• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

53592 Courses in Coventry delivered Online

Commissioning and Start-Up Activities of Coal Power Plants

By EnergyEdge - Training for a Sustainable Energy Future

About this training course This 5 full-day course provides a comprehensive understanding of all the commissioning and start-up activities of circulating fluidized bed (CFB) boiler coal power plants. The Commissioning Management System of CFB boiler coal power plants is covered in detail in this course. This includes all the commissioning procedures and documents, purpose of commissioning, responsibilities, system description, organization, working parties, test teams, documentation, testing and commissioning schedules, test reports, safety, plant certification, and plant completion report. The course provides also a thorough understanding of all the commissioning requirements for CFB boiler and auxiliaries, turbines and auxiliaries, generator and auxiliaries, electrical equipment, switchgear equipment, switchgear, and transformers. All the stages of the commissioning procedure are covered in-depth in this course. This includes preparation - planning various activities, pre-commissioning checks and tests, typical commissioning schedule, detailed tests and commissioning procedures and instructions for every component in a coal power plant, instrumentation, trial run of the equipment, safety and precautions, commissioning of CFB boiler coal power plant systems, Safety Rules Clearance Certificates, procedure for the control and handling of defects, Commissioning Reports. This course is a MUST for anyone who is involved in the pre-commissioning or commissioning of any CFB boiler coal power plant equipment because it provides detailed pre-commissioning checks and detailed tests and commissioning procedures and instructions for every component in a CFB boiler coal power plant. In addition, the course provides in-depth coverage of all preparation, planning activities, commissioning schedules, trial run of each CFB boiler coal power plant equipment, safety and precautions, Safety Rules Clearance Certificates, Procedures for handling defects, and Commissioning Reports. Training Objectives Pre-Commissioning Checks and Tests, Detailed Tests and Commissioning Procedures and Instructions for Every Equipment in CFB Boiler Coal Power Plants: Gain a thorough understanding of all pre-commissioning checks and tests, and all commissioning procedures and instructions for every equipment in CFB boiler coal power plants Commissioning Management System of CFB Boiler Coal Power Plants: Discover the benefits of the Commissioning Management System of CFB boiler coal power plants including all commissioning procedures and documents, purpose of commissioning, responsibilities, system description, organization, working parties, test teams, documentation, testing and commissioning schedules, test reports, safety, plant certification, and plant completion report Commissioning Procedures and Instructions for CFB Boiler and Auxiliaries in Coal Power Plants: Learn about the commissioning procedures and instructions for CFB boiler and auxiliaries including all commissioning activities, typical commissioning schedule, hydraulic test and wet preservation, air and gas tightness test, trial run of equipment, electronic precipitators, fuel oil system, preparation for first light up, alkali boil - out, acid cleaning and passivation, thermal flow test of economizer, water walls, and superheater, valves, steam boiling, and safety valve setting Commissioning Procedures and Instructions for Turbine and Auxiliaries: Gain a thorough understanding of all the commissioning procedures and instructions for turbine and auxiliaries including acid cleaning of oil pipelines, lubrication and governing system (oil flushing and hydraulic testing), jacking oil system, governing system, regenerative system, barring gear, vacuum tightness test, first rolling of turbine and data logging Commissioning Procedures and Instructions for Generator and Auxiliaries: Discover all the commissioning procedures and instructions for generator and auxiliaries including generator, seal oil system, hydrogen gas system, stator water system, rolling and payment of generator Commissioning Procedures and Instructions for Electrical Equipment: Learn about all the commissioning procedures and instructions for electrical equipment including switchyard equipment, switchgear, transformers, and motors CFB Boiler Coal Power Plant Equipment and Systems: Learn about various CFB boiler coal power plant equipment and systems including: CFB boilers, superheaters, reheaters, steam turbines, governing systems, deaerators, feedwater heaters, coal-handling equipment, transformers, generators and auxiliaries Target Audience Engineers of all disciplines Managers Technicians Maintenance personnel Other technical individuals Training Methods Your specialist course leader relies on a highly interactive training method to enhance the learning process. This method ensures that all participants gain a complete understanding of all topics covered. The training environment is highly stimulating, challenging, and effective because the participants will learn by case studies which will allow them to apply the material taught to their own organization. Each delegate will receive a copy of the following materials written by the instructor: 'POWER GENERATION HANDBOOK' second edition published by McGraw-Hill in 2012 (800 pages) Excerpt of the relevant chapters from the 'POWER PLANT EQUIPMENT OPERATION AND MAINTENANCE GUIDE' published by McGraw-Hill in 2012 (800 pages) CFB BOILER COAL POWER PLANT COMMISSIONING MANUAL (includes practical information about all pre-commissioning checks and tests, typical commissioning schedule, detailed tests and commissioning procedures and instructions for every component and system in CFB boiler coal power plants - 400 pages) Trainer Your specialist course leader has more than 32 years of practical engineering experience with Ontario Power Generation (OPG), one of the largest electric utility in North America. He was previously involved in research on power generation equipment with Atomic Energy of Canada Limited at their Chalk River and Whiteshell Nuclear Research Laboratories. While working at OPG, he acted as a Training Manager, Engineering Supervisor, System Responsible Engineer and Design Engineer. During the period of time, he worked as a Field Engineer and Design Engineer, he was responsible for the operation, maintenance, diagnostics, and testing of gas turbines, steam turbines, generators, motors, transformers, inverters, valves, pumps, compressors, instrumentation and control systems. Further, his responsibilities included designing, engineering, diagnosing equipment problems and recommending solutions to repair deficiencies and improve system performance, supervising engineers, setting up preventive maintenance programs, writing Operating and Design Manuals, and commissioning new equipment. Later, he worked as the manager of a section dedicated to providing training for the staff at the power stations. The training provided by him covered in detail the various equipment and systems used in power stations. In addition, he has taught courses and seminars to more than four thousand working engineers and professionals around the world, specifically Europe and North America. He has been consistently ranked as 'Excellent' or 'Very Good' by the delegates who attended his seminars and lectures. He written 5 books for working engineers from which 3 have been published by McGraw-Hill, New York. Below is a list of the books authored by him; Power Generation Handbook: Gas Turbines, Steam Power Plants, Co-generation, and Combined Cycles, second edition, (800 pages), McGraw-Hill, New York, October 2011. Electrical Equipment Handbook (600 pages), McGraw-Hill, New York, March 2003. Power Plant Equipment Operation and Maintenance Guide (800 pages), McGraw-Hill, New York, January 2012. Industrial Instrumentation and Modern Control Systems (400 pages), Custom Publishing, University of Toronto, University of Toronto Custom Publishing (1999). Industrial Equipment (600 pages), Custom Publishing, University of Toronto, University of Toronto, University of Toronto Custom Publishing (1999). Furthermore, he has received the following awards: The first 'Excellence in Teaching' award offered by PowerEdge, Singapore, in December 2016 The first 'Excellence in Teaching' award offered by the Professional Development Center at University of Toronto (May, 1996). The 'Excellence in Teaching Award' in April 2007 offered by TUV Akademie (TUV Akademie is one of the largest Professional Development centre in world, it is based in Germany and the United Arab Emirates, and provides engineering training to engineers and managers across Europe and the Middle East). Awarded graduation 'With Distinction' from Dalhousie University when completed Bachelor of Engineering degree (1983). Lastly, he was awarded his Bachelor of Engineering Degree 'with distinction' from Dalhousie University, Halifax, Nova Scotia, Canada. He also received a Master of Applied Science in Engineering (M.A.Sc.) from the University of Ottawa, Canada. He is also a member of the Association of Professional Engineers in the province of Ontario, Canada. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations

Commissioning and Start-Up Activities of Coal Power Plants
Delivered in Internationally or OnlineFlexible Dates
£3,009 to £3,499

Combustion Engineering for Coal Fired Power Plants

By EnergyEdge - Training for a Sustainable Energy Future

About this Training Course This 5 full-day course provides detailed description of all combustion equipment and systems used in pulverized coal boilers and circulating fluidized bed (CFB) boilers including pulverized coal burning systems, coal feeder, pulverizer and classifier, pulverized coal burners, furnace and fans. This course provides also a comprehensive explanation of all boiler combustion control systems including pulverizer control system, combustion control, control of coal and air flow into the boiler, furnace pressure control, oxygen trim control, nitrogen oxides (NOx) and sulfur oxides (SOx) control, control of ammonia injection, flue gas dew point control, purge control, flame monitoring and tripping system as well as their tuning methods. All boiler control systems are covered as well in this course including drum level feedwater control, main steam and reheat steam temperature control, boiler limits and runback, sliding or variable pressure control, heat rate optimization with sliding pressure control, boiler-turbine coordinated control, etc. The course provides also detailed explanation of Boiler NFPA 85 Code (Boiler and Combustion Systems Hazards Codes) and American National Standard Institute/Instrument Society of America Code (ANSI/ISA-77-44-01-2007 Code). The burner management systems (BMS) and examples of boiler permissive starting logic and protective tripping logic will be explained thoroughly. The various methods used to calculate the boiler efficiency are covered in detail in this course including the direct and indirect methods. All the factors which affect the efficiency and emissions of pulverized coal boiler and CFB boiler will be explained thoroughly. The course covers also all the methods used to improve the efficiency of pulverized coal boilers and CFB boilers including improvement to their combustion efficiency and control systems performance. Training Objectives Boiler Combustion Equipment and Systems: Gain an in-depth understanding of all boiler combustion equipment and systems including pulverized coal burning systems, coal feeder, pulverizer and classifier, pulverized coal burners, furnace and fans Boiler Combustion Control Systems: Gain a thorough understanding of all boiler combustion control systems for pulverized coal boilers, and CFB boilers including pulverizer control system, combustion control, control of coal and air flow into the boiler, furnace pressure control, oxygen trim control, nitrogen oxides (NOx) and sulfur oxides (SOx) control, control of ammonia injection, flue gas dew point control, purge control, flame monitoring and tripping system Boiler Conventional Control Systems: Gain an in-depth understanding of all boiler conventional control systems including drum level feedwater control, main steam and reheat steam temperature control, boiler limits and runback, sliding or variable pressure control, heat rate optimization with sliding pressure control, and boiler-turbine coordinated control Boiler NFPA 85 Code (Boiler and Combustion Systems Hazards Codes) and American National Standard Institute/Instrument Society of America Code (ANSI/ISA-77-44-01-2007 Code): Learn about NFPA 85 code and ANSI/ISA-77-44-01-2007 code Burner Management System and Boiler Permissive Starting Logic and Protective Tripping Logic: Gain an in-depth understanding of burner management system and boiler permissive starting logic and protective tripping logic Boiler Efficiency Calculations: Learn how to calculate the boiler efficiency using the direct and indirect methods Factors Affecting the Efficiency and Emissions of Boilers: Understand all the factors which affect the boiler efficiency and emissions Methods Used to Improve the Efficiency of Boilers: Learn about all the methods used to improve the efficiency of pulverized coal boilers, and CFB boilers including improvement to their combustion efficiency and control systems performance Boiler Instrument and Piping Diagrams: Gain an in-depth understanding of all boiler instrument and piping diagrams CFB and Pulverized Coal Boilers Equipment and Systems: Learn about various types of equipment and systems used in CFB and pulverized coal boilers including economizers, steam drum, superheaters, air preheaters, ammonia injection systems, etc. Target Audience Engineers of all disciplines Managers Technicians Maintenance personnel Other technical individuals Course Level Basic or Foundation Training Methods Your specialist course leader relies on a highly interactive training method to enhance the learning process. This method ensures that all participants gain a complete understanding of all topics covered. The training environment is highly stimulating, challenging, and effective because the participants will learn by case studies which will allow them to apply the material taught to their own organization. Each delegate will receive a copy of the following materials written by the instructor: Excerpt of the relevant chapters from the 'POWER GENERATION HANDBOOK' second edition published by McGraw-Hill in 2012 (800 pages) Excerpt of the relevant chapters from the 'POWER PLANT EQUIPMENT OPERATION AND MAINTENANCE GUIDE' published by McGraw-Hill in 2012 (800 pages) COMBUSTION ENGINEERING FOR COAL FIRED POWER PLANTS MANUAL (includes practical information about combustion engineering for coal fired power plants - 550 pages) Trainer Your specialist course leader has more than 32 years of practical engineering experience with Ontario Power Generation (OPG), one of the largest electric utility in North America. He was previously involved in research on power generation equipment with Atomic Energy of Canada Limited at their Chalk River and Whiteshell Nuclear Research Laboratories. While working at OPG, he acted as a Training Manager, Engineering Supervisor, System Responsible Engineer and Design Engineer. During the period of time, he worked as a Field Engineer and Design Engineer, he was responsible for the operation, maintenance, diagnostics, and testing of gas turbines, steam turbines, generators, motors, transformers, inverters, valves, pumps, compressors, instrumentation and control systems. Further, his responsibilities included designing, engineering, diagnosing equipment problems and recommending solutions to repair deficiencies and improve system performance, supervising engineers, setting up preventive maintenance programs, writing Operating and Design Manuals, and commissioning new equipment. Later, he worked as the manager of a section dedicated to providing training for the staff at the power stations. The training provided by him covered in detail the various equipment and systems used in power stations. In addition, he has taught courses and seminars to more than four thousand working engineers and professionals around the world, specifically Europe and North America. He has been consistently ranked as 'Excellent' or 'Very Good' by the delegates who attended his seminars and lectures. He written 5 books for working engineers from which 3 have been published by McGraw-Hill, New York. Below is a list of the books authored by him; Power Generation Handbook: Gas Turbines, Steam Power Plants, Co-generation, and Combined Cycles, second edition, (800 pages), McGraw-Hill, New York, October 2011. Electrical Equipment Handbook (600 pages), McGraw-Hill, New York, March 2003. Power Plant Equipment Operation and Maintenance Guide (800 pages), McGraw-Hill, New York, January 2012. Industrial Instrumentation and Modern Control Systems (400 pages), Custom Publishing, University of Toronto, University of Toronto Custom Publishing (1999). Industrial Equipment (600 pages), Custom Publishing, University of Toronto, University of Toronto, University of Toronto Custom Publishing (1999). Furthermore, he has received the following awards: The first 'Excellence in Teaching' award offered by PowerEdge, Singapore, in December 2016 The first 'Excellence in Teaching' award offered by the Professional Development Center at University of Toronto (May, 1996). The 'Excellence in Teaching Award' in April 2007 offered by TUV Akademie (TUV Akademie is one of the largest Professional Development centre in world, it is based in Germany and the United Arab Emirates, and provides engineering training to engineers and managers across Europe and the Middle East). Awarded graduation 'With Distinction' from Dalhousie University when completed Bachelor of Engineering degree (1983). Lastly, he was awarded his Bachelor of Engineering Degree 'with distinction' from Dalhousie University, Halifax, Nova Scotia, Canada. He also received a Master of Applied Science in Engineering (M.A.Sc.) from the University of Ottawa, Canada. He is also a member of the Association of Professional Engineers in the province of Ontario, Canada. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations

Combustion Engineering for Coal Fired Power Plants
Delivered in Internationally or OnlineFlexible Dates
£3,009 to £3,499

Advanced Turnaround, Shutdown and Outage Management

By EnergyEdge - Training for a Sustainable Energy Future

About this Training Course The industry is surrounded with examples of poor Turnarounds, which have injured people and damaged businesses. If Turnarounds are not properly planned, managed and controlled, companies run the risks of serious safety and budget penalties, costly schedule delays and negative impacts on customers. As a consequence, operators are starting to explore Turnaround best practices and establish a more robust methodology. Turnarounds are the highest risk activity that we routinely perform in the industry, but they are also an area of massive variability in approach and outcome. Central to the variability is a lack of written methodologies and training - there are around 1,000 times as many books on maintenance as there are on turnaround management. All too often companies see Turnarounds as something to be survived and therefore it is no surprise that most Turnarounds fail. This 4 full-day course is based upon the Carcharodon 'Best of the Best' model of excellence for shutdown management with inputs from people who have done it from the trenches along with some of the world's most experienced shutdown specialists. All this experience has been condensed into a core methodology - our blueprint for success. It converts Turnarounds from a high-risk nuisance to a business opportunity. It has been used on multiple sites around the world, has been the basis of two books and is also supplemented by a roadmap for building and controlling a successful Turnaround. This is a certificate course where participants will have the option to participate for a short exam on the final day of the course to gain a Certificate in Advanced Turnaround, Shutdown & Outage Management from petroEDGE and the Academy of Turnarounds Operations and Maintenance. The purpose of this course is to equip the participants on the use of the Model of Excellence for Turnarounds and the principles of Challenge Planning to equip attendees with an advanced approach to Turnaround Management. The course is backed by real situations, high levels of interaction, group exercises and multiple case studies. It will explore the underlying mechanisms and levers that shape a Turnaround to demonstrate why we sometimes succeed or fail and introduce new conceptual approaches that can increase our chances of succeeding. Training Objectives Upon completion of this course, the participants will be able to: Position Turnarounds as part of an overall strategy of improving business performance. Build the best Turnaround team possible from available resources. Help senior management build effective steering teams. Reduce the downtime associated with turnarounds while simultaneously improving safety performance. Use the Model of Excellence to analyse their own performance, explain key principles to others and build a detailed methodology of their own. Maximise the benefits of planning and preparation through a proactive challenge planning process where the participants will build a Turnaround from the ground up from concept to execution and review. Target Audience This course has been researched and developed for Experienced Managers, Superintendents, Supervisors, Engineers, Planners, Team Leaders and Coordinators of: Shutdowns/Turnarounds Maintenance Engineering Reliability Plant Outage Asset Management Operations/Audit Safety Course Level Basic or Foundation Trainer Your expert course leader is a highly experienced facilitator in maintenance improvement, change management, continuous improvement and capability development as a management coach and trainer. He has a strong focus on people with an emphasis on developing people and the practicalities of improving maintenance performance rather than just the theory. He has worked internationally across Europe, America, the Middle East and Africa with extensive experience in Oil and Gas, the Chemicals sector and manufacturing as well as working with clients in Steel and Power Generation. As a result, he can bring best practice from a wide variety of sources. He spent the first fifteen years of his career as a specialist trainer working for companies such as Lloyds British Training Services and Rolls Royce. He then went on to work as a Principal consultant for ABB consulting for 15 years. During this time, he refined some of the established improvement tools including how and when to apply them for maximum impact whilst still continuing to develop and deliver training in support of this. Recent work has included improvements to the Work Order to Work Execution processes of Engineering departments and focused on Reliability, Planning and Scheduling. This ongoing field experience has helped him test and refine specialist training in a number of areas. He has been able to use his own experience to contribute with other maintenance specialists to the Carcharodon models of excellence. Its methodologies are recognised as 'Best of the Best' standards providing the inspiration for two books, projects that have won awards such as the prodigious UK Chemical Industries annual Excellence in Engineering award and form the basis of this training. He was recently awarded a national award as coach of the year. He uses the same skills to ensure that he does not just preach maintenance best practice, he discusses it, explains it and ensures that delegates have a much more personal and flexible experience. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations

Advanced Turnaround, Shutdown and Outage Management
Delivered in Internationally or OnlineFlexible Dates
£3,009 to £3,499

Principles of Risk Assessment

5.0(50)

By Pochat Training

QA Level 2 Award In Principles Of Risk Assessment (RQF) Face to Face: One-day course Virtual Classroom: Spread over 3 sessions of 2½ hr duration Don't run risks with the safety of your people - it will cost you a lot more when things start to go wrong... Risk Assessments are vital for Health and Safety, and vital for the whole process Course Contents: Main causes of Work-related Fatalities, Injuries and ill health Moral, Legal and Economic Reasons for Preventing Accidents and ill health at Work Key Terms associated with Risk Assessments in Health and Safety at Work:AccidentNear MissAccident TriangleHazardRiskRisk AssessmentSuitable and SufficientCompetence The Role of Risk Assessments in Accident and ill Health Prevention Legal Requirements for Risk Assessments Importance of Personal hygiene Basic Process for Undertaking a Risk Assessment The Five Steps of a Risk Assessment Benefits of this course: In 2020/21, a whopping 1.7 million people suffered from a work-related illness 441,000 of those sustained an injury 142 People, plus 60 members of the public, lost their lives... The estimated cost of injuries and ill health was £15 billion 28.2 million working days, or 108,045 working years, were lost due to work-related illnesses and injuries It is an employer's duty to protect the health, safety and welfare of their employees and other people who might be affected by their business. This includes providing sufficient information, instruction and training of employees, so they can work in a way that does not put themselves or others at risk Our QA Level 2 Award in Principles of Risk Assessment (RQF) course is ideal for all employees, helping them to create a better understanding of health and safety issues and risk assessments Accredited, Ofqual regulated qualification: QA Level 2 Award in Principles of Risk Assessment (RQF) training course is a nationally recognised, Ofqual regulated qualification accredited by Qualsafe Awards.This means that you can be rest assured that your Principles of Risk Assessment certificate fulfils the legal requirements and is a very good way to make sure you and your employees are trained appropriately.The Ofqual Register number for this course is 603/0857/9

Principles of Risk Assessment
Delivered in Chesterfield or Online + more
£105

Level 2, Fire Safety

5.0(50)

By Pochat Training

QA Level 2 Award In Fire Safety (RQF) Face to Face Classroom: Full day course Online / Virtual Classroom: 3 sessions of 2½ hours Suitable for Fire Wardens/Fire Marshals and all other members of staff Provides a foundation of fire safety knowledge on which employers and ‘responsible persons’ can build, keeping the business safe from fire Benefits of this course: How much do you know about keeping yourself and others safe in the workplace? Fire Safety Law breaches can result in unlimited fines and imprisonment More importantly, how would you feel if someone got injured or even killed by a fire you could have prevented? This course is for anyone who has a specific responsibility for fire safety in the workplace, such as designated fire wardens/fire marshals Successful candidates will gain an understanding of fire safety management at work and the specific roles and responsibilities related to fire safety in the workplace. Course Contents: Causes of Fire in the Workplace The Fire Triangle Hazards during and after a Fire Fire and Smoke Spread Identifying and Controlling Fire Hazards Fire Safety Laws Duties and Responsibilities of Employers and Employees Undertaking a Fire Safety Inspection Fire Safety Risk Assessments Contents of a Fire Safety Briefing Roles and Responsibilities of the Nominated Fire Warden Accredited, Ofqual regulated qualification: Our Fire Safety course is a nationally recognised, Ofqual regulated qualification accredited by Qualsafe Awards.You can rest assured that the training your employees receive is of a high quality and the candidates will get a strong grounding in Fire Safety, helping to keep your staff and your business safe from fire.The Ofqual Register number for this course is 603/2756/X

Level 2, Fire Safety
Delivered in Chesterfield or Online + more
£105

55366 Querying Data with Transact-SQL

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for novice database developers, database administrators, Business Intelligence developers, report creators, and application developers who have an understanding of relational database concepts and have basic Windows navigation skills. Overview Create single table SELECT queries Create multiple table SELECT queries Filter and sort data Insert, update, and delete data Query data using built-in functions Create queries that aggregate data Create subqueries Create queries that use table expressions Use UNION, INTERSECT, and EXCEPT on multiple sets of data Implement window functions in queries Use PIVOT and GROUPING SETS in queries Use stored procedures in queries Add error handling to queries Use transactions in queries This five-day instructor-led course is intended for IT professionals who wish to use the Transact-SQL language to query and configure Microsoft SQL Server. Students are typically database developers and database administrators, but might also be Business Intelligence developers, report creators, or application developers. In this course, students learn how to query single tables, join data from multiple tables, filter and sort data, modify data, use procedures and functions, and implement error handling. Prerequisites Basic understanding of relational databases. Basic Windows knowledge. Module 1: Introduction to Transact-SQL What is Transact-SQL The SELECT statement The WHERE clause Sorting results Calculations CASE expressions Module 2: Joining tables with Transact-SQL The JOIN clause Inner joins Outer joins Self joins and cross joins Module 3: Filtering and sorting results Implement the ORDER BY clause Filter data with the WHERE clause Limit the number of rows returned by a query Implement NULL logic Module 4: SQL Server data types Understand data types Implement string data types Implement temporal data types Module 5: Inserting, updating and deleting data Insert new records Update existing records Delete data Module 6: Using SQL Server functions with Transact-SQL Understand function types in SQL Server Convert data using functions Implement logical functions Work with NULL data using functions Module 7: Aggregating data with Transact-SQL Implement aggregation in SQL Server Group records in SQL Server Filter aggregated data Module 8: Implement subqueries with Transact-SQL Implement scalar and multi-valued sub-queries Implement correlated subqueries Implement existence checks with subqueries Module 9: Create queries that use table expressions Create views Create table-valued functions Implement derived tables Implement common table expressions Module 10: Use UNION, INTERSECT, EXCEPT and APPLY on multiple sets of data Write queries with the UNION operator Write queries with the INTERSECT and EXCEPT operators Write queries with the APPLY operator Module 11: Implement window functions in queries Understand window functions Impement window functions Module 12: Use PIVOT and grouping sets in queries Implement PIVOT in queries Implement grouping sets in queries Module 13: Use stored procedures in queries Query data with stored procedures Interact with stored procedures using input and output parameters Write simple stored procedures Pass dynamic SQL to SQL Server Module 14: Implement programming features in Transact-SQL Understand T-SQL programming elements Implement loops and conditions in T-SQL queries Module 15: Add error handling to queries Understand SQL Server error handling Implemet structured exception handling Module 16: Use transactions in queries Understand database transactions Implement transactions in T-SQL

55366 Querying Data with Transact-SQL
Delivered OnlineFlexible Dates
£2,976

MS-102T00 Microsoft 365 Administrator Essentials

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for persons aspiring to the Microsoft 365 Administrator role and have completed at least one of the Microsoft 365 role-based administrator certification paths. This course covers the following key elements of Microsoft 365 administration: Microsoft 365 tenant management, Microsoft 365 identity synchronization, and Microsoft 365 security and compliance. In Microsoft 365 tenant management, you learn how to configure your Microsoft 365 tenant, including your organizational profile, tenant subscription options, component services, user accounts and licenses, security groups, and administrative roles. You then transition to configuring Microsoft 365, with a primary focus on configuring Office client connectivity. Finally, you explore how to manage user-driven client installations of Microsoft 365 Apps for enterprise deployments. The course then transitions to an in-depth examination of Microsoft 365 identity synchronization, with a focus on Microsoft Entra Connect and Connect Cloud Sync. You learn how to plan for and implement each of these directory synchronization options, how to manage synchronized identities, and how to implement password management in Microsoft 365 using multifactor authentication and self-service password management. In Microsoft 365 security management, you begin examining the common types of threat vectors and data breaches facing organizations today. You then learn how Microsoft 365?s security solutions address each of these threats. You are introduced to the Microsoft Secure Score, as well as to Microsoft Entra ID Protection. You then learn how to manage the Microsoft 365 security services, including Exchange Online Protection, Safe Attachments, and Safe Links. Finally, you are introduced to the various reports that monitor an organization?s security health. You then transition from security services to threat intelligence; specifically, using Microsoft 365 Defender, Microsoft Defender for Cloud Apps, and Microsoft Defender for Endpoint. Once you have this understanding of Microsoft 365?s security suite, you then examine the key components of Microsoft 365 compliance management. This begins with an overview of all key aspects of data governance, including data archiving and retention, Microsoft Purview message encryption, and data loss prevention (DLP). You then delve deeper into archiving and retention, paying particular attention to Microsoft Purview insider risk management, information barriers, and DLP policies. You then examine how to implement these compliance features by using data classification and sensitivity labels. Prerequisites Completed a role-based administrator course such as Messaging, Teamwork, Security, Compliance, or Collaboration. A proficient understanding of DNS and basic functional experience with Microsoft 365 services. A proficient understanding of general IT practices. A working knowledge of PowerShell. 1 - Configure your Microsoft 365 experience Explore your Microsoft 365 cloud environment Configure your Microsoft 365 organizational profile Manage your tenant subscriptions in Microsoft 365 Integrate Microsoft 365 with customer engagement apps Complete your tenant configuration in Microsoft 365 2 - Manage users, licenses, and mail contacts in Microsoft 365 Determine the user identity model for your organization Create user accounts in Microsoft 365 Manage user account settings in Microsoft 365 Manage user licenses in Microsoft 365 Recover deleted user accounts in Microsoft 365 Perform bulk user maintenance in Microsoft Entra ID Create and manage guest users Create and manage mail contacts 3 - Manage groups in Microsoft 365 Examine groups in Microsoft 365 Create and manage groups in Microsoft 365 Create dynamic groups using Azure rule builder Create a Microsoft 365 group naming policy Create groups in Exchange Online and SharePoint Online 4 - Add a custom domain in Microsoft 365 Plan a custom domain for your Microsoft 365 deployment Plan the DNS zones for a custom domain Plan the DNS record requirements for a custom domain Create a custom domain in Microsoft 365 5 - Configure client connectivity to Microsoft 365 Examine how automatic client configuration works Explore the DNS records required for client configuration Configure Outlook clients Troubleshoot client connectivity 6 - Configure administrative roles in Microsoft 365 Explore the Microsoft 365 permission model Explore the Microsoft 365 admin roles Assign admin roles to users in Microsoft 365 Delegate admin roles to partners Manage permissions using administrative units in Microsoft Entra ID Elevate privileges using Microsoft Entra Privileged Identity Management Examine best practices when configuring administrative roles 7 - Manage tenant health and services in Microsoft 365 Monitor the health of your Microsoft 365 services Monitor tenant health using Microsoft 365 Adoption Score Monitor tenant health using Microsoft 365 usage analytics Develop an incident response plan Request assistance from Microsoft 8 - Deploy Microsoft 365 Apps for enterprise Explore Microsoft 365 Apps for enterprise functionality Explore your app compatibility by using the Readiness Toolkit Complete a self-service installation of Microsoft 365 Apps for enterprise Deploy Microsoft 365 Apps for enterprise with Microsoft Configuration Manager Deploy Microsoft 365 Apps for enterprise from the cloud Deploy Microsoft 365 Apps for enterprise from a local source Manage updates to Microsoft 365 Apps for enterprise Explore the update channels for Microsoft 365 Apps for enterprise Manage your cloud apps using the Microsoft 365 Apps admin center 9 - Analyze your Microsoft 365 workplace data using Microsoft Viva Insights Examine the analytical features of Microsoft Viva Insights Explore Personal insights Explore Team insights Explore Organization insights Explore Advanced insights 10 - Explore identity synchronization Examine identity models for Microsoft 365 Examine authentication options for the hybrid identity model Explore directory synchronization 11 - Prepare for identity synchronization to Microsoft 365 Plan your Microsoft Entra deployment Prepare for directory synchronization Choose your directory synchronization tool Plan for directory synchronization using Microsoft Entra Connect Plan for directory synchronization using Microsoft Entra Connect cloud sync 12 - Implement directory synchronization tools Configure Microsoft Entra Connect prerequisites Configure Microsoft Entra Connect Monitor synchronization services using Microsoft Entra Connect Health Configure Microsoft Entra Connect cloud sync prerequisites Configure Microsoft Entra Connect cloud sync 13 - Manage synchronized identities Manage users with directory synchronization Manage groups with directory synchronization Use Microsoft Entra Connect Sync Security Groups to help maintain directory synchronization Configure object filters for directory synchronization Explore Microsoft Identity Manager Troubleshoot directory synchronization 14 - Manage secure user access in Microsoft 365 Manage user passwords Enable pass-through authentication Enable multifactor authentication Enable passwordless sign-in with Microsoft Authenticator Explore self-service password management Explore Windows Hello for Business Implement Microsoft Entra Smart Lockout Implement conditional access policies Explore Security Defaults in Microsoft Entra ID Investigate authentication issues using sign-in logs 15 - Examine threat vectors and data breaches Explore today's work and threat landscape Examine how phishing retrieves sensitive information Examine how spoofing deceives users and compromises data security Compare spam and malware Examine account breaches Examine elevation of privilege attacks Examine how data exfiltration moves data out of your tenant Examine how attackers delete data from your tenant Examine how data spillage exposes data outside your tenant Examine other types of attacks 16 - Explore the Zero Trust security model Examine the principles and components of the Zero Trust model Plan for a Zero Trust security model in your organization Examine Microsoft's strategy for Zero Trust networking Adopt a Zero Trust approach 17 - Explore security solutions in Microsoft 365 Defender Enhance your email security using Exchange Online Protection and Microsoft Defender for Office 365 Protect your organization's identities using Microsoft Defender for Identity Protect your enterprise network against advanced threats using Microsoft Defender for Endpoint Protect against cyber attacks using Microsoft 365 Threat Intelligence Provide insight into suspicious activity using Microsoft Cloud App Security Review the security reports in Microsoft 365 Defender 18 - Examine Microsoft Secure Score Explore Microsoft Secure Score Assess your security posture with Microsoft Secure Score Improve your secure score Track your Microsoft Secure Score history and meet your goals 19 - Examine Privileged Identity Management Explore Privileged Identity Management in Microsoft Entra ID Configure Privileged Identity Management Audit Privileged Identity Management Control privileged admin tasks using Privileged Access Management 20 - Examine Azure Identity Protection Explore Azure Identity Protection Enable the default protection policies in Azure Identity Protection Explore the vulnerabilities and risk events detected by Azure Identity Protection Plan your identity investigation 21 - Examine Exchange Online Protection Examine the anti-malware pipeline Detect messages with spam or malware using Zero-hour auto purge Explore anti-spoofing protection provided by Exchange Online Protection Explore other anti-spoofing protection Examine outbound spam filtering 22 - Examine Microsoft Defender for Office 365 Climb the security ladder from EOP to Microsoft Defender for Office 365 Expand EOP protections by using Safe Attachments and Safe Links Manage spoofed intelligence Configure outbound spam filtering policies Unblock users from sending email 23 - Manage Safe Attachments Protect users from malicious attachments by using Safe Attachments Create Safe Attachment policies using Microsoft Defender for Office 365 Create Safe Attachments policies using PowerShell Modify an existing Safe Attachments policy Create a transport rule to bypass a Safe Attachments policy Examine the end-user experience with Safe Attachments 24 - Manage Safe Links Protect users from malicious URLs by using Safe Links Create Safe Links policies using Microsoft 365 Defender Create Safe Links policies using PowerShell Modify an existing Safe Links policy Create a transport rule to bypass a Safe Links policy Examine the end-user experience with Safe Links 25 - Explore threat intelligence in Microsoft 365 Defender Explore Microsoft Intelligent Security Graph Explore alert policies in Microsoft 365 Run automated investigations and responses Explore threat hunting with Microsoft Threat Protection Explore advanced threat hunting in Microsoft 365 Defender Explore threat analytics in Microsoft 365 Identify threat issues using Microsoft Defender reports 26 - Implement app protection by using Microsoft Defender for Cloud Apps Explore Microsoft Defender Cloud Apps Deploy Microsoft Defender for Cloud Apps Configure file policies in Microsoft Defender for Cloud Apps Manage and respond to alerts in Microsoft Defender for Cloud Apps Configure Cloud Discovery in Microsoft Defender for Cloud Apps Troubleshoot Cloud Discovery in Microsoft Defender for Cloud Apps 27 - Implement endpoint protection by using Microsoft Defender for Endpoint Explore Microsoft Defender for Endpoint Configure Microsoft Defender for Endpoint in Microsoft Intune Onboard devices in Microsoft Defender for Endpoint Manage endpoint vulnerabilities with Microsoft Defender Vulnerability Management Manage device discovery and vulnerability assessment Reduce your threat and vulnerability exposure 28 - Implement threat protection by using Microsoft Defender for Office 365 Explore the Microsoft Defender for Office 365 protection stack Investigate security attacks by using Threat Explorer Identify cybersecurity issues by using Threat Trackers Prepare for attacks with Attack simulation training 29 - Examine data governance solutions in Microsoft Purview Explore data governance and compliance in Microsoft Purview Protect sensitive data with Microsoft Purview Information Protection Govern organizational data using Microsoft Purview Data Lifecycle Management Minimize internal risks with Microsoft Purview Insider Risk Management Explore Microsoft Purview eDiscovery solutions 30 - Explore archiving and records management in Microsoft 365 Explore archive mailboxes in Microsoft 365 Enable archive mailboxes in Microsoft 365 Explore Microsoft Purview Records Management Implement Microsoft Purview Records Management Restore deleted data in Exchange Online Restore deleted data in SharePoint Online 31 - Explore retention in Microsoft 365 Explore retention by using retention policies and retention labels Compare capabilities in retention policies and retention labels Define the scope of a retention policy Examine the principles of retention Implement retention using retention policies, retention labels, and eDiscovery holds Restrict retention changes by using Preservation Lock 32 - Explore Microsoft Purview Message Encryption Examine Microsoft Purview Message Encryption Configure Microsoft Purview Message Encryption Define mail flow rules to encrypt email messages Add organizational branding to encrypted email messages Explore Microsoft Purview Advanced Message Encryption 33 - Explore compliance in Microsoft 365 Plan for security and compliance in Microsoft 365 Plan your beginning compliance tasks in Microsoft Purview Manage your compliance requirements with Compliance Manager Examine the Compliance Manager dashboard Analyze the Microsoft Compliance score 34 - Implement Microsoft Purview Insider Risk Management Explore insider risk management Plan for insider risk management Explore insider risk management policies Create insider risk management policies Investigate insider risk management activities and alerts Explore insider risk management cases 35 - Implement Microsoft Purview Information Barriers Explore Microsoft Purview Information Barriers Configure information barriers in Microsoft Purview Examine information barriers in Microsoft Teams Examine information barriers in OneDrive Examine information barriers in SharePoint 36 - Explore Microsoft Purview Data Loss Prevention Examine Data Loss Prevention Explore Endpoint data loss prevention Examine DLP policies View DLP policy results Explore DLP reports 37 - Implement Microsoft Purview Data Loss Prevention Plan to implement Microsoft Purview Data Loss Protection Implement Microsoft Purview's default DLP policies Design a custom DLP policy Create a custom DLP policy from a template Configure email notifications for DLP policies Configure policy tips for DLP policies 38 - Implement data classification of sensitive information Explore data classification Implement data classification in Microsoft 365 Explore trainable classifiers Create and retrain a trainable classifier View sensitive data using Content explorer and Activity explorer Detect sensitive information documents using Document Fingerprinting 39 - Explore sensitivity labels Manage data protection using sensitivity labels Explore what sensitivity labels can do Determine a sensitivity label's scope Apply sensitivity labels automatically Explore sensitivity label policies 40 - Implement sensitivity labels Plan your deployment strategy for sensitivity labels Examine the requirements to create a sensitivity label Create sensitivity labels Publish sensitivity labels Remove and delete sensitivity labels Additional course details: Nexus Humans MS-102T00: Microsoft 365 Administrator training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the MS-102T00: Microsoft 365 Administrator course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

MS-102T00 Microsoft 365 Administrator Essentials
Delivered OnlineFlexible Dates
£2,975

55348 Administering Microsoft Endpoint Configuration Manager

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is for experienced information technology (IT) professionals, typically described as Enterprise Desktop Administrators (EDAs). These EDAs deploy, manage, and maintain PCs, devices, and applications across medium, large, and enterprise organizations. A significant portion of this audience uses, or intends to use, the latest release of Configuration Manager to manage and deploy PCs, devices, and applications. Overview Describe the features Configuration Manager and Intune include, and explain how you can use these features to manage PCs and mobile devices in an enterprise environment. Analyze data by using queries and reports. Prepare a management infrastructure, including configuring boundaries, boundary groups, and resource discovery, and integrating mobile-device management with Intune. Deploy and manage the Configuration Manager client. Configure, manage, and monitor hardware and software inventory, and use Asset Intelligence and software metering. Identify and configure the most appropriate method to distribute and manage content used for deployments. Distribute, deploy, and monitor applications for managed users and systems. Maintain software updates for PCs that Configuration Manager manages. Implement Endpoint Protection for managed PCs. Configure an operating-system deployment strategy by using Configuration Manager. Manage and maintain a Configuration Manager site. This five-day course describes how to use Configuration Manager and its associated site systems to efficiently manage network resources. In this five-day course, you will learn day-to-day management tasks, including how to manage applications, client health, hardware and software inventory, operating system deployment, and software updates by using Configuration Manager. You also will learn how to optimize Endpoint Protection, manage compliance, and create management queries and reports. Although this course and the associated labs are written for Microsoft Endpoint Configuration Manager and Windows 11, the skills taught will also be backwards compatible with previous editions of System Center Configuration Manager and Windows 10. Prerequisites Networking fundamentals, including common networking protocols, topologies, hardware, media, routing, switching, and addressing. Active Directory Domain Services (AD DS) principles and fundamentals of AD DS management. Installation, configuration, and troubleshooting for Windows-based personal computers. Basic concepts of public key infrastructure (PKI) security. Basic understanding of scripting and Windows PowerShell syntax. Basic understanding of Windows Server roles and services. Basic understanding of the configuration options for iOS and Android Mobile device platforms. 1 - Managing computers and mobile devices in the enterprise Overview of systems management by using enterprise management solutions Overview of the Configuration Manager architecture Overview of the Configuration Manager administrative tools Tools for monitoring and troubleshooting a Configuration Manager site 2 - Analyzing data using queries, reports, and CMPivot Introduction to queries Configuring SQL Server Reporting Services Analyzing the real-time state of a device by using CMPivot 3 - Preparing the Configuration Manager management infrastructure Configuring site boundaries and boundary groups Configuring resource discovery Organizing resources using device and user collections 4 - Deploying and managing the Configuration Manager client Overview of the Configuration Manager client Deploying the Configuration Manager client Configuring and monitoring client status Managing client settings and performing management operations 5 - Managing inventory for PCs and applications Overview of inventory collection Configuring hardware and software inventory Managing inventory collection Configuring software metering Configuring and managing Asset Intelligence 6 - Distributing and managing content used for deployments Preparing the infrastructure for content management Distributing and managing content on distribution points 7 - Deploying and managing applications Overview of application management Creating applications Deploying applications Managing applications Deploying and managing Windows apps 8 - Maintaining software updates for managed PCs The software updates process Preparing a Configuration Manager site for software updates Managing software updates Configuring automatic deployment rules Monitoring and troubleshooting software updates Enabling third-party updates 9 - Implementing Defender Protection for managed PCs Overview of Endpoint Protection in Configuration Manager Configuring, deploying, and monitoring Endpoint Protection policies Configuring and deploying advanced threat policies 10 - Managing compliance and secure data access Overview of Compliance Settings Configuring compliance settings Viewing compliance results Managing resource and data access 11 - Managing operating system deployment An overview of operating system deployment Preparing a site for operating system deployment Deploying an operating system Managing Windows as a service 12 - Managing and maintaining a Configuration Manager site Configuring role-based administration Configuring Remote Tools Overview of Configuration Manager site maintenance and Management Insights Backing up and recovering a Configuration Manager site Updating the Configuration Manager infrastructure 13 - What?s new in Microsoft Endpoint Configuration Manager Whats new in Microsoft Endpoint Manager covering each semi annual release Additional course details: Nexus Humans 55348: Administering Microsoft Endpoint Configuration Manager training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the 55348: Administering Microsoft Endpoint Configuration Manager course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

55348 Administering Microsoft Endpoint Configuration Manager
Delivered OnlineFlexible Dates
£2,975

PL-400T00 Microsoft Power Platform Developer

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Candidates for this course design, develop, secure, and troubleshoot Power Platform solutions. Candidates implement components of a solution that include application enhancements, custom user experience, system integrations, data conversions, custom process automation, and custom visualizations. Candidates will gain applied knowledge of Power Platform services, including in-depth understanding of capabilities, boundaries, and constraints. Overview After completing this course, students will be able to: Create a technical design Configure Common Data Service Create and configure Power Apps Configure business process automation Extend the user experience Extend the platform Develop Integrations The Microsoft Power Platform helps organizations optimize their operations by simplifying, automating and transforming business tasks and processes. In this course, students will learn how to build Power Apps, Automate Flows and extend the platform to complete business requirements and solve complex business problems. Create a model-driven application in Power Apps This module introduces you to creating a model-driven app in Power Apps that uses Common Data Service. Get started using Common Data Service This module will explain the concepts behind and benefits of Common Data Service. Creating an environment, entities, fields and options sets are also discussed. Create a canvas app in Power Apps This module introduces you to Power Apps, helps you create and customize an app, and then manage and distribute it. It will also show you how to provide the best app navigation, and build the best UI using themes, icons, images, personalization, different form factors, and controls. Automate a business process using Power Automate This module introduces you to Power Automate, teaches you how to build workflows, and how to administer flows. Create a business process flow in Power Automate This module introduces you to creating business process flows in Power Automate Introduction to developing with Power Platform This module is the first step in learning about platform, tools, and the ecosystem of the Power Platform Extending the Power Platform user experience Model Driven apps This module describes how to create client scripting, perform common actions with client script, and automate business process flow with client scrip. Learn about what client script can do, rules, and maintaining scripts. Discover when to use client script as well as when not to use client script. Create components with Power Apps Component Framework This module describes how to get started with Power Apps Component Framework with an introductory module on the core concepts and components. Then it shows you how to build a component and work with advanced Power Apps Component Framework features. Extending the Power Platform Common Data Service This module looks at the tools and resources needed for extending the Power Platform. We'll start with looking at the SDKs, the extensibility model, and event framework. This learning path also covers when to use plug-ins. Configuration of plug-ins as well as registering and deploying plug-ins. Integrate with Power Platform and Common Data Service This module describes how to integrate with Common Data Service using code by learning about Common Data Service API. Get an in-depth overview of options available with Common Data Service to integrate data and events to Azure. Extend Power Apps portals This module describes how to transform a content portal into a full web app interacting with Common Data Service. We will also cover the options available to customizers and developers to extend the portal functionality and integrate with Office 365, Power Platform, and Azure components. Additional course details: Nexus Humans PL-400T00 Microsoft Power Platform Developer training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the PL-400T00 Microsoft Power Platform Developer course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

PL-400T00 Microsoft Power Platform Developer
Delivered OnlineFlexible Dates
£2,975

55337 Introduction to Programming

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for anyone who is new to software development and wants, or needs, to gain an understanding of programming fundamentals and object-oriented programming concepts. They will typically be high school students, post-secondary school students, or career changers, with no prior programming experience. They might want to gain an understanding of the core programming fundamentals before moving on to more advanced courses such as Programming in C#. Overview Explain core programming fundamentals such as computer storage and processing. Explain computer number systems such as binary. Create and use variables and constants in programs. Explain how to create and use functions in a program. Create and use decisions structures in a computer program. Create and use repetition (loops) in a computer program. Explain pseudocode and its role in programming. Explain the basic computer data structures such as arrays, lists, stacks, and queues. Implement object-oriented programming concepts. Create and use classes in a computer program. Implement encapsulation, inheritance, and polymorphism. Describe the base class library (BCL) in the .NET Framework. Explain the application security concepts. Implement simple I/O in a computer program. Identify application errors and explain how to debug an application and handle errors. Identify the performance considerations for applications. In this 5-day course, students will learn the basics of computer programming through the use of Microsoft Visual Studio 2022 and the Visual C# and Visual Basic programming languages. The course assumes no prior programming experience and introduces the concepts needed to progress to the intermediate courses on programming, Programming in C#. The focus will be on core programming concepts such as computer storage, data types, decision structures, and repetition by using loops. The course also covers an introduction to object-oriented programming covering classes, encapsulation, inheritance, and polymorphism. Coverage is also included around exception handling, application security, performance, and memory management. 1 - Introduction to Core Programming Concepts Computer Data Storage and Processing Application Types Application Lifecycle Code Compilation 2 - Core Programming Language Concepts Syntax Data Types Variables and Constants 3 - Program Flow Introduction to Structured Programming Concepts Introduction to Branching Using Functions Using Decision Structures Introducing Repetition 4 - Algorithms and Data Structures Understand How to Write Pseudocode Algorithm Examples Introduction to Data Structures 5 - Error Handling and Debugging Introduction to Program Errors Introduction to Structured Error Handling Introduction to Debugging 6 - Introduction to Object-Oriented Programming Introduction to Complex Structures Introduction to Structs Introduction to Classes Introducing Encapsulation 7 - More Object-Oriented Programming Introduction to Inheritance Introduction to Polymorphism Introduction to .NET and the Base Class Library 8 - Introduction to Application Security Authentication and Authorization Code Permissions on Computers Introducing Code Signing 9 - Core I/O Programming Using Console I/O Using File I/O 10 - Application Performance and Memory Management Value Types vs Reference Types Converting Types The Garbage Collector Additional course details: Nexus Humans 55337 Introduction to Programming training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the 55337 Introduction to Programming course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

55337 Introduction to Programming
Delivered OnlineFlexible Dates
£2,975