• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1543 Courses in Cardiff delivered Live Online

GIRLS’ EMOTIONAL NEEDS

By Inclusive Solutions

This workshop gives an opportunity to focus on the emotional needs of girls and how to meet these. We lift the lid on a less well explored inclusion issue, meeting the emotional needs of girls. Everyone knows a girl or woman. They may be pupil, daughter, sister, parent or partner. Course Category Meeting emotional needs Behaviour and Relationships Inclusion Early Years Description This workshop gives an opportunity to focus on the emotional needs of girls and how to meet these. We lift the lid on a less well explored inclusion issue, meeting the emotional needs of girls. Everyone knows a girl or woman. They may be pupil, daughter, sister, parent or partner. Girls will often withdraw, attack or even hurt themselves when under emotional stress and this is not always obvious in the way it is with boys. 1 in 4 women experience domestic violence and every week 2 women are killed by a current or ex partner. Whilst the world assumes girls have no problems processing their emotions, we lift the lid on this and question what is really happening for girls this century? Testimonials Learning Objectives Increased understanding of girls’ emotional needs Access to a wider range of practical strategies to impact on meeting emotional and behaviour problems Deeper understanding of core values surrounding inclusion Opportunity to reflect on professional attitudes and behaviour towards girls and their emotional challenges New skills and processes to make girls’ inclusion and achievement more successful Who Is It For ? Early years and school based practitioners Key workers Teaching Assistants with support roles Heads and deputies SENCOs Advanced skills teachers Primary and secondary classroom teachers Parents Local Authority support services Course Content The course explores the questions : Is there an invisible problem with girls? What can we do to meet the emotional needs of girls? What helps? What should our priority be with girls? This workshop will explore: Cultural and historical expectations of girls in our society Shared experiences of teaching and parenting girls Circle of Courage as a way of understanding emotional needs Fathers, mothers and daughters Solution Circle Problem Solving around girls’ needs What girls really need If you you want something similar, but not gender specific try: FRESH APPROACHES TO BEHAVIOUR AND RELATIONSHIPS or you may like: RESTORATIVE INTERVENTIONS

GIRLS’ EMOTIONAL NEEDS
Delivered in UK Wide Travel Costs or OnlineFlexible Dates
£1,800 to £2,500

Certified Information Privacy Technologist (CIPT)

By Training Centre

  The CIPT is the first and only certification of its kind worldwide. It was launched by the IAPP in 2014 and updated in early 2023 to meet the growing need that only tech pros can fill-securing data privacy at all stages of IT product and service lifecycles.  Whether you work in the public or private sector, data privacy skills are quickly becoming a must-have-and that's a great opportunity for you.  The CIPT certification also holds accreditation under ISO 17024: 2012 About This Course   What will you learn?   Critical data protection concepts and practices that impact IT Consumer data protection expectations and responsibility How to bake privacy into early stages of IT products and services for cost control, accuracy and speed-to-market How to establish data protection practices for data collection and transfer How to pre-empt data protection issues in the Internet of Things How to factor data protection into data classification and emerging tech such as cloud computing, facial recognition and surveillance How to communicate data protection issues with partners such as management, development, marketing and legal.   This course has two programmatic modules, the first four areas focus on the fundamentals of data protection. The second module takes the fundamentals and puts it into practice.   MODULE 1: Fundamentals of Information Privacy   Unit 1: Common Principles and Approaches to Privacy This unit includes a brief discussion of the modern history of privacy, an introduction to types of information, an overview of information risk management and a summary of modern privacy principles.   Unit 2: Jurisdiction and Industries This unit introduces the major privacy models employed around the globe and provides an overview of privacy and data protection regulation by jurisdictions and industry sectors.   Unit 3: Information Security: Safeguarding Personal Information This unit presents introductions to information security, including definitions, elements, standards and threats/vulnerabilities, as well as introductions to information security management and governance, including frameworks, controls, cryptography and identity and access management (IAM).   Unit 4: Online Privacy: Using Personal Information on Websites and with Other Internet-related Technologies This unit examines the web as a platform, as well as privacy considerations for sensitive online information, including policies and notices, access, security, authentication and data collection. Additional topics include children's online privacy, email, searches, online marketing and advertising, social media, online assurance, cloud computing and mobile devices.    MODULE 2: Privacy in Technology   Unit 1: Understanding the Need for Privacy in the IT Environment This unit highlights the impact that regulatory activities, security threats, advances in technology and the increasing proliferation of social networks have on IT departments.   Unit 2: Core Privacy Concepts This unit reveals how privacy compliance becomes more attainable through developing information lifecycle plans, data identification and classification systems and data flow diagrams.   Unit 3: Regulations and Standards Impacting Privacy in IT This unit introduces privacy laws, regulations and standards that can help IT professionals design better privacy programmes and systems to handle personal information throughout the data lifecycle.   Unit 4: Privacy in Systems and Applications This unit develops an understanding of the risks inherent in the IT environment and how to address them.   Unit 5: Online Privacy Issues This unit presents information about online threats, threat prevention and the role of IT professionals in ensuring proper handling of user data.   Unit 6: De-identifying and Anonymizing Personally Identifiable Information This unit reveals the importance of personally identifiable information and methods for ensuring its protection.   Unit 7: Cloud Computing This unit evaluates privacy and security concerns associated with cloud services, and standards that exist to advise on their use. Prerequisites   There are no prerequisites for this course but attendees would benefit from a review of the materials on the IAPP site. What's Included?   1 years membership of the IAPP  Refreshments & Lunch (Classroom courses only) Participant Guide Official Study Guides Official Practice Exam Official Q&A The Exam Fees Who Should Attend?   The CIPT credential shows you've got the knowledge to build your organisation's data protection structures from the ground up. With regulators worldwide calling for tech professionals to factor data protection into their products and services, the job market for privacy-trained IT pros has never been stronger. As a result, the CIPT is targeted towards; Data Protection Officers IT Managers and Administrators Records Managers System Developers IT Security specialists Accreditation Our Guarantee   We are an approved IAPP Training Partner. You can learn wherever and whenever you want with our robust classroom and interactive online training courses. Our courses are taught by qualified practitioners with a minimum of 25 years commercial experience. We strive to give our delegates the hands-on experience. Our courses are all-inclusive with no hidden extras.  The one-off cost covers the training, all course materials, and exam voucher. Our aim: To achieve a 100% first time pass rate on all our instructor-led courses. Our Promise: Pass first time or 'train' again for FREE. *FREE training offered for retakes - come back within a year and only pay for the exam.

Certified Information Privacy Technologist (CIPT)
Delivered OnlineFlexible Dates
£1,395

MENTAL HEALTH – UNDERSTANDING AND MEETING NEEDS

By Inclusive Solutions

In this course we explore Mental Health and address how such needs can be met in mainstream classrooms. Course Category Behaviour and Relationships Meeting Emotional Needs Description This is our lead workshop/training day on understanding mental health, behaviour and relationship work in schools other settings and is both a values primer and a practical guide to successful innovative strategies for improving behaviour and strengthening relationships for challenging children and young people of all ages. Not just another day on ‘Behaviour Management’ – Our Mental Health Day goes well beyond a rewards and sanctions approach to ‘behaviour’. We will be focused on those young people for whom rewards and punishments do not always work and who confuse the adults who work with them. We aim to take a relationships-based approach and to give those attending an opportunity to think more deeply about why young people do the things they do and what our part as adults is in creating, sustaining and changing these behaviours. The day gives those present opportunities to reflect on their attitudes and practice in relation to children’s behaviour and relationship building.   If your usual approaches to managing tackling mental health needs aren’t working with particular individuals then take a tour through this range of cutting edge strategies for bringing about positive behaviour change, and for meeting challenging emotional needs  Learning Objectives reinforce and affirm good practice re-energise, stimulate and challenge thinking about inclusion of challenging pupils and children increased understanding of mental health increased confidence in managing challenging pupils in mainstream schools access to a wider range of practical strategies to impact on behaviour problems opportunity to reflect on professional attitudes and behaviour towards mental health in families and pupils Who Is It For ?  Anyone concerned with understanding and meeting emotional and mental health needs  Course Content Circle of Courage – belonging-achievement-generosity – independence – model for understanding mental health Compass of Anxiety – understanding and going deeper Active listening – Listening to the person underneath the behaviour Involving other children and young people in solutions and interventions - Circles of friends: peer support, counselling and mediation Team Problem Solving – Solution Circles: a 30 minute group problem solving process to get Teams ‘unstuck’ and to generate positive first action steps Restorative justice and restitution: principles and practice of this approach to repairing harm and restoring relationships without reliance on punishment Understanding the effects of Separation, Loss, Trauma and Neglect on children’s learning and relationships in school and what adults can do to reach and support these children

MENTAL HEALTH – UNDERSTANDING AND MEETING NEEDS
Delivered in UK Wide Travel Costs or OnlineFlexible Dates
£1,800 to £2,500

EMOTIONAL WELLBEING

By Inclusive Solutions

This workshop gives an opportunity to focus on the emotional needs of children and young people and how to meet these. We lift the lid on an emerging urgent inclusion issue, meeting the emotional well being of all children. In one year 1300 young men committed suicide in the UK. In the UK the commonest cause of death among those aged 16-35 is suicide. Online Course now available via Teachable Platform – Understanding children’s Emotional Needs Learn at your own pace… lots of text and video support Course Category Behaviour and Relationships Meeting emotional needs Early Years Inclusion Description This workshop gives an opportunity to focus on the emotional needs of children and young people and how to meet these. We lift the lid on an emerging urgent inclusion issue, meeting the emotional well being of all children. In one year 1300 young men committed suicide in the UK. In the UK the commonest cause of death among those aged 16-35 is suicide. 1 in 4 women experience domestic violence and 2 women a week are killed by a current or ex partner. We need to find ways to allow children to unclench their hearts and learn to experience, process, communicate and manage their own emotional lives for their own and for the good of the wider community. Testimonials Be the first…. Learning Objectives Increased understanding of emotional needs Access to a wider range of practical strategies to impact on meeting emotional and behaviour problems Deeper understanding of core values surrounding inclusion Opportunity to reflect on professional attitudes and behaviour towards children and their emotional challenges New skills and processes to make emotionally challenged children’s inclusion and achievement more successful Who Is It For ? Early years and school based practitioners Key workers Teaching Assistants with support roles Heads and deputies SENCOs Advanced skills teachers Primary and secondary classroom teachers Parents Local authority support services Course Content Shared experiences of teaching and parenting around emotional well being Circle of Courage as away of understanding emotional needs Fathers, mothers and sons and daughters Drinking and drugs, filling the emotional void Depression and suicide Anger and violence Solution Circle Problem Solving What children really need

EMOTIONAL WELLBEING
Delivered in UK Wide Travel Costs or OnlineFlexible Dates
£1,800 to £2,500

Business Intelligence: Virtual In-House Training

By IIL Europe Ltd

Business Intelligence: Virtual In-House Training Business Intelligence (BI) refers to a set of technology-based techniques, applications, and practices used to aggregate, analyze, and present business data. BI practices provide historical and current views of vast amounts of data and generate predictions for business operations. The purpose of Business Intelligence is the support of better business decision making. This course provides an overview of the technology and application of BI and how it can be used to improve corporate performance. What you will Learn You will learn how to: Specify a data warehouse schema Identify the data and visualization to be used for data mining and Business Intelligence Design a Business Intelligence user interface Getting Started Introductions Agenda Expectations Foundation Concepts The challenge of decision making What is Business Intelligence? The Business Intelligence value proposition Business Intelligence taxonomy Business Intelligence management issues Sources of Business Intelligence Data warehousing Data and information Information architecture Defining the data warehouse and its relationships Facts and dimensions Modeling, meta-modeling, and schemas Alternate architectures Building the data warehouse Extracting Transforming Loading Setting up the data and relationships Dimensions and the Fact Table Implementing many-to-many relationships in data warehouse Data marts Online Analytical Processing (OLAP) What is OLAP? OLAP and OLTP OLAP functionality Multi-dimensions Thinking in more than two dimensions What are the possibilities? OLAP architecture Cubism Tools OLAP variations - MOLAP, ROLAP, HOLAP BI using SOA Applications of Business Intelligence Applying BI through OLAP Enterprise Resource Planning and CRM Business Intelligence and financial information Business Intelligence User Interfaces and Presentations Data access Push-pull data access Types of decision support systems Designing the front end Presentation formats Dashboards Types of dashboards Common dashboard features Briefing books and scorecards Querying and Reporting Reporting emphasis Retrofitting Talking back Key Performance Indicators Report Definition and Visualization Typical reporting environment Forms of visualization Unconstrained views Data mining What is in the mine? Applications for data mining Data mining architecture Cross Industry Standard Process for Data Mining (CISP-DM) Data mining techniques Validation The Business Intelligence User Experience The business analyst role Business analysis and data analysis Five-step approach Cultural impact Identifying questions Gathering information Understand the goals The strategic Business Intelligence cycle Focus of Business Intelligence Design for the user Iterate the access Iterative solution development process Review and validation questions Basic approaches Building ad-hoc queries Building on-demand self-service reports Closed loop Business Intelligence Coming attractions - future of Business Intelligence Best practices in Business Intelligence

Business Intelligence: Virtual In-House Training
Delivered OnlineFlexible Dates
£850

SharePoint - Advanced Site Owner (Modern Experience)

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is designed for students who already have experience creating Modern SharePoint sites and populating them with content, who want to learn advanced features to extend SharePoint's capabilities, make information easier to find and manage, use SharePoint features to improve governance and compliance, and improve the security of information and services within the SharePoint environment. Overview Create a custom site template to reduce the time spent creating similarly configured SharePoint sites. Configure managed metadata, including custom term sets, content types, and metadata-based navigation. Control access through permissions. Improve overall security of sites, lists, libraries, folders, list items, and documents. Microsoft© SharePoint©, in conjunction with the Microsoft 365? productivity and office automation suite, provides tools to create and manage a corporate intranet, facilitate content sharing and collaboration, and enable users to create, access, store, and track documents and data in a central location. Users who already have experience as SharePoint site members and owners may be ready to move on to more advanced site-building tasks such as using custom site templates, custom themes, applying advanced permissions settings, improving security, and preparing sites to support governance and compliance. Advanced site builders may be ready to undertake more advanced site management tasks, working in conjunction with their SharePoint Administrator to create and use custom site templates, term sets and metadata, manage information governance and compliance, and get deeper into SharePoint security configuration. This course focuses on these advanced site-building and administration tasks. Prerequisites To ensure your success in this course, you should have SharePoint site user skills such as the ability to view and enter data in SharePoint lists and libraries, and to navigate a typical SharePoint site. You should also have intermediate site builder skills such as the ability to create a SharePoint site, apply a site template, populate sites with pages, create lists and libraries, and connect a site to a hub site. NOTE: This course was developed using Microsoft 365 Business Standard edition. If you opt to use one of the Enterprise editions, be sure to key the course activities before you deliver the class so you will be able to anticipate any differences that students might see with the edition you use. Lesson 1: Creating Custom Site Templates Topic A: Prepare a Site Script Topic B: Generate and Use a Custom Site Template Lesson 2: Managing Content Services Topic A: Plan and Configure Managed Metadata Topic B: Create and Manage Content Types Topic C: Use Managed Metadata for Navigation and Filtering Lesson 3: Controlling Access Through Permissions Topic A: Assign Permissions Topic B: Manage Permissions Inheritance Lesson 4: Improving Security Topic A: Manage Access at the Site Level Topic B: Manage Access at the Tenant Level

SharePoint - Advanced Site Owner (Modern Experience)
Delivered OnlineFlexible Dates
£495

European Data Protection & Privacy Programme Management - DPO Ready

By Training Centre

  European Data Protection   Principles of Data Protection in Europe covers the essential pan-European and national data protection laws, as well as industry-standard best practices for corporate compliance with these laws. Those taking this course will gain an understanding of the European model for privacy enforcement, key privacy terminology and practical concepts concerning the protection of personal data and trans-border data flows.   The training is based on the body of knowledge for the IAPP's ANSI-accredited Certified Information Privacy Professional/Europe (CIPP/E) certification program. Privacy Programme Management   Principles of Privacy Management is the how-to training on implementing a privacy program framework, managing the privacy program operational lifecycle and structuring a knowledgeable, high-performing privacy team. Those taking this course will learn the skills to manage privacy in an organisation through process and technology-regardless of jurisdiction or industry.   The Principles of Privacy Program Management training is based on the body of knowledge for the IAPP's ANSI-accredited Certified Information Privacy Manager (CIPM) certification programme. Make a difference in your organization and in your career. The CIPM designation says that you're a leader in privacy program administration and that you've got the goods to establish, maintain and manage a privacy program across all stages of its lifecycle.  About This Course   Delivered in a modular format, this four day course covers   Days 1 & 2   Module 1: Data Protection Laws Introduces key European data protection laws and regulatory bodies, describing the evolution toward a Harmonised European Legislative Framework.  Module 2: Personal Data Defines and differentiates between types of data-including personal, anonymous, pseudo-anonymous and special categories.  Module 3: Controllers and Processors Describes the roles and relationships of controllers and processors.  Module 4: Processing Personal Data Defines data processing and GDPR processing principles, Explains the application of the GDPR and outlines the legitimate bases for processing personal data. Module 5: Information provision Explains controller obligations for providing information about data processing activities to data subjects and Supervisory Authorities.  Module 6: Data Subjects 'Rights Describes data subjects' rights, applications of rights and obligations controller and processor.  Module 7: Security or Processing Discusses considerations and duties of controllers and processors for Ensuring security of personal data and providing notification of data breaches.  Module 8: Accountability Investigates accountability requirements, data protection management systems, data protection impact assessments, privacy policies and the role of the data protection officer.  Module 9: International Data Transfers Outlines options and obligations for transferring data outside the European Economic Area, Decisions adequacy and appropriateness safeguards and derogations.  Module 10: Supervision and Enforcement Describes the role, powers and procedures or Supervisory Authorities; the composition and tasks of the European Data Protection Board; the role of the European Data Protection Supervisor; and remedies, liabilities and penalties for non-compliance.  Module 11: Compliance Discusses the applications of European data protection law, legal bases and compliance requirements for processing personal data in practice, employers-including processing employee data, surveillance, direct marketing, Internet technology and communications and outsourcing.    Days 3 & 4   Module 1: Introduction to privacy program management Identifies privacy program management responsibilities, and describes the role of accountability in privacy program management.  Module 2: Privacy governance Examines considerations for developing and implementing a privacy program, including the position of the privacy function within the organization, role of the DPO, program scope and charter, privacy strategy, support and ongoing involvement of key functions and privacy frameworks.  Module 3: Applicable laws and regulations Discusses the regulatory environment, common elements across jurisdictions and strategies for aligning compliance with organizational strategy.  Module 4: Data assessments Relates practical processes for creating and using data inventories/maps, gap analyses, privacy assessments, privacy impact assessments/data protection impact assessments and vendor assessments.  Module 5: Policies Describes common types of privacy-related policies, outlines components and offers strategies for implementation.  Module 6: Data subject rights Discusses operational considerations for communicating and ensuring data subject rights, including privacy notice, choice and consent, access and rectification, data portability, and erasure and the right to be forgotten.  Module 7: Training and awareness Outlines strategies for developing and implementing privacy training and awareness programs.  Module 8: Protecting personal information Examines a holistic approach to protecting personal information through privacy by design.  Module 9: Data breach incident plans Provides guidance on planning for and responding to a data security incident or breach.  Module 10: Measuring, monitoring and auditing program performance Relates common practices for monitoring, measuring, analyzing and auditing privacy program performance Prerequisites   There are no prerequisites for this course but attendees would benefit from a review of the materials on the IAPP SITE What's Included?   1 years membership of the IAPP Breakfast, Lunch, mid-morning and afternoon snacks, teas, coffees Official Study Guides* Official Participant Guides* Official Exam Q&A's* Both exam fees * In electronic format for Live Online and hard copy for Classroom delegates     Who Should Attend?   This course is suitable for aspiring Data Protection Officers, as well as Information Security Managers, Lawyers, Data Managers, Analysts and Risk Teams. Provided by Our Guarantee   We are an approved IAPP Training Partner. You can learn wherever and whenever you want with our robust classroom and interactive online training courses. Our courses are taught by qualified practitioners with a minimum of 25 years commercial experience. We strive to give our delegates the hands-on experience. Our courses are all-inclusive with no hidden extras.  The one-off cost covers the training, all course materials, and exam voucher. Our aim: To achieve a 100% first time pass rate on all our instructor-led courses. Our Promise: Pass first time or 'train' again for FREE. *FREE training offered for retakes - come back within a year and only pay for the exam.

European Data Protection & Privacy Programme Management - DPO Ready
Delivered OnlineFlexible Dates
£2,750

MENTAL HEALTH – MEETING EMOTIONAL NEEDS IN SCHOOLS

By Inclusive Solutions

This training gives an opportunity to focus on how to embed effective approaches to meeting emotional needs in schools. We explore a range of ways into meeting emotional needs of pupils across a school. We focus on including pupils with extreme emotional needs. Course Category Meeting emotional needs Description This training gives an opportunity to focus on how to embed relevant ideas and materials in schools. We explore how to make these materials really come to life as we explore a range of ways into meeting emotional needs of pupils across a school. We focus on including pupils with extreme emotional needs. There are lots of opportunities for personal and professional reflection on engagement with challenging pupils as we provide processes to support reflection, visioning and problem solving. Testimonials ‘Thank you so much for the work you did with us yesterday – I have since been in 2 schools today and have spoken to an number of other colleagues who were present – all were totally overwhelmed by the session – they loved it.”NOTTINGHAM SEAL COORDINATOR “I was totally blown away, when I realised how passionate people were about SEAL” “So nice to reflect and realise what a long way we have come” “That was so powerful and motivational”.’ Learning Objectives Shared vision of a school that is truly meeting all social and emotional needs Access to a wider range of practical strategies to impact on meeting emotional and behaviour problems Deeper understanding of how to embed positive Mental Health approaches in a school Opportunity to reflect on professional attitudes and behaviour towards children with emotional challenge Who Is It For? All practitioners who are leading on Mental Health work in schools or on behalf of a Local Authority Full range of agencies committed to meeting social and emotional needs in schools Course Content The training explores the questions: What would a school look like when Mental Health was truly part of everything that was happening, a shared vision? How can we truly embed Mental Health approaches and materials in our school? What can we do to meet complex and challenging emotional needs in schools? Can we learn a process to understand at a deeper level highly complex social and emotional needs? This training will cover: Bringing positive Mental Health approaches to life in schools: creating a shared vision and a set of grounded goals together Circle of Adults process for self-reflection and understanding emotional needs of high profile pupils. We will model and teach how this process links in and strengthens PSHE work in schools. If you liked this try: FRESH APPROACHES TO BEHAVIOUR AND RELATIONSHIPS or: RESTORATIVE INTERVENTIONS

MENTAL HEALTH – MEETING EMOTIONAL NEEDS IN SCHOOLS
Delivered in UK Wide Travel Costs or OnlineFlexible Dates
£1,800 to £2,500

MySQL for developers

5.0(3)

By Systems & Network Training

MySQL for developers training course description This MySQL Developers training course is designed for MySQL Developers who have a good understanding of a MySQL database and experience of using SQL commands. The course provides further practical experience in more advanced MySQL commands and SQL statements including Stored Routines, Triggers and Event Scheduling. What will you learn Provide the skills needed to write more advanced queries and database maintenance statements on a MySQL database. Use advanced features of the MySQL Client. Use advanced data types. Manage the structure of databases and tables. Manage and using indexes. Write complex SQL query statements. Use advanced SQL expressions. Use advanced SQL functions. Perform advanced Insert, Update, Delete, Replace and Truncate Operations. Use user variable syntax and properties. Import and export data from within MySQL. Import and export data from the command line. Perform complex joins to access multiple tables. Perform complex subqueries. Create, manage and us views. Use prepared statements. Create and use stored routines. Create and use triggers. Obtain database metadata. Optimize queries. Work with the main storage engines. Debug MySQL applications. MySQL for developers training course details Who will benefit: MySQL Developers who have a basic understanding of a MySQL database and SQL commands as covered on the Introduction to MySQL course. Prerequisites: MySQL foundation Duration 5 days MySQL for developers training course contents Introduction Administration and Course Materials, Course Structure and Agenda, Delegate and Trainer Introductions. Client/server concepts MySQL client/server architecture, Server modes, Using client programs, Logging in options, Configuration files, Precedence of logging in options Hands on Using client/server The MySQL client program Using MySQL interactively, The MySQL prompts, Client commands and SQL statements, Editing, Selecting a database, Help, Safe updates, Using script files, Using a source file, Redirecting output into a file, Command line execution, Mysql output formats, Overriding the defaults, Html and xml output, MySQL Utilities. Hands on Using the MySQL client program Data types Bit data type, Numeric data types, Auto_increment, Character string data types, Character sets and collation, Binary string data types, Enum and Set data types, Temporal data types, Timezone support, Handling Missing Or Invalid Data Values, SQL_MODE options. Hands on Using data types Identifiers Using Quotes with identifier naming, Case sensitivity in Identifier naming, Qualifying columns with table and database names, Using reserved words as identifiers, Function names Hands on Using identifiers Databases Database properties, Creating a database, Selecting a database, Altering databases, Dropping databases, Obtaining database metadata, The SHOW command, The INFORMATION_SCHEMA database, The SHOW CREATE command Hands on Using databases Tables and indexes Table properties, Creating tables, Create table using Select or Like, Temporary tables and memory tables, Altering tables, Adding columns, Changing column widths and types, Renaming columns, Dropping columns, Adding constraints, Dropping constraints, Renaming tables, Change the table storage engine, Multiple alterations, Dropping tables, Emptying tables, Obtaining table metadata, Show create table, The information_schema, Index introduction, Structure of a mysql index, Creating and dropping indexes, Creating an index, Altering a table to add an index, Specifying index type, Dropping indexes, Obtaining Index Metadata. Hands on Creating, altering and dropping tables/indexes Querying for data The SQL select statement and MySQL differences, Advanced order by, Order by and collation, Order by with enum datatype, Order by with Set datatype, Ordering with distinct and group by Special features of union, Limit and order by clauses, Group By clause, Group_concat, Using Rollup in a Group By clause. Hands on Querying for data SQL Expressions and functions Components of expressions, Nulls, Numeric expressions, String expressions, Temporal expressions, Comparison functions, Flow control functions, Numeric functions, String functions, Temporal functions. Hands on Using expressions and functions Updating data Update operations and privileges, Inserting rows, Insert using a set clause, Inserting duplicate values, Replacing rows, Updating rows, Update using the order by and limit clauses, Deleting rows, The delete and truncate statements. Exercise: Inserting, updating, replacing and deleting data Connectors MySQL client interfaces, MySQL connectors, Oracle and community conectors, Connecting to MySQL server using Java and PHP connectors, MySQL and NoSQL, Innodb integration with memcached. Obtaining database metadata What is metadata?, The mysqlshow utility, The show and describe commands, Describing tables, The information_schema, Listing tables, Listing columns, Listing views, Listing key_columns_usage. Hands on Obtaining database metadata Debugging Mysql error messages, The show statement, Show errors, Show count(*) errors, Show warnings, Show count(*) warnings, Note messages, The perror utility. Hands on Debugging Joins Overview of inner joins, Cartesian product, Inner joins with original syntax, Non equi-join, Using table aliases to avoid name clashes, Inner Joins With ISO/ANSI Syntax, Outer Joins, Left outer joins, Right outer joins, Full outer joins, Updating multiple tables simultaneously, Updating rows in one table based on a condition in another, Updating rows in one table reading data from another, Deleting from multiple tables simultaneously, Deleting rows in one table based on a condition in another. Hands on Coding joins Subqueries Types of subquery, Multiple-column subqueries, Correlated subqueries, Using the ANY, ALL and SOME operators, Using the EXISTS operator, Subqueries as scalar expressions, Inline views, Converting subqueries to joins, Using subqueries in updates and deletes. Hands on Coding subqueries Views Why views are used, Creating views, View creation restrictions, View algorithms, Updateable views, Altering and dropping views, Displaying information about views, Privileges for views. Hands on Using views Import and Export Exporting using SQL, Privileges required to export data, Importing using SQL, Messages when loading data, Privileges required to load data, Exporting from the command line, Mysqldump main options, Importing from the command line, Mysqlimport main options. Hands on Importing and exporting User variables and prepared statements Creating User variables, User variables in a select, Prepared statements, The prepare statement, The execute statement, The deallocate statement, Using prepared statements in code, with connectors. Hands on Using variables and prepared statements Introduction to stored routines Types of stored routines, Benefits of stored routines, Stored routine features, Differences between procedures and functions, Introduction to the Block, Declaring variables and constants, Assigning values to variables, Definer rights and invoker rights, Using SELECT in stored routines, Altering and dropping stored routines, Obtaining stored routine metadata, Stored routine privileges and execution security. Hands on Writing simple stored routines Stored routines - program logic The IF .. THEN .. ELSEIF construct, The CASE statement, The basic loop, The while loop, The repeat loop, The iterate statement, Nested loops. Hands on Writing stored routines with program logic Stored routines - exception handlers and cursors Dealing with errors using Exception handlers, Cursors, What is a cursor?, Cursor operations, Declaring cursors, Opening and closing cursors, Fetching rows, Status checking. Hands on Writing stored routines with program logic Procedures with parameters Creating procedures with parameters, Calling Procedures With Parameters. Hands on Writing stored routines with parameters Functions What is a function?, The create function statement, Executing functions, Executing functions from code, Executing functions from SQL statements, The deterministic and SQL clauses. Hands on Writing functions Triggers Trigger creation, Restrictions on triggers, The create trigger statement, Using the old and new qualifiers, Managing triggers, Destroying triggers, Required privileges. Hands on Writing triggers Basic optimizations Normalisation of data to third normal form, Using indexes for optimization, General query enhancement, Using Explain to analyze queries, Choosing an INNODB or MYISAM storage engine, Using MySQL Enterprise Monitor in query optimization. Hands on Making use of basic optimizations More about indexes Indexes and joins Hands on Investigating indexes and joins

MySQL for developers
Delivered in Internationally or OnlineFlexible Dates
£2,797

KEYS TO INCLUSION: THE NEXT SET

By Inclusive Solutions

So you appreciated a Keys to Inclusion day? Wondering what next? The Next Set follows on from our lead workshop/training day and is both values driven and a practical guide to successful strategies for further developing inclusive practice in educational settings for children and young people of all ages. Course Category Inclusion Description So you appreciated a Keys to Inclusion day? Wondering what next? The Next Set follows on from our lead workshop/training day and is both values driven and a practical guide to successful strategies for further developing inclusive practice in educational settings for children and young people of all ages. On this day we explore processes and ideas ranging from the individual practitioner’s imagination through to the creating of a community gathering to strengthen inclusion of disabled and disempowered adults and children. This too is a ‘hearts and minds’ day in which you can expect participants to both laugh and cry in equal measure! The day gives those present lots of opportunities to reflect on their attitudes and practice in relation to the inclusion of pupils who are different and most challenging. Testimonials I have learned such a lot. I have learned so much. Keep an Open Mind. Really inspired! I can’t wait to share the day Learning Objectives Increased confidence regarding developing inclusive practice in mainstream schools Access to a wider range of practical strategies to impact on behaviour problems Deeper understanding of core values surrounding inclusion of disabled children Opportunity to reflect on professional attitudes and behaviour towards parents and pupils New skills and processes to make inclusion successful Who Is It For ? Early Years and School based Practitioners Heads and Deputies SENCOs Advanced Skills Teachers Primary and secondary teachers Parents Local Authority Support Services Course Content The course answers the questions : What next after a Keys day? How do we take people with us? What else can we do to go about including high profile children or young people? What does inclusion really have to do with me? Best delivered over the course of a full day, ‘Keys to Inclusion’ introduces participants to 6 guiding Ideas that underpin inclusive practice. The power of imagination Determination and persistence Growing Relationships How to help not hinder Communicating honestly and directly Creating Community Circles If you liked this course you may well like: KEYS TO INCLUSION Or: INCLUSION: IT DOESN’T JUST HAPPEN

KEYS TO INCLUSION: THE NEXT SET
Delivered in UK Wide Travel Costs or OnlineFlexible Dates
£1,800 to £2,500