms Checking Authorizations in ABAP Systems User Maintenance Maintaining User Data Basic Role Maintenance Defining a Role Defining Authorizations in a Role Defining Customizing Roles Creating Composite Roles Creating Reference and Derived Roles Maintaining Roles for SAP NetWeaver Business Client Advanced Role Maintenance Applying the Special Functions of Authorization Maintenance Defining Authorizations for a System User Authorization Environment Configuration Installing and Upgrading Role Maintenance Configuring Role Maintenance Defining System Settings Analyzing Missing Authorizations Transporting Authorizations Integration of Authorization Systems into an Organization's Landscape Creating Users with the Central User Administration (CUA) Migrating the CUA into SAP NetWeaver Identity Management (ID Management) Identifying Non-Standard Authorization Concepts in the SAP Business Suite Integrating Authorization Assignments with Organizational Management SAP Systems for Identity Management Identifying Different User Sources Describing SAP NetWeaver Identity Management (ID Management) Planning SAP Governance, Risk, and Compliance (SAP GRC) Describing Compliant Identity Management (CIM) Additional course details: Nexus Humans ADM940 SAP AS ABAP - Authorization Concept training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the ADM940 SAP AS ABAP - Authorization Concept course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

ADM940 SAP AS ABAP - Authorization Concept
Delivered OnlineFlexible Dates
Price on Enquiry

Certified Information Security Systems Professional (CISSP)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for experienced IT security-related practitioners, auditors, consultants, investigators, or instructors, including network or security analysts and engineers, network administrators, information security specialists, and risk management professionals, who are pursuing CISSP training and certification to acquire the credibility and mobility to advance within their current computer security careers or to migrate to a related career. Through the study of all eight CISSP Common Body of Knowledge (CBK) domains, students will validate their knowledge by meeting the necessary preparation requirements to qualify to sit for the CISSP certification exam. Additional CISSP certification requirements include a minimum of five years of direct professional work experience in two or more fields related to the eight CBK security domains, or a college degree and four years of experience. Overview #NAME? In this course, students will expand upon their knowledge by addressing the essential elements of the 8 domains that comprise a Common Body of Knowledge (CBK)© for information systems security professionals. Prerequisites CompTIA Network+ Certification 1 - Security and Risk Management Security Governance Principles Compliance Professional Ethics Security Documentation Risk Management Threat Modeling Business Continuity Plan Fundamentals Acquisition Strategy and Practice Personnel Security Policies Security Awareness and Training 2 - Asset Security Asset Classification Privacy Protection Asset Retention Data Security Controls Secure Data Handling 3 - Security Engineering Security in the Engineering Lifecycle System Component Security Security Models Controls and Countermeasures in Enterprise Security Information System Security Capabilities Design and Architecture Vulnerability Mitigation Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems Cryptography Concepts Cryptography Techniques Site and Facility Design for Physical Security Physical Security Implementation in Sites and Facilities 4 - Information Security Management Goals Organizational Security The Application of Security Concepts 5 - Information Security Classification and Program Development Information Classification Security Program Development 6 - Risk Management and Ethics Risk Management Ethics 7 - Software Development Security Software Configuration Management Software Controls Database System Security 8 - Cryptography Ciphers and Cryptography Symmetric-Key Cryptography Asymmetric-Key Cryptography Hashing and Message Digests Email, Internet, and Wireless Security Cryptographic Weaknesses 9 - Physical Security Physical Access Control Physical Access Monitoring Physical Security Methods Facilities Security

Certified Information Security Systems Professional (CISSP)
Delivered Online
£3,395

55366 Querying Data with Transact-SQL

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for novice database developers, database administrators, Business Intelligence developers, report creators, and application developers who have an understanding of relational database concepts and have basic Windows navigation skills. Overview Create single table SELECT queries Create multiple table SELECT queries Filter and sort data Insert, update, and delete data Query data using built-in functions Create queries that aggregate data Create subqueries Create queries that use table expressions Use UNION, INTERSECT, and EXCEPT on multiple sets of data Implement window functions in queries Use PIVOT and GROUPING SETS in queries Use stored procedures in queries Add error handling to queries Use transactions in queries This five-day instructor-led course is intended for IT professionals who wish to use the Transact-SQL language to query and configure Microsoft SQL Server. Students are typically database developers and database administrators, but might also be Business Intelligence developers, report creators, or application developers. In this course, students learn how to query single tables, join data from multiple tables, filter and sort data, modify data, use procedures and functions, and implement error handling. Prerequisites Basic understanding of relational databases. Basic Windows knowledge. Module 1: Introduction to Transact-SQL What is Transact-SQL The SELECT statement The WHERE clause Sorting results Calculations CASE expressions Module 2: Joining tables with Transact-SQL The JOIN clause Inner joins Outer joins Self joins and cross joins Module 3: Filtering and sorting results Implement the ORDER BY clause Filter data with the WHERE clause Limit the number of rows returned by a query Implement NULL logic Module 4: SQL Server data types Understand data types Implement string data types Implement temporal data types Module 5: Inserting, updating and deleting data Insert new records Update existing records Delete data Module 6: Using SQL Server functions with Transact-SQL Understand function types in SQL Server Convert data using functions Implement logical functions Work with NULL data using functions Module 7: Aggregating data with Transact-SQL Implement aggregation in SQL Server Group records in SQL Server Filter aggregated data Module 8: Implement subqueries with Transact-SQL Implement scalar and multi-valued sub-queries Implement correlated subqueries Implement existence checks with subqueries Module 9: Create queries that use table expressions Create views Create table-valued functions Implement derived tables Implement common table expressions Module 10: Use UNION, INTERSECT, EXCEPT and APPLY on multiple sets of data Write queries with the UNION operator Write queries with the INTERSECT and EXCEPT operators Write queries with the APPLY operator Module 11: Implement window functions in queries Understand window functions Impement window functions Module 12: Use PIVOT and grouping sets in queries Implement PIVOT in queries Implement grouping sets in queries Module 13: Use stored procedures in queries Query data with stored procedures Interact with stored procedures using input and output parameters Write simple stored procedures Pass dynamic SQL to SQL Server Module 14: Implement programming features in Transact-SQL Understand T-SQL programming elements Implement loops and conditions in T-SQL queries Module 15: Add error handling to queries Understand SQL Server error handling Implemet structured exception handling Module 16: Use transactions in queries Understand database transactions Implement transactions in T-SQL

55366 Querying Data with Transact-SQL
Delivered Online
£2,976