• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

5524 Courses delivered Live Online

SAP01 SAP Overview

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for All persons interested in getting an overview of SAP?s Business Suite solutions. Overview Identify SAP Applications and ComponentsExplain basic functionality of SAP SolutionsAttend more detailed SAP courses and have the required baseline knowledge In this course, students identify SAP applications and components, as well as learn how to explain basic functionality of SAP Solutions. SAP - A Cloud Company Identifying SAP Applications and Components Outline the Functionality of SAP Cloud-Enabling Applications Outlining New SAP Functionality Outline the usage and functionality of SAP HANA Outline the usage and functionality of Cloud for Customer Describe the various aspects of SAP User Experience SAP System Navigation Accessing the SAP System Personalizing the User Interface System-Wide Concepts Identifying SAP Organizational and Master Data Elements Logistics Creating a Purchase Order for Materials Using Supplier Relationship Management (SRM) for Procurement and Sourcing Processes Integrating Ariba Functionality with Procurement in SAP Enterprise Resource Planning (ERP) Creating a Planned Order Processing Production Orders Using Supply Chain Management (SCM) to Manage Supply and Demand Creating Sales Orders Creating a Delivery and Posting a Goods Issue Creating Sales Order Billing Documents Using Customer Relationship Management (CRM) Using Product Lifecycle Management (PLM) Financials Identifying Financial Accounting Processes Using Financial Add-Ons for SAP Business Suite Creating a Journal Entry in the General Ledger Outlining the Outbound Payments Process in Accounts Payable Generating Financial Statements Outlining the Inbound Process in Accounts Receivable Outlining the Business Processes in Fixed Assets Accounting Analyzing Internal Costs in Management Accounting Monitoring Manufacturing Costs Analyzing Profitability Human Capital Management (HCM) Identifying the Components of SAP Enterprise Resource Planning (ERP) HCM Outlining the HR Renewal Functionality Integrating SuccessFactors in the Cloud Analytics and Strategic Planning Executing Analytics and Strategic Planning Reports SAP Services Accessing SAP Services

SAP01 SAP Overview
Delivered OnlineFlexible Dates
Price on Enquiry

Salesforce Discover Salesforce Fundamentals to Support Your Business (BSX101)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This class is ideal for business users - the people who need to learn what's possible with Salesforce functionality across the suite of products, but aren't necessarily responsible for managing the application. If you're a customer service manager, business executive, business operations manager, sales operations manager, or any other operations, management, or process analysis 'super user,' this class is just what you need to better understand the business value of the Salesforce Platform. Overview Describe the primary business value of each major Salesforce Cloud. Manage users and data. Manage basic org configuration. Create email templates. Create reports and dashboards. Apply and champion Chatter. Understand the Salesforce implementation and maintenance lifecycle. Extend Salesforce functionality beyond basic configuration. Explore what?s possible with Salesforce. In this 3-day class, our Salesforce experts will walk you through the Salesforce Platform, its specific applications, and their business values and benefits. Familiarize yourself with Salesforce Cloud, and learn about platform features and processes to more effectively support day-to-day Salesforce operations within your organization. Through interactive lectures, discussions, and hands-on exercises, you?ll recognize the core elements of the implementation lifecycle, the key considerations to drive user adoption, and the important components of ongoing management of your Salesforce environment. Introduction Understand How Salesforce Works Explore Salesforce Applications Review Salesforce Organization Data Access and Security Control Org Access Manage Who Views and Modifies Objects Unlock Access to Records Share Access to Records Lock Down Individual Fields User Management and Troubleshooting Create New Users Troubleshoot Login, Record Access, and Field Visibility Issues Salesforce Customizations Think About Your Implementation Explore Custom Fields, Picklists, Page Layouts, and Record Types Create Email Templates Business Processes Automation Review Validation Rules Review Assignment and Escalation Rules Review Web-to-Lead and Entitlements Review Lightning Process Builder and Workflow Review Approval Processes and Visual Workflow Reports Explore the Reports Tab, Folders, and Formats Explore the Report Builder Summarize Your Data Dashboards and Data Insights Get More Insight from Your Data Visualize Your Data with Dashboards Create Your Analytics Strategy Everyday Salesforce Collaborate with Chatter, Groups, and Communities Share Feedback with Chatter Answers and Ideas Go Mobile with Salesforce1 Make Salesforce Part of Your Day Data Management Create a Data Migration Strategy Ensure Data Quality Extending Salesforce Drive a Salesforce Implementation Customize Salesforce Using Custom Objects, Apps, and the Salesforce AppExchange Build It Yourself Wrap-up and Certification Review the Certification Process and Resources

Salesforce Discover Salesforce Fundamentals to Support Your Business (BSX101)
Delivered OnlineFlexible Dates
Price on Enquiry

Salesforce Certification Preparation for Platform App Builder (CRT403)

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for Certification Preparation for Platform App Builder is ideal for administrators, system integrators, and independent software vendors (ISVs) with an interest in sharpening the development, deployment, and administrative skills required to succeed in becoming a Salesforce Certified Platform App Builder Overview Architect and manage the correct data model based on business requirements. Configure application security. Define business logic and process automation declaratively. Design user interfaces. Customize applications for mobile use and Lightning. Deploy applications. Are you ready to take the next step in your career by becoming a Salesforce Certified Platform App Builder? By covering the details around the exam objectives, this course will help hone your knowledge of Salesforce application lifecycle management and the declarative and programmatic solutions available to you through guided scenarios, lecture, and discussion. Salesforce Fundamentals Capabilities of core CRM objects Boundaries of declarative customizations Use cases for programmatic customizations Security Restricting and extending object, record, and field access Determining appropriate sharing solutions Data Modeling and Management Determining an appropriate data model Relationship types and impact on record access, user interface, and reporting Considerations for changing field types Considerations of the schema builder Considerations for importing and exporting data Use cases of external objects Reporting Creating reports Report types Dashboards User Interface Customization options Custom buttons, links, and actions Declarative options for incorporating Lightning Components Mobile Declarative customizations available for the Salesforce1 user interface Business Logic and Process Automation Record types Formula fields Roll-up summary fields Validation rules Approval processes Workflow Visual workflow Process builder Automating business processes Ramifications of field updates and potential for recursion App Deployment Application lifecycle Sandboxes Change sets Unmanaged and managed packages Determining an appropriate deployment plan Wrapping Up Test preparation Practice exam

Salesforce Certification Preparation for Platform App Builder (CRT403)
Delivered OnlineFlexible Dates
Price on Enquiry

Scrum Product Owner Certified (SPOC)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This certification is for anyone who interfaces with stakeholders or works as a Product Owner in a Scrum Team. Scrum Product Owner Certified (SPOC?) certification exam is designed to confirm applicants practical and working knowledge of Scrum that equips them to handle the business aspects and stakeholders in a Scrum environment. Successful candidates will be awarded the Scrum Product Owner Certified (SPOC?)certification by SCRUMstudy after passing the included certification exam. The certification exam voucher is included in this course so you can take the exam at your convenience. Agile & Scrum Overview What is Agile? Why use Agile? The Agile Manifesto Principles of the Agile Manifesto Agile Methods Other Agile Methods Scrum Overview Scrum Summary Scrum Roles Scrum Roles The Product Owner The Scrum Team The Scrum Master Advantages of Cross-functional Teams Planning in Scrum Scrum Flow Requirements in Scrum Prioritizing the Product Backlog Adaptive Project Management Scrum Planning User Stories The Concept of Persona Acceptance Criteria Generic Done Criteria Criteria for a Good User Story Estimation Importance of Value Risk Burndown Graphics Scrum Board Sprint Planning Sprints (from Product Owner?s point of view) Sprint Planning Meeting Planning Game Task Estimation The Sprint Backlog Implementation of Scrum Daily Stand-up Meeting Sprint Review Meeting Sprint Retrospective Meeting Product Backlog Grooming Scrum for Large Projects Scrum for Large Projects The Chief Product Owner Distributed teams in Scrum Transition to Scrum Mapping Traditional Roles to Scrum Maintaining Stakeholder Involvement Note SCRUMstudy has authored the SBOK? Guide as a comprehensive guide to deliver successful projects using Scrum. SCRUMstudy works through its large global partner network of Authorized Training Providers (A.T.P.s) to deliver trainings and certifications. New Horizons is a proud Authorized Training Provider of SCRUMstudy.

Scrum Product Owner Certified (SPOC)
Delivered OnlineFlexible Dates
Price on Enquiry

B6061 IBM Cognos Analytics - Author Reports with Multidimensional Data (V11.0)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Report authors working with dimensional data sources. Through interactive demonstrations & exercises, participants will learn how to author reports that navigate & manipulate dimensional data structures using the specific dimensional functions & features available in IBM Cognos Analytics. Introduction to Dimensional Concepts Identify different data sources and models Investigate the OLAP dimensional structure Identify dimensional data items and expressions Differentiate the IBM Cognos Analytics query language from SQL and MDX Differentiate relational and dimensional report authoring styles Introduction to Dimensional Data in Reports Work with members Identify sets and tuples in IBM Cognos Analytics Dimensional Report Context Understand the purpose of report context Understand how data is affected by default and root members Focus Your Dimensional Data Compare dimensional queries to relational queries Explain the importance of filtering dimensional queries Evaluate different filtering techniques Filter based on dimensions and members Filter based on measure values Filter using a slicer Calculations & Dimensional Functions Use IBM Cognos Analytics dimensional functions to create sets and tuples Perform arithmetic operations in OLAP queries Identify coercion errors and rules Functions for Navigating Dimesional Hierarchies Navigate dimensional data using family functions Relative Functions Navigate dimensional data using relative functions Navigate dimensional data using relative time functions Advanced Drilling Techniques & Member Sets Understand default drill-up and drill-down functionality Identify cases when you need to override default drilling behavior Configure advanced drilling behavior to support sophisticated use cases Define member sets to support advanced drilling Define member sets to support functions Set Up Drill-Through Reports Navigate from a specific report to a target report Drill down to greater detail and then navigate to target report Navigate between reports created using different data sources End-to-End Workshop Review concepts covered throughout the course

B6061 IBM Cognos Analytics - Author Reports with Multidimensional Data (V11.0)
Delivered OnlineFlexible Dates
Price on Enquiry

Sales Leadership Seminar

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This seminar is intended for individuals who want to gain intermediate knowledge of Sales. Overview Upon successful completion of this seminar, guests will gain intermediate knowledge of Sales Leadership and learning resource availability. In this seminar, guests will obtain knowledge in Sales Leadership, leveraging New Horizons' Leadership and Professional Development Program. Sales Leadership Session Sales Leadership Topics

Sales Leadership Seminar
Delivered OnlineFlexible Dates
Price on Enquiry

Conflict Resolution

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for Everyone dealing with day to day work environment Overview Wherever two or more people come together, there is bound to be conflict. This course will give participants a seven-step conflict resolution process that they can use and modify to resolve conflict disputes of any size. Participants will also learn crucial conflict management skills, including dealing with anger and using the Agreement Frame. Participants will learn crucial conflict management skills, including dealing with anger and using the Agreement Frame. If left unchecked or not resolved it can lead to lost production, absences, attrition, and even law suits. Getting Started Icebreaker Housekeeping Items The Parking Lot Workshop Objectives An Introduction to Conflict Resolution What is Conflict? What is Conflict Resolution? Understanding the Conflict Resolution Process The Thomas-Kilmann Instrument Collaborating Competing Compromising Accommodating Avoiding Creating an Effective Atmosphere Neutralizing Emotions Setting Ground Rules Choosing the Time and Place Creating Mutual Understanding What do I Want? What Do They Want? What Do We Want? Focusing on Individual Needs Finding Common Ground Building Positive Energy and Goodwill Strengthening Your Partnership Getting to the Root Cause Examining Root Causes Creating a Cause and Effect Diagram The Importance of Forgiveness Identifying the Benefits of Resolution Generating Options Generate, Don't Evaluate Creating Mutual Gain Options and Multiple Option Solutions Digging Deeper into Your Options Building a Solution Creating Criteria Creating a Shortlist Choosing a Solution Building a Plan The Short Version of the Process Evaluating the Situation Choosing Your Steps Creating an Action Plan Using Individual Process Steps Additional Tools Stress and Anger Management Techniques The Agreement Frame Asking Open Questions Wrapping Up Words from the Wise Review of Parking Lot Lessons Learned Completion of Action Plans

Conflict Resolution
Delivered OnlineFlexible Dates
Price on Enquiry

VMware Workspace ONE: UEM Bootcamp [V22.x]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Workspace ONE UEM operators and administrators, account managers, solutions architects, solutions engineers, sales engineers, and consultants Overview By the end of the course, you should be able to meet the following objectives: Explain and apply the fundamental techniques for launching and maintaining an intelligence-driven, multiplatform endpoint management solution with Workspace ONE UEM Outline the components of Workspace ONE UEM Explain the general features and functionality enabled with Workspace ONE UEM Summarize basic Workspace ONE administrative functions Explain and deploy common Workspace ONE integrations Securely deploy configurations to Workspace ONE UEM managed devices Onboard device endpoints into Workspace ONE UEM Summarize alternative management methodologies for rugged devices Discuss strategies for maintaining environment and device fleet health Configure and deploy applications to Workspace ONE UEM managed devices Analyze a Workspace ONE UEM deployment Enable email access on devices Integrate Workspace ONE UEM with content repositories and corporate file shares Summarize basic troubleshooting methodologies Outline common troubleshooting techniques in the Workspace ONE UEM console Outline common troubleshooting techniques when integrating enterprise solutions in the Workspace ONE UEM console Summarize common troubleshooting strategies for Workspace ONE UEM managed devices Outline common application management troubleshooting techniques in the Workspace ONE UEM console Summarize common troubleshooting techniques for email management in the Workspace ONE UEM console Explain common troubleshooting approaches for the VMware Unified Access Gateway™ platform and individual edge services Outline useful troubleshooting tools, such as the Self-Service Portal and VMware Workspace ONE Assist™ In this five-day course, you learn how to apply the fundamental techniques for launching and maintaining an intelligence-driven, multiplatform endpoint management solution with VMware Workspace ONE© UEM. Through a combination of hands-on labs, simulations, and interactive lectures, you will configure and manage the endpoint life cycle. You will also learn to investigate, analyze, and determine issues that might occur with all the different components of Workspace ONE UEM.By understanding how to effectively troubleshoot product issues, administrators can understand how product services communicate and function, in turn optimizing service and software health management. At the end of five days, you will have the foundational knowledge for effectively managing and conducting basic troubleshooting for Workspace ONE UEM. Course Introduction Introductions and course logistics Course objectives Online resources and references Platform Architecture Summarize the features and functionality of Workspace ONE UEM Outline the benefits of leveraging Workspace ONE UEM Recognize the core and productivity components that make up the Workspace ONE UEM platform Summarize high availability and disaster recovery for the Workspace ONE solution Administration Navigate and customize the Workspace ONE UEM console Summarize the hierarchical management structure Explain the features and functions of Workspace ONE Hub Services Outline account options and permissions Enterprise Integrations Outline the process and requirements to integrate with directory services Explain certificate authentication and practical implementation with Workspace ONE Explain the benefits of integrating an email SMTP service into the Workspace ONE UEM console Describe VMware Dynamic Environment Manager? and its architecture Onboarding Outline the prerequisite configurations in the Workspace ONE UEM environment for onboarding devices for management Outline the steps for setting up autodiscovery in the Workspace ONE UEM console Enroll an endpoint through the VMware Workspace ONE© Intelligent Hub app Summarize platform onboarding options Managing Endpoints Explain the differences between device and user profiles Describe policy management options for Windows and macOS Describe the functions and benefits of using compliance policies Explain the use case for Freestyle Orchestrator Describe the capabilities that sensors and scripts enable Alternative Management Methods Describe the function and benefits of device staging Configure product provisioning in the Workspace ONE UEM console Understand the benefits of deploying a VMware Workspace ONE© Launcher? configuration to Android devices List the system and device requirements for Linux device management in Workspace ONE UEM Applications Describe the features, benefits, and capabilities of application management in Workspace ONE UEM Understand and configure deployment settings for public, internal, and paid applications in the Workspace ONE UEM console Describe the benefits of using Apple Business Manager content integration Describe the benefits of using server-to-client software distribution List the functions and benefits of VMware Workspace ONE© SDK Device Email List the email clients supported by Workspace ONE UEM Configure an Exchange Active Sync profile in the Workspace ONE UEM console Configure VMware Workspace ONE© Boxer settings Summarize the available email infrastructure integration models and describe their workflows Configure email compliance policies and notifications services Content Sharing Describe the benefits of using Content Gateway and the Content Gateway workflows Describe the benefits of integrating content repositories with Workspace ONE UEM Configure a repository in the Workspace ONE UEM console Maintenance Manage endpoints from the Device List View and the Device Details View pages Analyze endpoint deployment and compliance data from Monitor Overview page Fundamentals of Troubleshooting Workspace ONE UEM Outline software troubleshooting logic and support methods Summarize the main process flows for the Workspace ONE UEM components Explain the importance of Workspace ONE UEM process flows for troubleshooting Identify different Workspace ONE UEM log files Workspace ONE UEM Console Troubleshooting Outline the best practices for troubleshooting Workspace ONE UEM console issues Identify common group management and assignment-related issues Outline common issues for Workspace ONE UEM console roles and system settings Understand how analytic events can be used to identity platform errors Summarize the steps for collecting and analyzing Workspace ONE UEM console logs Integration Troubleshooting Outline the common enterprise integrations in Workspace ONE UEM Outline common troubleshooting techniques for the VMware AirWatch© Cloud Connector? Troubleshoot issues related to Directory Services integration Identify directory user and groups synchronization issues Troubleshoot issues related to certificate authority integration Explain VMware Workspace ONE© Access? integration and Workspace ONE Intelligent Hub troubleshooting techniques Endpoint Troubleshooting Compare the endpoint connection topologies in Workspace ONE UEM Outline useful tools and resources for endpoint troubleshooting Summarize the best practices for device enrollment troubleshooting Explain device connectivity troubleshooting techniques Demonstrate how to identify and resolve profile-related issues Identify common compliance policy issues and potential root causes Application Troubleshooting Explain the different scoping questions for troubleshooting applications Review application management configurations Summarize the general tools and resources for application troubleshooting Describe the general logic of troubleshooting public applications Understand internal application issues and potential causes Explain purchased application troubleshooting techniques Unified Access Gateway and Edge Services Troubleshooting Review Unified Access Gateway architecture and edge service workflows Understand Unified Access Gateway general configurations Explain how to utilize Unified Access Gateway related troubleshooting tools and resources Identify and resolve common issues for Content Gateway on Unified Access Gateway Summarize troubleshooting techniques for VMware Workspace ONE© Tunnel? on Unified Access Gateway Email Troubleshooting Review different email architecture and workflows Summarize common errors associated with email profiles Identify tools and resources for email troubleshooting Discuss troubleshooting techniques for VMware AirWatch© Secure Email Gateway? on Unified Access Gateway Outline PowerShell integration issues and techniques to address them Additional Troubleshooting Tools Describe how the Self-Service Portal helps administrators and empowers end users to resolve issues Explain how Workspace ONE Assist can help with troubleshooting endpoints

VMware Workspace ONE: UEM Bootcamp [V22.x]
Delivered OnlineFlexible Dates
Price on Enquiry

EC-Council Certified Threat Intelligence Analyst (C|TIA)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Organizations today demand a professional-level cybersecurity threat intelligence analyst who can extract the intelligence from data by implementing various advanced strategies. Such professional-level programs can only be achieved when the core of the curricula maps with and is compliant to government and industry published threat intelligence frameworks. Ethical Hackers Security Practitioners, Engineers, Analysts, Specialist, Architects, and Managers Threat Intelligence Analysts, Associates, Researchers, Consultants Threat Hunters SOC Professionals Digital Forensic and Malware Analysts Incident Response Team Members Any mid-level to high-level cybersecurity professionals with a minimum of 2 years of experience. Individuals from the information security profession and who want to enrich their skills and knowledge in the field of cyber threat intelligence. Individuals interested in preventing cyber threats. Overview This program will benefit students who are looking to build effective threat intelligence for their organization in order to combat modern-day cyber-attacks and prevent future attacks. Certified Threat Intelligence Analyst (C|TIA) is designed and developed in collaboration with cybersecurity and threat intelligence experts across the globe to help organizations identify and mitigate business risks by converting unknown internal and external threats into known threats. It is a comprehensive, specialist-level program that teaches a structured approach for building effective threat intelligence. Introduction to Threat Intelligence Understanding Intelligence Understanding Cyber Threat Intelligence Overview of Threat Intelligence Lifecycle and Frameworks Cyber Threats and Kill Chain Methodology Understanding Cyber Threats Understanding Advanced Persistent Threats (APTs) Understanding Cyber Kill Chain Understanding Indicators of Compromise (IoCs) Requirements, Planning, Direction, and Review Understanding Organization?s Current Threat Landscape Understanding Requirements Analysis Planning Threat Intelligence Program Establishing Management Support Building a Threat Intelligence Team Overview of Threat Intelligence Sharing Reviewing Threat Intelligence Program Data Collection and Processing Overview of Threat Intelligence Data Collection Overview of Threat Intelligence Collection Management Overview of Threat Intelligence Feeds and Sources Understanding Threat Intelligence Data Collection and Acquisition Understanding Bulk Data Collection Understanding Data Processing and Exploitation Data Analysis Overview of Data Analysis Understanding Data Analysis Techniques Overview of Threat Analysis Understanding Threat Analysis Process Overview of Fine-Tuning Threat Analysis Understanding Threat Intelligence Evaluation Creating Runbooks and Knowledge Base Overview of Threat Intelligence Tools Intelligence Reporting and Dissemination Overview of Threat Intelligence Reports Introduction to Dissemination Participating in Sharing Relationships Overview of Sharing Threat Intelligence Overview of Delivery Mechanisms Understanding Threat Intelligence Sharing Platforms Overview of Intelligence Sharing Acts and Regulations Overview of Threat Intelligence Integration

EC-Council Certified Threat Intelligence Analyst (C|TIA)
Delivered OnlineFlexible Dates
Price on Enquiry

Introduction to C Plus Plus Programming Essentials (TTCP2100)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This is an introductory-level C++ programming course designed for developers with experience programming in C or other languages. Practical hands-on prior programming experience and knowledge is required. Overview This 'skills-centric' course is about 50% hands-on lab and 50% lecture, designed to train attendees in basic coding with C++, coupling the most current, effective techniques with the soundest industry practices. Our engaging instructors and mentors are highly experienced practitioners who bring years of current 'on-the-job' experience into every classroom. Working in a hands-on learning environment, guided by our expert team, attendees will learn: Writing procedural programs using C++ Using private, public and protected keywords to control access to class members Defining a class in C++ Writing constructors and destructors Writing classes with const and static class members Overloading operators Implementing polymorphic methods in programs Writing programs using file I/O and string streams Using manipulators and stream flags to format output Using the keyword template to write generic functions and classes Writing programs that use generic classes and functions Writing programs that use algorithms and containers of the Standard Library Apply object-oriented design techniques to real-world programming problems Using algorithms and containers of the Standard Library to manipulate string data Understand how C++ protects the programmer from implementation changes in other modules of an application Using try() blocks to trap exceptions Using catch() blocks to handle exceptions Defining exceptions and using throw to trigger them Introduction to C++ Programming / C++ Essentials is a skills-focused, hands-on C++ training course geared for experienced programmers who need to learn C++ coupled with sounds coding skills and best practices for OO development. Students will leave this course armed with the required skills to put foundation-level C++ programming skills right to work in a practical environment. The central concepts of C++ syntax and style are taught in the context of using object-oriented methods to achieve reusability, adaptability and reliability. Emphasis is placed on the features of C++ that support abstract data types, inheritance, and polymorphism. Students will learn to apply the process of data abstraction and class design. Practical aspects of C++ programming including efficiency, performance, testing, and reliability considerations are stressed throughout. Comprehensive hands on exercises are integrated throughout to reinforce learning and develop real competency Moving from C to C++ (Optional) New Compiler Directives Stream Console I/O Explicit Operators Standard Libraries Data Control Capabilities Handling Data New Declaration Features Initialization and Assignment Enumerated Types The bool Type Constant Storage Pointers to Constant Storage Constant Pointers References Constant Reference Arguments Volatile Data Global Data Functions Function Prototypes and Type Checking Default Function Data Types Function Overloading Problems with Function Overloading Name Resolution Promotions and Conversions Call by Value Reference Declarations Call-by-Reference and Reference Types References in Function Return Constant Argument Types Conversion of Parameters Using Default Initializers Providing Default Arguments Inline Functions Operator Overloading Advantages and Pitfalls of Overloading Member Operator Syntax and Examples Class Assignment Operators Class Equality Operators Non-Member Operator Overloading Member and Non-Member Operator Functions Operator Precedence This Pointer Overloading the Assignment Operator Overloading Caveats Creating and Using Objects Creating Automatic Objects Creating Dynamic Objects Calling Object Methods Constructors Initializing Member consts Initializer List Syntax Allocating Resources in Constructor Destructors Block and Function Scope File and Global Scope Class Scope Scope Resolution Operator :: Using Objects as Arguments Objects as Function Return Values Constant Methods Containment Relationships Dynamic Memory Management Advantages of Dynamic Memory Allocation Static, Automatic, and Heap Memory Free Store Allocation with new and delete Handling Memory Allocation Errors Controlling Object Creation Object Copying and Copy Constructor Automatic Copy Constructor Conversion Constructor Streaming I/O Streams and the iostream Library Built-in Stream Objects Stream Manipulators Stream Methods Input/Output Operators Character Input String Streams Formatted I/O File Stream I/O Overloading Stream Operators Persistent Objects Introduction to Object Concepts The Object Programming Paradigm Object-Orientated Programming Definitions Information Hiding and Encapsulation Separating Interface and Implementation Classes and Instances of Objects Overloaded Objects and Polymorphism Declaring and Defining Classes Components of a Class Class Structure Class Declaration Syntax Member Data Built-in Operations Constructors and Initialization Initialization vs. Assignment Class Type Members Member Functions and Member Accessibility Inline Member Functions Friend Functions Static Members Modifying Access with a Friend Class Templates Purpose of Template Classes Constants in Templates Templates and Inheritance Container Classes Use of Libraries Strings in C++ Character Strings The String Class Operators on Strings Member Functions of the String Class Inheritance Inheritance and Reuse Composition vs. Inheritance Inheritance: Centralized Code Inheritance: Maintenance and Revision Public, Private and Protected Members Redefining Behavior in Derived Classes Designing Extensible Software Systems Syntax for Public Inheritance Use of Common Pointers Constructors and Initialization Inherited Copy Constructors Destructors and Inheritance Public, Protected, Private Inheritance Exceptions Types of Exceptions Trapping and Handling Exceptions Triggering Exceptions Handling Memory Allocation Errors C++ Program Structure Organizing C++ Source Files Integrating C and C++ Projects Using C in C++ Reliability Considerations in C++ Projects Function Prototypes Strong Type Checking Constant Types C++ Access Control Techniques Polymorphism in C++ Definition of Polymorphism Calling Overridden Methods Upcasting Accessing Overridden Methods Virtual Methods and Dynamic Binding Virtual Destructors Abstract Base Classes and Pure Virtual Methods Multiple Inheritance Derivation from Multiple Base Classes Base Class Ambiguities Virtual Inheritance Virtual Base Classes Virtual Base Class Information The Standard Template Library STL Containers Parameters Used in Container Classes The Vector Class STL Algorithms Use of Libraries

Introduction to C Plus Plus Programming Essentials (TTCP2100)
Delivered OnlineFlexible Dates
Price on Enquiry