• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

592 Courses in Edinburgh delivered Live Online

PL-300T00 Microsoft Power BI Data Analyst

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for The audience for this course are data professionals and business intelligence professionals who want to learn how to accurately perform data analysis using Power BI. This course is also targeted toward those individuals who develop reports that visualize data from the data platform technologies that exist on both in the cloud and on-premises. This course covers the various methods and best practices that are in line with business and technical requirements for modeling, visualizing, and analyzing data with Power BI. The course will show how to access and process data from a range of data sources including both relational and non-relational sources. Finally, this course will also discuss how to manage and deploy reports and dashboards for sharing and content distribution. Prerequisites Understanding core data concepts. Knowledge of working with relational data in the cloud. Knowledge of working with non-relational data in the cloud. Knowledge of data analysis and visualization concepts. DP-900T00 Microsoft Azure Data Fundamentals is recommended 1 - Discover data analysis Overview of data analysis Roles in data Tasks of a data analyst 2 - Get started building with Power BI Use Power BI Building blocks of Power BI Tour and use the Power BI service 3 - Get data in Power BI Get data from files Get data from relational data sources Create dynamic reports with parameters Get data from a NoSQL database Get data from online services Select a storage mode Get data from Azure Analysis Services Fix performance issues Resolve data import errors 4 - Clean, transform, and load data in Power BI Shape the initial data Simplify the data structure Evaluate and change column data types Combine multiple tables into a single table Profile data in Power BI Use Advanced Editor to modify M code 5 - Design a semantic model in Power BI Work with tables Create a date table Work with dimensions Define data granularity Work with relationships and cardinality Resolve modeling challenges 6 - Add measures to Power BI Desktop models Create simple measures Create compound measures Create quick measures Compare calculated columns with measures 7 - Add calculated tables and columns to Power BI Desktop models Create calculated columns Learn about row context Choose a technique to add a column 8 - Use DAX time intelligence functions in Power BI Desktop models Use DAX time intelligence functions Additional time intelligence calculations 9 - Optimize a model for performance in Power BI Review performance of measures, relationships, and visuals Use variables to improve performance and troubleshooting Reduce cardinality Optimize DirectQuery models with table level storage Create and manage aggregations 10 - Design Power BI reports Design the analytical report layout Design visually appealing reports Report objects Select report visuals Select report visuals to suit the report layout Format and configure visualizations Work with key performance indicators 11 - Configure Power BI report filters Apply filters to the report structure Apply filters with slicers Design reports with advanced filtering techniques Consumption-time filtering Select report filter techniques Case study - Configure report filters based on feedback 12 - Enhance Power BI report designs for the user experience Design reports to show details Design reports to highlight values Design reports that behave like apps Work with bookmarks Design reports for navigation Work with visual headers Design reports with built-in assistance Tune report performance Optimize reports for mobile use 13 - Perform analytics in Power BI Explore statistical summary Identify outliers with Power BI visuals Group and bin data for analysis Apply clustering techniques Conduct time series analysis Use the Analyze feature Create what-if parameters Use specialized visuals 14 - Create and manage workspaces in Power BI Distribute a report or dashboard Monitor usage and performance Recommend a development life cycle strategy Troubleshoot data by viewing its lineage Configure data protection 15 - Manage semantic models in Power BI Use a Power BI gateway to connect to on-premises data sources Configure a semantic model scheduled refresh Configure incremental refresh settings Manage and promote semantic models Troubleshoot service connectivity Boost performance with query caching (Premium) 16 - Create dashboards in Power BI Configure data alerts Explore data by asking questions Review Quick insights Add a dashboard theme Pin a live report page to a dashboard Configure a real-time dashboard Set mobile view 17 - Implement row-level security Configure row-level security with the static method Configure row-level security with the dynamic method Additional course details: Nexus Humans PL-300T00: Microsoft Power BI Data Analyst training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the PL-300T00: Microsoft Power BI Data Analyst course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

PL-300T00 Microsoft Power BI Data Analyst
Delivered OnlineFlexible Dates
£1,785

Red Hat system administration

5.0(3)

By Systems & Network Training

Red Hat training course description This three day hands on course provides a comprehensive coverage of core Linux administration tasks on Red Hat Linux. What will you learn Administer & configure Linux systems. Maintain Linux by handling disk space and taking regular backups. Manage software packages. Perform basic troubleshooting. Maintain a secure Linux system. Describe the organisation and implementation of the filesystem. Red Hat training course details Who will benefit: System administrators. Network administrators. Prerequisites: Linux fundamentals Duration 3 days Red Hat training course contents Managing software Package Concepts, RPM, rpm Commands, Yum, Dependencies and Conflicts, Startup Script Problems, Shared Libraries, Library Management, Managing Processes, the Kernel: The First Process, Process Lists, Foreground & Background Processes, Process Priorities, Killing Processes. Configuring hardware Configuring Firmware and Hardware, IRQs, I/O Addresses, DMA Addresses, Boot Disks, Coldplug and Hotplug Devices, Configuring Expansion Cards and PCI Cards, Kernel Modules, USB Devices, Linux USB Drivers, Configuring Hard Disks, Partitioning Systems, LVM, Common Layouts, Creating Partitions and Filesystems, Maintaining Filesystem Health, Tuning, Journals, Checking Filesystems, Monitoring Disk Use, Mounting and Unmounting Filesystems. Managing files File Management Commands, File Naming and Wildcards, File Archiving, Links, Directory Commands, File Ownership and Group, File access control, Permissions, chmod, Defaults, File Attributes, Disk Quotas, Enabling and setting Quotas, Locating Files, The FHS. Booting Linux and editing files Installing Boot Loaders, GRUB Legacy, GRUB 2, Alternative Boot Loaders, the Boot Process, Boot Messages, Runlevels and the Initialization Process, Runlevel Functions, Runlevel Services, Alternative Boot Systems , Upstart, system. Administering the system Managing Users and Groups, Tuning User and System Environments, Using System Log Files, Understanding syslogd , Setting Logging Options, Manually Logging Data, Rotating Log Files, Reviewing Log File Contents, Maintaining the System Time, Linux Time Concepts, Manually Setting the Time, Using NTP, Running Jobs in the Future, Understanding the Role of cron, Creating System cron Jobs, Creating User cron Jobs, Using anacron, Using at. Configuring basic networking TCP/IP, Network Hardware, Network Addresses, Hostnames, Network Ports, Configuring Linux for a Local Network, Configuring with DHCP, Static IP Address, Configuring Routing, Using GUI Configuration Tools, ifup and ifdown, Diagnosing Network Connections, Testing Connectivity, Tracing a Route, Checking Network Status , Examining Network Traffic, Additional Tools. Securing your systems Administering Network Security, Super Server Restrictions, Disabling Unused Servers, Administering Local Security, Securing Passwords, Limiting root Access, Setting Login, Process, SUID/SGID Files, Configuring SSH, Using GPG, Generating, Importing and Revoking Keys, Encrypting and Decrypting Data, Signing Messages and Verifying Signatures. Clustered File Systems Principles of cluster file systems. Create, maintain and troubleshoot GFS2 file systems in a cluster, create, maintain and troubleshoot OCFS2 file systems in a cluster, Integration of GFS2 and OCFS2 with Pacemaker, the O2CB cluster stack, other commonly used clustered file systems.

Red Hat system administration
Delivered in Internationally or OnlineFlexible Dates
£3,497

LAWW: Curious About AI Webinar

By Biogen Booking System

Join Us for a Webinar: Curious About AI – Empowering You Through Innovation We’re excited to invite you to an engaging virtual session, Curious About AI, where Boris Puncer will explore how artificial intelligence is transforming the way we work and unlocking new opportunities across the business. AI is more than just a technology shift—it’s a powerful enabler of change. Whether you're already familiar with AI or just starting to explore its potential, this session will provide valuable insights into how it can enhance your productivity and creativity. In this session, you’ll discover: How AI is being used to optimise everyday processes Ways AI can help enhance your personal productivity The role of AI in driving innovation across teams and functions How to leverage AI to create more time for strategic, creative thinking Real examples of how AI is already making an impact in our organisation Don’t miss this opportunity to learn how AI can empower you in your role and support a culture of innovation and efficiency. Date: Monday, 12th May Time: 10:00 – 11:00 Location: Virtual Register Now!

LAWW: Curious About AI Webinar
Delivered Online
FREE

Network automation for engineers

5.0(3)

By Systems & Network Training

Network automation course description This course is not a soft skills course covering the concepts of DevOps but instead concentrates on the technical side of tools and languages for network DevOps. Particular technologies focussed on are ansible, git and Python enabling delegates to leave the course ready to starting automating their network. Hands on sessions follow all major sections. More detailed courses on individual aspects of this course are available. What will you learn Evaluate network automation tools. Automate tasks with ansible. Use git for version control. Use Python to manage network devices. Use Python libraries for network devices. Network automation course details Who will benefit: Network engineers. Prerequisites: TCP/IP foundation for engineers. Duration 5 days Network automation course contents What is DevOps Programming and automating networks, networks and clouds, AWS, OpenStack, SDN, DevOps for network operations. Initial configuration Configuring SSH, ZTP, POAP. Hands on Initial lab configuration. Getting started with ansible The language, the engine, the framework. Uses of ansible, orchestration. The architecture, Controlling machines, nodes, Agentless, SSH, modules. Configuration management, inventories, playbooks, modules, roles. Hands on Installing ansible, running ad hoc commands. Ansible playbooks ansible-playbook, YAML, plays, tasks, handlers, modules. Playbook variables. Register module, debug module. Hands on Running playbooks. Ansible Inventories /etc/ansible/hosts, hosts, groups, static inventories, dynamic inventories. Inventory variables, external variables. Limiting hosts. Hands on Static inventories, variables in inventory files. Ansible modules for networking Built in modules, custom modules, return values. Core modules for network operations. Cisco and/ or Juniper modules. ansible_connection. Ansible 2.6 CLI. Hands on Using modules. Ansible templating and roles Configuration management, full configurations, partial configurations. The template module, the assemble module, connection: local, Jinja2 templates, variables, if, for, roles. Hands on Generating multiple configurations from a template. Network programming and modules Why use Python? Why use ansible? alternatives, ansible tower, Linux network devices. Programming with Python Scripting versus application development, Python interactive mode, Python scripts, Python 2.7 vs Python 3. A simple Python script. Variables, loops, control statements, operators. PEP style guide. Python IDEs. Hands on Simple Python programs. More Python programming Functions. Classes, objects and instances, modules, libraries, packages. Python strings, Python file handling, pip list, pip install, Hands on Python programming with pyping. Git Distributed version control, repositories, Git and GitHub, Alternatives to GitHub, Installing git, git workflows, creating repositories, adding and editing files, branching and merging, merge conflicts. Hands on working with Git. Python and networking APIs, Sockets, Telnetlib, pysnmp, ncclient, ciscoconfparse. Paramiko SSH and Netmiko Integrating Python and network devices using SSH. Netmiko, Netmiko methods. Hands on Netmiko. PyEZ Juniper, NETCONF, installing PyEZ, a first pyEZ script, pyEZ configuration management. Hands on Juniper configuration management with pyEZ. NAPALM What is NAPALM, NAPALM operations, getters, Replace, merge, compare, commit, discard. Hands on Configuration with NAPALM. Integrating ansible and NAPALM. Python and REST REST APIs, enabling the REST API. Accessing the REST API with a browser, cURL, Python and REST, the request library. Hands on Using a REST API with network devices.

Network automation for engineers
Delivered in Internationally or OnlineFlexible Dates
£3,697

C To Master Skill: Learn C Programming Technique

By simplivlearning

Step by Step explanation of each topics in C Language with lots of programs.

C To Master Skill: Learn C Programming Technique
Delivered OnlineFlexible Dates
£10

Definitive Ethernet switching for engineers

5.0(3)

By Systems & Network Training

Definitive Ethernet switching course description A hands on comprehensive look at Ethernet switches with extensive coverage of VLANs. The course focuses on the technology and not any one manufacturers product enabling delegates to configure switches from any manufacturer. What will you learn Configure and troubleshoot switches using: Console port telnet HTTP TFTP Configure and troubleshoot switch features such as: Duplex/speed Port based MAC security Spanning Tree Link aggregation Tagged ports Configure and troubleshoot VLANs. Definitive Ethernet switching course details Who will benefit: Technical staff. Prerequisites: Intro to data communications & networking. Duration 3 days Definitive Ethernet switching course contents What is Ethernet? LANs, network cards and cables, CSMA/CD, Ethernet frames, Ethernet evolution, 802.3. Hands on: ping, Ethernet speeds, CSMA/CD. Ethernet layer 2 Layer 2 functions, NICs, MAC addresses, unicasts, multicasts and broadcasts, frame formats. Hands on: Configuring NICs, Analysing MAC addresses with Wireshark IP and Ethernet Relationship Hands on: ARP. What is a switch? Switches connect multiple devices, switches versus hubs, simultaneous conversations, switches work at layer 2, the forwarding database, how the forwarding database is built, broadcast and collision domains Hands on: Difference between hubs and switches. Switch configuration Switch configuration Managed/unmanaged switches, configuration methods, reasons to configure switches. Console ports, HyperTerminal (and alternatives). Hands on: Using the console port to troubleshoot and configure switches. Switches in more detail Latency, forwarding mechanisms, switch fabrics. Hands on: Using telnet and HTTP to switches. Ethernet extensions Auto negotiation, Power over Ethernet. Hands on:Configuring and troubleshooting switch ports: Speed, duplex and security. Redundant links Loops, broadcast storms, STP, BPDU format, STP convergence. Hands on: Tracking blocked ports. STP convergence. Backbone links Architectures, link aggregation, LACP, load sharing, resilience. Hands on: fail over times. VLANs Virtual versus physical LANs, Why have VLANs? Broadcast domains, Creating VLANs, Assigning ports to VLANs. Hands on: Analysing the effect of VLANs on traffic. Enterprise VLANs VLANS are internal, multiple VLANs, Load balancing, Default VLAN, VLAN registration protocols: VTP, GVRP, MVRP. Hands on: VLANs on multiple switches. Tagging/Trunking Reason for tagging, terminology, tagging process, 802.1Q, Tag format, VLAN stacking. Hands on: Configuring and troubleshooting tags. STP variants RSTP, Common STP, Multiple STP, PVST, ring alternatives. Hands on: RSTP. Inter VLANs Layer 3 switching, IP addressing rules, Interconnecting VLANs. Hands on: Routing between VLANs. Troubleshooting Ethernet Methods, tools, locating faults, layer 1 issues, layer 2 issues Hands on: Fixing the network.

Definitive Ethernet switching for engineers
Delivered in Internationally or OnlineFlexible Dates
£2,367

Definitive SIP in the IMS for engineers

5.0(3)

By Systems & Network Training

SIP in IMS training course description The IP Multimedia Core Network Subsystem (IMS) is defined by 3GPP as a new mobile infrastructure. This advanced course looks at the use of SIP in the IMS. What will you learn Describe the role of SIP in the IMS. Explain how SIP works in the IMS Describe the SIP architecture in the IMS. Explain how SIP and SDP are used in basic IMS procedures. SIP in IMS training course details Who will benefit: Technical telecommunications staff. Prerequisites: SIP for engineers. Duration 2 days SIP in IMS training course contents Introduction SIP review, SIP elements, Simple SIP call flow, What is IMS? Why IMS? Why SIP in the IMS? SIP and IMS relationship. Standards 3GPP, IETF, 3GPPr5, 3GPPr6, 3GPP SIP extensions. SIP and IMS IMS architecture, SIP interfaces. Server functions Registration, home and away, location and directory services, stateful and stateless servers. SIP servers P-CSCF, I-CSCF, S-CSCF, PSTN gateways SIP registration in the IMS SIP REGISTER, IMS identities, registration process, P-CSCF discovery, S-CSCF assignment, IMS subscriber and IMS registrar signalling flow. IMS routing in the registration process. Re and De-registration. SIP sessions in the IMS SIP INVITE, Establishing IMS SIP sessions, User at home network, user roaming, IMS offer answer architecture, SIP preconditions, QoS, reserving resources, IMS bearer network interactions, IMS subscriber and IMS service signalling flow. Typical call flows. SIP services in the IMS IMS specifications, IMS service procedures, call scenarios, call services. IMS multimedia related procedures. IMS presence, IMS messaging, IMS conferencing, IMS PoC. SIP-T SIP and the PSTN, URIs and ENUM, NAPTR, SRV, ISUP numbers and URI mapping, IAM and INVITE, SIP to PSTN/ISUP mapping, PSTN/ISUP to SIP mapping, PSTN to PSTN over SIP. MIME media types for ISUP, DTMF transmission, CLIP and CLIR in SIP, ring tone, split gateways SIP-I ISO standards, translation versus tunnelling. IMS SIP extensions Security (RFC 3310, 3329), Resource reservation (RFC 3312), Media authorisation (RFC 3313), SigComp (RFC 3320), P Headers (RFC 3325, 3455), Mobile registration (RFC 3327, 3608), Reg event (RFC 3680), Preconditions (RFC 4032) Security IMS security architecture, identities, HTTP digest, TLS. Affect of security on SIP media sessions.

Definitive SIP in the IMS for engineers
Delivered in Internationally or OnlineFlexible Dates
£1,727

LTE Architecture and Protocols

5.0(3)

By Systems & Network Training

LTE Architecture and Protocols course description This course provides a comprehensive tour of the LTE architecture along with services provided and the protocols used. What will you learn Describe the overall architecture of LTE. Explain the information flows through LTE. Describe the LTE security. Describe LTE mobility management. Recognise the next steps for LTE. LTE Architecture and Protocols course details Who will benefit: Anyone working with LTE. Prerequisites: Mobile communications demystified Duration 3 days LTE Architecture and Protocols course contents Introduction History, LTE key features. The 4G ITU process. The LTE 3GPP specifications. Specifications. System Architecture LTE hardware architecture. UE architecture and capabilities. E-UTRAN and eNB. EPC, MME functions, SGW, PGW and PCRF. System interfaces and protocol stacks. Example information flows. Dedicated and default bearers. EMM, ECM, RRC state diagrams. Radio transmission and reception OFDMA, SC-FDMA, MIMO antennas. Air interface protocol stack. Logical, transport and physical channels. Frame and slot structure, the resource grid. Resource element mapping of the physical channels and signals. Cell acquisition, data transmission and random access. MAC, RLC, PDCP protocols. LTE spectrum allocation. Power-on procedures Network and cell selection. RRC connection establishment. Attach procedure, including IP address allocation and default bearer activation. LTE detach procedure. Security in LTE networks LTE security features, identity confidentiality, ciphering and integrity protection. Architecture of network access security in LTE. Secure key hierarchy. Authentication and key agreement procedure. Security mode command procedure. Network domain security architecture. Security associations using IKE and IPSec. Mobility management RRC_IDLE, RRC_CONNECTED. Cell reselection, tracking area updates. Measurement reporting. X2 and S1 based handovers. Interoperation with UMTS, GSM and non-3GPP technologies such as cdma2000. QoS, policy control and charging QoS in LTE, EPS bearers, service data flows and packet flows. The architecture and signalling procedures for policy and charging control. Data transport using GPRS, differentiated services and MPLS. Offline and online charging in LTE. Delivery of voice and text messages over LTE Difficulties and solutions for Voice over LTE. Architecture and call setup procedures for circuit switched fallback. Architecture, protocols and call setup procedures in IP multimedia subsystem. Enhancements in release 9 LTE location services. Multimedia broadcast / multicast service and MBSFN. Cell selection, commercial mobile alert service. LTE Advanced and release 10 Impact of carrier aggregation on LTE air interface. Enhanced MIMO processing on uplink and downlink. Relaying. Release 11 and beyond. OAM and self organising networks Operation, administration, maintenance and provisioning for LTE. Self-configuration of base station parameters. Fractional frequency re-use, inter-cell interference co-ordination. Self-optimisation of base station procedures. Self-healing to detect and recover from faults.

LTE Architecture and Protocols
Delivered in Internationally or OnlineFlexible Dates
£2,367

Business Skills for the IT Professional - BCS Course

5.0(12)

By Duco Digital Training

This practitioner-level 4 award encourages individuals in IT and technical roles to explore the many teams, ideas, and functions within an organisation and maximise their contribution. You will achieve this by learning the key concepts and considering behaviour and response in different scenarios.

Business Skills for the IT Professional - BCS Course
Delivered OnlineFlexible Dates
£625

Microsoft Access

5.0(3)

By Systems & Network Training

Microsoft Access training course description A hands on course providing a solid grounding in Microsoft Access. What will you learn Use and customise the Microsoft Access environment. Select, use and customise queries. Define tables. Design forms and reports. Recognise the use of macros. Microsoft Access training course details Who will benefit: Anyone wishing to work with Microsoft Access. Prerequisites: Database fundamentals Duration 3 days Microsoft Access training course contents Introducing databases Flat file databases, Relational databases, the objects defined in an Access database, planning a simple relational database. Open Access and create a database The database wizards, tables, creating and amending tables, using field properties to improve the quality of data entry and system performance, the primary key. Working in datasheet view View, add, modify and delete records, find records. Advantages and disadvantages of entering data directly into a table. Queries Sort and select records form a single table, advantages and disadvantages of entering data via a query, define simple calculated expressions, use 'Totals' queries. Forms Use the form wizards, basic editing of objects created using the form wizards, Data-entry in form view. Reports Use the report wizard, basic editing of objects created using the report wizard, print reports. The multi table environment Plan and create a related table, define a one-to-many relationship, write multi-table queries and use the 'AutoLookup' feature, use the form wizard to create a subform and carry out data-entry in a main/subform, print and amend reports, use the report wizard to create reports based on multi-table. Relationships Working with one-to-one and one-to-many relationships, recognising and handling many-to-many relationships, referential integrity. Select queries Select queries based on related tables, parameter queries, Crosstab, find unmatched queries and Find Duplicate, the implications of the Join properties in a relational query, conditional expressions, and working with the expression builder. Action queries Make table queries, append queries, update queries, delete queries. Customising forms. Using the Toolbox, calculated controls, Combo and List boxes, query by form, working with form and control properties, domain aggregate functions. Reports Report and control properties, customising sorting and grouping, calculated controls on reports, Sub-reports, editing and altering a report's source. Macros Introduction to macros.

Microsoft Access
Delivered in Internationally or OnlineFlexible Dates
£1,697