This course will allow you to explore the potential of self-service business intelligence using Power BI Desktop to analyse and connect to different sources of data, creating Relationships between those different datasets, Query the data using Shaping and data Modelling, to create Visualizations, and publish Reports to different platforms . Course Objectives At the end of this course you will be able to: Connect to data from different sources. Use the Query Editor Perform Power BI desktop data Shaping and Transformation. Create Power BI desktop Modelling. Create Power BI desktop Visualizations and Reports. ' 1 year email support service Take a closer look at the consistent excellent feedback from our growing corporate clients visiting our site ms-officetraining co uk With more than 20 years experience, we deliver courses on all levels of the Desktop version of Microsoft Office and Office 365; ranging from Beginner, Intermediate, Advanced to the VBA level and Business Intelligence. Our trainers are Microsoft certified professionals with a proven track record with several years experience in delivering public, one to one, tailored and bespoke course Tailored training courses: in in company training, you can choose to run the course exactly as they are outlined by us or we can customise it so that it meets your specific needs. A tailored or bespoke course will follow the standard outline but may be adapted to your specific organisational needs. Please visit our site (ms-officetraining co uk) to get a feel of the excellent feedback our courses have had and look at other courses you might be interested in. Introduction to Power BI Power BI Jargon explained A quick look at Power BI Desktop A quick look at the Power BI service Helpful resources Power BI and Excel Introduction to using Excel data in Power BI Upload Excel data to Power BI Import Power View and Power Pivot to Power BI Getting started with Power BI Desktop Overview of Power BI Desktop Accessing Help and Helpful resources Connect to data sources in Power BI Desktop Shaping and Transforming Data with Query Editor Introduction to the Query Editor Data Sources Power BI Desktop can Connect to Introduction to Steps and M code Combining Data Using Merge and Append Queries Data Type Properties Working with Delimiters Clean and transform your data with the Query Editor Text Specific Transformation Tools Number Specific Transformation Tools Date Specific Transformation Tools Split and Merge columns Creating an Index Column Adding Conditional Columns Columns From Examples Grouping and Aggregating data Pivoting and Unpivoting Using filters Modeling the data Introduction to modeling your data How to manage your data relationships Create calculated columns Optimizing data models Create calculated measures Show Values As and Quick Measures Create calculated tables Explore your time-based data Introduction to DAX DAX calculation types DAX functions Visualizations Introduction to visuals in Power BI Create and customize simple visualizations Modify colors in charts and visuals Shapes, text boxes, and images Page layout and formatting Group interactions among visualizations Visual hierarchies and drill-down Using custom visualizations Create a KPI Visualization Geo-Data and Maps Reports, Publishing and Sharing Introduction to the Power BI service Quick insights in Power BI Create and configure a dashboard Ask questions of your data with natural language Create custom Q&A suggestions Share dashboards with your organization Introduction to content packs, security, and groups Publish Power BI Desktop reports Print and export dashboards and reports Create groups in Power BI Use content packs Update content packs Publish to web Who is this course for? Who is this course for? This course facilitates you with knowledge on the potential for Power BI Desktop to analyse and connect to different sources of data, creating Relationships between those different datasets, Query the data using Shaping and data Modelling, and to create Visualizations, and publish Reports to different platforms. Requirements Requirements Before attending this course, delegates should have: - A general knowledge of database concepts (fields, records and relationships) - Familiarity with Excel. Career path Career path Business Intelligence Data Analysis ETL & Data Warehousing
Overview This comprehensive course on An Introduction To Moho Pro/Anime Studio 2D Illustration-Animation will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This An Introduction To Moho Pro/Anime Studio 2D Illustration-Animation comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this An Introduction To Moho Pro/Anime Studio 2D Illustration-Animation. It is available to all students, of all academic backgrounds. Requirements Our An Introduction To Moho Pro/Anime Studio 2D Illustration-Animation is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 6 sections • 18 lectures • 03:26:00 total length •An Overview of Moho: 00:07:00 •Revised Course Objectives: 00:05:00 •Requirements of a Solid Character Body Bone Structure: 00:11:00 •Pose, Proportion, Perspective and Joints: 00:12:00 •Bone Correction, Angle Constraints and Target Bones: 00:12:00 •Constructing Perfect Knee and Elbow Joints (Part 1): 00:14:00 •Constructing Perfect Knee and Elbow Joints (Part 2): 00:09:00 •Drawing Your Character Torso: 00:15:00 •Tracing Your Character Head and Face: 00:17:00 •Cartoon Eyes Option Using Layer Masks: 00:08:00 •Binding Bones to Your Character: 00:07:00 •Rigging Switch Layer Hands, Feet and Mouth: 00:11:00 •Rigging Facial Smart Bone Dials: 00:15:00 •Animating a Walk Cycle (Part 1): 00:13:00 •Animating a Walk Cycle (Part 2): 00:07:00 •Lip Syncing with Papagayo: 00:13:00 •Camera and Background Animation: 00:12:00 •What now?: 00:18:00
RESILIA™ Foundation: In-House Training AXELOS RESILIA™: Cyber Resilience Best Practice is designed to help commercial and government organizations around the world prevent, detect, and correct any impact cyber attacks will have on the information required to do business. Adding RESILIA to the existing AXELOS global best practice portfolio, including ITIL® and PRINCE2®, brings a common cyber resilience best practice for security, IT service management, and business. Active cyber resilience is achieved through people, process, and technology. The RESILIA™ Foundation course starts with the purpose, key terms, the distinction between resilience and security, and the benefits of implementing cyber resilience. It introduces risk management and the key activities needed to address risks and opportunities. Further, it explains the relevance of common management standards and best practice frameworks to achieve cyber resilience. Subsequently, it identifies the cyber resilience processes, the associated control objectives, interactions, and activities that should be aligned with corresponding ITSM activities. In the final part of the course, it describes the segregation of duties and dual controls related to cyber resilience roles and responsibilities. What you will Learn At the end of this course, you will be able to: Demonstrate your knowledge of the purpose, benefits, and key terms of cyber resilience Demonstrate your knowledge of the risk management and the key activities needed to address risks and opportunities Demonstrate your knowledge of the purpose of a management system and how best practices and standards can contribute Demonstrate your knowledge of the cyber resilience strategy, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience design, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience transition, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience operation, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience continual improvement, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of the purpose and benefits of segregation of duties and dual controls Course Introduction Course Learning Objectives Course Agenda Activities Course Book Structure RESILIA Certification Introduction to Cyber Resilience What is Cyber Resilience? Defining Cyber Resilience Balancing in Cyber Resilience Characteristics of Cyber Resilience Risk Management Understanding Risk Management: Discussion Defining Risk Management Addressing Risks and Opportunities Managing Cyber Resilience Why and What of Management Systems? Management Systems Common Management Standards and Frameworks Cyber Resilience Strategy What is Strategy? Cyber Resilience Strategy and Activities Security Controls at Cyber Resilience Strategy Interaction Between ITSM Processes and Cyber Resilience Cyber Resilience Design Why Cyber Resilience Design? Cyber Resilience Design Activities Security Controls at Cyber Resilience Design Aligning ITSM Processes with Cyber Resilience Processes Cyber Resilience Transition Why Cyber Resilience Transition? Basics of Cyber Resilience Transition Cyber Resilience Transition: Controls Interaction Between ITSM Processes and Cyber Resilience Cyber Resilience Operation The Purpose of Cyber Resilience Operation Security Controls in Cyber Resilience Operation Interaction Between IT Processes and Cyber Resilience Interaction Between ITSM Functions and Cyber Resilience Cyber Resilience Continual Improvement Continual or Continuous Improvement Maturity Models Continual Improvement Controls The Seven-Step Improvement Process The ITIL CSI Approach Cyber Resilience Roles & Responsibilities Segregating Duties Dual Controls
Course Objectives At the end of this course you will be able to: Identify and work with basic Word 2013 tools and features Edit text in a Word document Modify the appearance of text in a Word document Organise data in tables and lists Insert special characters and graphical objects Control the appearance of pages in a Word document Proof a document Customise the Word environment '1 year email support service Take a look at the consistent excellent feedback from our corporate clients visiting our site ms-officetraining co uk Customer Feedback Good pace, questions encoraged, trainer ensured everyone was kept at same level. Jenny Price - ACER ' With more than 20 years experience, we deliver courses on all levels of the Desktop version of Microsoft Office and Office 365; ranging from Beginner, Intermediate, Advanced to the VBA level. Our trainers are Microsoft certified professionals with a proven track record with several years experience in delivering public, one to one, tailored and bespoke courses. Tailored in company training courses: You can choose to run the course exactly as they are outlined by us or we can customise it so that it meets your specific needs. A tailored or bespoke course will follow the standard outline but may be adapted to your specific organisational needs. Getting Started with Word Identify the Components of the Word Interface Create a Word Document Help Editing a Document Navigate and Select Text Modify Text Find and Replace Text Formatting Text and Paragraphs Apply Character Formatting Align Text Using Tabs Display Text as List Items Control Paragraph Layout Apply Borders and Shading Apply Styles Manage Formatting Adding Tables Insert a Table Modify a Table Format a Table Convert Text to a Table Managing Lists Sort a List Renumber a List Customise a List Inserting Graphic Objects Insert Symbols and Special Characters Add Images to a Document Page Setup Apply a Page Border and Color Add a Watermark Add Headers and Footers Control Page Layout Proofing a Document Check Spelling and Grammar Other Proofing Tools Check Accessibility Customising the Word Environment Customise the Word Interface Additional Save Options Who is this course for? Who is this course for? This course is intended for delegates who want to learn the fundamentals skills of working with Microsoft Word Requirements Requirements General knowledge of the Windows OS Career path Career path Microsoft Office know-how can instantly increase your job prospects as well as your salary. 80 percent of job openings require spreadsheet and word-processing software skills
IT Security is one of the most sought-after subjects due to the constant development of new technologies and the increasing number of cyber threats. Gain essential IT security knowledge and skills, to help protect your digital life. Description This e-learning course is designed to give all employees of a firm an understanding of Information Security and how it operates in the workplace. The course is important for GDPR understanding. Training Duration This course may take up to 2 hours to be completed. However, actual study time differs as each learner uses their own training pace. Training Method The course is offered fully online using a self-paced approach. The learning units consist of reading material. Learners may start, stop and resume their training at any time. At the end of each session, participants take a Quiz to complete their learning unit and earn a Certificate of Completion upon completion of all units. Accreditation and CPD Recognition This programme has been developed by the London Governance and Compliance Academy (LGCA), a UK-recognised training institution. The syllabus is verified by external subject matter experts and can be accredited by regulators and other bodies for 2 CPD Units that approve education in information security. Eligibility criteria and CPD Units are verified directly by your association, regulator or other bodies which you hold membership. Registration and Access To register to this course, click on the Get this course button to pay online and receive your access instantly. If you are purchasing this course on behalf of others, please be advised that you will need to create or use their personal profile before finalising your payment. If you wish to receive an invoice instead of paying online, please contact us at info@lgca.uk. Access to the course is valid for 365 days.
The Negative Thought Pattern Interrupt does exactly what it says Course curriculum 1 Welcome to the course! Welcome from Simon Lee Maryan, Course Creator What is the Somato-Limbic Metacognitive Process (SLM Process)? CPD Accreditation About the Course Creator How to Navigate this course What Are Your Initial Outcomes SLM Process Course Learning Outcomes Individual Change Readiness Assessment 2 Part 1 - Theory Part 1 - Introduction Video 3 Bonus Module 1: Psychological and Physiological Effects of Stress Lesson BM1.1: Stress and Work Lesson BM1.2: Types of Stress and Causes Lesson BM1.3: Physical Effects of Stress - Musculoskeletal Lesson BM1.4: Physical Effects of Stress - Respiratory Lesson BM 1.5: Physical Effects of Stress - Cardiovascular Lesson BM 1.6: Physical Effects of Stress - Endocrine Lesson BM 1.7: Physical Effects of Stress - Gastrointestinal Lesson BM 1.8: Physical Effects of Stress - Nervous Lesson BM1.9 - Psychological Effects of Stress 4 Bonus Module 2: Psychological and Physiological Effects of Fatigue Lesson BM2.1: Definition of Fatigue Lesson BM2.2: Types of fatigue and Causes Lesson BM2.3: Psychological Effects of Fatigue Lesson BM2.4: Methods to Manage Stress and Fatigue 5 Module 1: Foundation Theory Lesson 1.1: The Principles for SuccessFREE PREVIEW Lesson 1.2: Creating Outcomes with Positive Effect Lesson 1.3: Setting an Intervention Up For Success Lesson 1.4: Cause and Effect Lesson 1.5: The Mind-Body Connection Lesson 1.6: Neurological Connections Lesson 1.7: The Presuppositions for Life Module 1 Assessment 6 Module 2: Communication Principles and Skills Module 2: Introduction Video Lesson 2.1: A Communication Model Lesson 2.2: Observing Body Language and Non-Verbal Communication Lesson 2.2.1: Behavioural Profiling Aide Memoire Lesson 2.2.2: Basic Behavioural Profiling Exercises Lesson 2.3: Rapport - What is it, how do we build and maintain it? Lesson 2.4: Our Senses and Language Lesson 2.4.1: Exercise - Sensory Preference Lesson 2.4.1 - Exercise Worksheet Lesson 2.5: Predicate Language Module 2 Assessment 7 Module 3: Eye Movement Patterns Module 3 Introduction Video Lesson 3.1: Eye Movement Pattern Cues Lesson 3.2: How to Elicit Eye Patterns Lesson 3.3: Eye Tracking Exercise Lesson 3.3.1 Eye Tracking Exercise Sheet - PDF Lesson 3.4: Synesthesia Module 3 Assessment 8 Module 4: Submodalities Module 4 Introduction Video Lesson 4.1: Modalities and Submodalities Lesson 4.2: Possible uses for Changing Submodalities and How to Elicit Them Lesson 4.3: Using Submodalities for Change Lesson 4.3.1: Exercise - Submodality Change Video: How to use the Submodality Checklist Lesson 4.3.2: Submodality Checklist PDF Module 4 Assessment 9 Module 5: The Limbic System, Memory and Brain Activity Module 5: Introduction Video Lesson 5.1: How the Limbic System Affects Memory Lesson 5.1.1: Memory Graphics - Downloads Lesson 5.2: Perceptual Blindness and Conscious Overload Lesson 5.3: Brain Activity and Brain Waves Lesson 5.4: Circadian Rhythm Lesson 5.4.1: Exercise Worksheet - Sleep Diary Lesson 5.5:Ultradian Rhythm Module 5 Assessment 10 Module 6: Influences on Your State of Mind, Emotions, Beliefs and Decisions Module 6: Introduction Video Lesson 6.1: Influences on Your State of Mind Lesson 6.2: Emotional Response vs Decisions Lesson 6.3: Beliefs Lesson 6.4: Identifying Limiting Beliefs Lesson 6.4.1: Exercise Worksheet - Identify Your Limiting Beliefs Lesson 6.5: Limiting Beliefs - Framing Principle, Frame of Reference Lesson 6.5.1: Reframing, Schemas, Meaning Lesson 6.5.2 - Exercise Worksheet - Identify Your Frames of Reference, Schemas and Meaning Lesson 6.6: Values Lesson 6.6.1: Values Exercise Video Explanation Lesson 6.6.1 - Values Exercise WorkSheet Lesson 6.6.2: Beliefs Behind Your Values Video Explanation Lesson 6.6.2 - Exercise Worksheet 2 - Beliefs Behind Your Values Module 6 Assessment 11 Module 7:The Logical Levels Model for Personal Change Module 7: Introduction Video Lesson 7.1: An Introduction to the Logical Levels Model Lesson 7.2: Logical Levels - Environment Lesson 7.3: The logical Levels - Behaviour Lesson 7.4: The Logical Levels - Capability Lesson 7.5: The Logical Levels Model - Beliefs and Values Lesson 7.6: The Logical Levels Model - Identity Lesson 7.7: The Logical Levels Model - Purpose Video Explanation of Personal Exploration Exercise Lesson 7.8: Personal Exploration Exercise - PDF Module 7 Assessment 12 Module 8: Behavioural Change Module 8: Introduction Video Lesson 8.1: The Behavioural Change Learning Cycle Behavioural Change Learning Cycle - Video Explanation Behavioural Change Learning Cycle PDF Lesson 8.2: The Intentional Change Model Lesson 8.2.1: Reflective Exercise - Who Helped Me and Who Tried Lesson 8.3: The Intentional Change Model Cont. Module 8 Assessment 13 Part 2 - Techniques Part 2 - Techniques Introduction 14 Module 9: Negative Thought Pattern Interrupt Lesson 9.1: Negative Thought Pattern Interrupt - What Is It? Lesson 9.2: NTPI - The Process Overview Lesson 9.3: NTPI - The Process in Detail Lesson 9.4: NTPI - Live Video Demo with Client Lesson 9.5: NTPI Assignment 15 Module 10: The Whole Brain State Lesson 10.1: The Whole Brain State (WBS) - Description Lesson 10.2: WBS - The Process Lesson 10.3: The Whole Brain State - Live Video Demo with Client Lesson 10.4: Whole Brain State Assignment 16 Module 11: Anchoring Lesson 11.1: Brief History of Anchoring Lesson 11.2: Uses of Anchoring Lesson 11.3: 5 Keys to Anchoring - ITURN Lesson 11.4: The Anchoring Process Lesson 11.4.1: Icarus Anchoring Process - PDF Download Lesson 11.5: Anchoring - Live Video Demo with Client Lesson 11.6: Anchoring Assignment Lesson 11.7: How to Bring all Three Techniques Together 17 Module 12: Eye Patterning and Re-imprinting Lesson 12.1: What Is Eye Patterning and Re-Imprinting Lesson 12.2: What Are Memories & Imprints & How Are They Created? Lesson 12.3: Brick Walls and Feeling Stuck Lesson 12.4: Eye Patterning and Re-imprinting Process Lesson 12.5: EPRI - Live Video Demo with Client Lesson 12.6: Eye Patterning and Re-imprinting Assignment 18 Module 13: Swish Pattern Lesson 13.1: The Swish Pattern Lesson 13.2: Keys To Successful SWISH Patterns Lesson 13.3: SWISH Pattern Guide Script 19 Module 14: Purpose Lesson 14.1: Purpose Lesson 14.2: Your Purpose Statement - Exercise Worksheet 20 Module 15: Case Studies Assignment Lesson 15.1 - Case Study Assignment Lesson 15.2: Sample Case Studies and Informed Consent Form 21 Bonus Module 3: Personal Needs Lesson B3.1: How are Your Personal Needs Being Fulfilled? Lesson B3.1 - Exercise Worksheet - Hierarchy of Needs 22 Next steps More resources for you Before you go...Please leave us your thoughts on your experience of this course. This is invaluable to us as it means you are helping us to continuously improve our courses as we learn from you.
Hyper V for engineers training course description This five day course will provide you with the knowledge and skills required to design and implement Microsoft Server Virtualization solutions using Hyper-V and System Center. Please note that due to the nature of the lab / environment build delegates may be required to work in pairs. What will you learn Install and configure the Hyper-V server role. Create virtual machines, create and manage virtual hard disks and work with snapshots. Create and configure virtual machine networks in a Hyper-V environment. Provide high availability for Hyper-V environment by implementing failover clustering. Use System Center 2012 R2 Virtual Machine Manager. Create and manage virtual machines by using VMM. Hyper V for engineers training course details Who will benefit: Anyone designing, implementing, managing and maintaining a virtualization infrastructure. Prerequisites: Supporting Windows server 2012 Duration 5 days Hyper V for engineers training course contents Evaluating the environment for virtualization Overview of Microsoft virtualization, Overview of system center 2012 R2 components, Evaluating current environment for virtualization, Extending virtualization to the cloud environment. Selecting the appropriate virtualization method, Assessing the environment by using MAP. Installing and configuring the Hyper-V role Installing the Hyper-V role, Managing Hyper-V, Configuring Hyper-V settings, Hyper-V Host storage and networking, Installing the Hyper-V server role, Configuring Hyper-V settings, Accessing and managing Hyper-V remotely. Creating and managing virtual hard disks, virtual machines, and checkpoints Creating and configuring virtual hard disks, Creating and configuring virtual machines, Installing and Importing virtual machines, Managing virtual machine checkpoints, Monitoring Hyper-V, Designing virtual machines for server roles and services, Creating and managing virtual hard disks, Creating and managing virtual machines, Importing virtual machines and working with checkpoints monitoring Hyper-V. Creating and configuring virtual machine networks Creating and using Hyper-V virtual switches, Advanced Hyper-V networking features, Configuring and using Hyper-V network virtualization, Creating and using Windows Server 2012 R2 Hyper-V virtual switches, Configuring and using advanced virtual switch features, Configuring Hyper-V Network virtualization. Virtual machine movement and Hyper-V replica Providing high availability and redundancy for virtualization, Implementing virtual machine movement, Implementing and managing Hyper-V replica, Moving Hyper-V storage and virtual machines, Configuring and managing Hyper-V replica. Implementing failover clustering with Hyper-V Overview of failover clustering, Configuring and using shared storage, Implementing and managing failover clustering with Hyper-V, Creating a Hyper-V failover cluster, Managing a Hyper-V failover cluster. Installing and configuring System Center 2012 R2 virtual machine manager Integrating system center and server virtualization, Overview of VMM, Installing VMM, Adding hosts and managing host groups, Installing and configuring System Center 2012 R2 VMM, Managing hosts and host groups. Managing the Networking and storage infrastructure in System Center 2012 R2 VMM Managing networking infrastructure managing storage infrastructure, Managing infrastructure updates, Implementing a network infrastructure, Implementing a storage infrastructure, Managing infrastructure updates. Creating and managing VM using MS System Center 2012 R2 VMM VMM tasks in VMM, Creating, cloning, and converting VMs, Overview of VM updating, Creating a VM and modifying it's properties, Cloning a VM. Configuring and managing the MS System Center 2012 R2 VMM library and library objects Overview of the VMM library, Working with profiles and templates, Configuring and managing the VMM library, Creating and managing profiles and templates. Managing clouds in MS System Center 2012 R2 VMM Introduction to clouds, Creating and managing a cloud, Working with user roles in VMM, Creating a cloud, Working with user roles, Deploying VMs to a private cloud. Managing services in MS System Center 2012 R2 VMM and app controller Understanding services in VMM, Creating and managing services in VMM, Using app controller Creating a service template, Deploying a service and updating a service template, Configuring app controller, Deploying a VM in app controller. Protecting and monitoring virtualization infrastructure Overview of backup and restore options for VM, Protecting virtualization Infrastructure using DPM, Using Operations Manager for monitoring and reporting, Integrating VMM with Operations Manager, Implementing MS System Center 2012 R2 Operations Manager agents, Configuring Operations Manager monitoring components, Configuring Operations Manager integration with System Center 2012 R2 VMM.
Complete Python training course description Python is an agile, robust, expressive, fully objectoriented, extensible, and scalable programming language. It combines the power of compiled languages with the simplicity and rapid development of scripting languages. This course covers Python from the very basics of 'hello world!' through to object oriented programming and advanced topics such as multi threading. Hands on follows all the major sections in order to reinforce the theory. What will you learn Read Python programs. Write Python programs. Debug Python programs. Use Python's objects and memory model as well as its OOP features. Complete Python programming training course details Who will benefit: Anyone wishing to learn Python. Prerequisites: None. Duration 5 days Complete Python programming training course contents Welcome to Python: What is Python? Origins, features. Downloading and installing Python, Python manuals, comparing Python, other implementations. Getting started: Program output, the print statement, "hello world!", Program input, raw_input(), comments, operators, variables and assignment, numbers, strings, lists and tuples, dictionaries, indentation, if statement, while Loop, for loop. range(), list comprehensions. Files, open() and file() built-in functions. Errors and exceptions. Functions, Classes, Modules, useful functions. Python basics: Statements and syntax, variable assignment, identifiers, basic style guidelines, memory management, First Python programs, Related modules/developer tools. Python Objects: Other built-in types, Internal Types, Standard type operators, Standard type built-in functions, Categorizing standard types, Unsupported types. Numbers: Integers, Double precision floating point numbers, Complex numbers, Operators, Built-in and factory functions, Other numeric types. Sequences: strings, lists, and tuples: Sequences, Strings, Strings and operators, String-only operators, Built-in functions, String built-in methods, Special features of strings, Unicode, Summary of string highlights, Lists, Operators, Built-in functions, List type built-in methods, Special features of lists, Tuples, Tuple operators and built-in functions, Tuples special features, Copying Python objects and shallow and deep copies. Mapping and set types: Mapping Type: dictionaries and operators, Mapping type built-in and factory functions, Mapping type built-in methods, Dictionary keys, Set types, Set type operators, Built-in functions, Set type built-in methods. Conditionals and loops: If, else and elif statements, Conditional expressions, while, for, break, continue and pass statements, else statement . . . take two, Iterators and iter(), List comprehensions, Generator expressions. Files and input/output: File objects, File built-in functions [open() and file()], File built-in methods and attributes, Standard files, Command-line arguments, File system, File execution, Persistent storage modules. Errors and exceptions: What are exceptions? Detecting and handling exceptions, Context management, Exceptions as strings, Raising exceptions, Assertions, Standard exceptions, Creating Exceptions, Why exceptions, Exceptions and the sys module. Functions: Calling, creating and passing functions, formal arguments, variable-length arguments, functional programming, Variable scope, recursion, generators. Modules: Modules and files, Namespaces, Importing modules, Module import features, Module built-in functions, Packages, Other features of modules. Object-Oriented Programming (OOP): Classes, Class attributes, Instances, Instance attributes, Binding and method invocation, Static methods and class methods, Composition, Sub-classing and derivation, Inheritance, Built-in functions for classes, and other objects, Customizing classes with special methods, Privacy, Delegation, Advanced features of new-style classes (Python 2.2+), Related modules and documentation. Execution environment: Callable and code Objects, Executable object statements and built-in functions, Executing other programs. 'Restricted' and 'Terminating' execution, operating system interface. Regular expressions: Special symbols and characters, REs and Python, Regular expressions example. Network programming: Sockets: communication endpoints, Network programming in Python, SocketServer module, Twisted framework introduction. Internet client programming: What are internet clients? Transferring files, Network news, E-mail. Multithreaded Programming: Threads and processes Python, threads, and the global interpreter lock, The thread and threading Modules. GUI programming: Tkinter and Python programming, Tkinter Examples, Brief tour of other GUIs. Web programming: Web surfing with Python: creating simple web clients, Advanced Web clients, CGI: helping web servers process client data, Building CGI applications, Using Unicode with CGI, Advanced CGI, Web (HTTP) Servers. Database programming: Python database application programmer's interface (DB-API), ORMs. Miscellaneous Extending Python by writing extensions, Web Services, programming MS Office with Win32 COM, Python and Java programming with Jython.
An Introduction to Payroll Accounting Course Description Copyright Ross Maynard 2021 Course Description Welcome to an Introduction to Payroll Accounting. This course provides an overview of payroll accounting. It is aimed at accountants and business managers and owners new to payroll accounting and looking for straightforward coverage of the key elements and features of payroll. In this course we will cover the core elements of payroll; how gross pay is calculated; and issues when dealing with tips and benefits in kind. We’ll also look at tax-exempt deductions and the statutory deductions from pay. We’ll review the main elements of payroll taxation and social security contributions including the terminology used in the United States, Canada and the United Kingdom. And we’ll cover the calculation of Net Pay – that is the amount that the employee actually receives in their bank account. Finally we’ll explore the main journal entries required in the accounts. The principles and structure of payroll accounting are common across many jurisdictions, and the learning in this course applies in many countries of the world. For this reason, the course does not go into the detail of any country-specific legislation or regulations, and does not cover the particular tax rates, tax bands or deduction rates that apply in different jurisdictions. This course provides a grounding in the principles and structure of payroll accounting whatever your country of operation. I hope you enjoy it. Key Learning Points On completion of the course, delegates will be able to: Describe the main components of payroll including allowances, taxes and deductions. Explain the terms Gross Pay, Taxable Pay and Net Pay Identify the statutory taxes and deductions applicable in the United States, Canada and the United Kingdom Complete the main Journal Entries required to process payroll Describe the elements recorded in a Payroll Register Curriculum Lesson 1: First Principles in Payroll Accounting Lesson 2: Getting to Gross Pay Lesson 3: Allowances and Deductions Lesson 4: Income Taxes and Social Security Contributions Lesson 5: The Calculation of Net Pay Lesson 6: Specific Payroll Terminology for the United States, Canada and the United Kingdom Lesson 7: Payroll Journal Entries Lesson 8: Final Thoughts on Payroll Accounting Appendix: The Payroll Register Pre-Course Requirements There are no pre-course requirements Additional Resources None Course Tutor Your tutor is Ross Maynard. Ross is a Fellow of the Chartered Institute of Management Accountants in the UK and has 30 years’ experience as a process improvement consultant specialising in business processes and organisation development. Ross is also a professional author of online training courses. Ross lives in Scotland with his wife, daughter and Cocker Spaniel
ITIL® 4 Strategist: Direct, Plan and Improve: Virtual In-House Training The ITIL® 4 Strategist: Direct, Plan, and Improve course is based on the ITIL® 4 Strategist Direct, Plan, and Improve candidate syllabus from AXELOS. This course is based on the ITIL® 4 Strategist: Direct, Plan and Improve IT exam specifications from AXELOS. With the help of ITIL® 4 concepts and terminology, exercises, and examples included in the course, candidates acquire the relevant knowledge required to pass the certification exam. This course provides the practical skills necessary to create a 'learning and improving' IT organization, with a strong and effective strategic direction. It was designed to provide practitioners with a practical and strategic method for planning and delivering continual improvement with necessary agility. It covers both practical and strategic elements, making it the universal module that is a key component to both ITIL® 4 Managing Professional and ITIL® 4 Strategic Leader streams. What You Will Learn At the end of this course, participants will be able to: Understand the key concepts of direction, planning, improvement Understand the scope of what is to be directed and/or planned and know how to use key principles and methods of direction and planning in that context Understand the role of GRC and know how to integrate the principles and methods into the service value system Understand and know how to use the key principles and methods of continual improvement for all types of improvements Understand and know how to use the key principles and methods of Communication and Organizational Change Management to direction, planning and improvement Understand and know how to use the key principles and methods of measurement and reporting in direction, planning, and improvement Understand and know how to direct, plan, and improve value streams and practices Course Introduction Let's Get to Know Each Other Course Overview ITIL® 4 Certification Scheme Course Learning Objectives Course Components Course Agenda Exercises Case Study: Axle Car Hire Case Study: HandyPerson on Demand Exam Details Core Concepts of DPI Key Terms Covered in the Module Module Learning Objectives Basics of Direction Basics of Planning Basics of Improvement Other Core Elements DPI through Service Value Chain and Guiding Principles Key Terms Covered in the Module Module Learning Objectives DPI of the SVS DPI of Guiding Principles Role of Direction in Strategy Management Key Terms Covered in the Module Introducing Strategy Management Developing Effective Strategies Implementation of Strategies Key Terms Covered in the Module Module Learning Objectives Managing Risks Making Decisions through Portfolio Management Directing via Governance, Risk, and Compliance (GRC) Introduction to Assessment and Planning Key Terms Covered in the Module Module Learning Objectives Core Concepts of Assessment Conducting Effective Assessments Core Concepts of Planning Assessment and Planning through VSM Key Terms Covered in the Module Module Learning Objectives Introducing VSM Developing Value Stream Maps Knowing More About VSM Measurement, Reporting, and Continual Improvement Key Terms Covered in the Module Module Learning Objectives Measurement and Reporting Alignment of Measurements and Metrics Success Factors and Key Performance Indicators Continual Improvement Measurements and Continual Improvement through Dimensions and SVS Key Terms Covered in the Module Module Learning Objectives Measurements for the Four Dimensions Continual Improvement of the Service Value Chain and Practices OCM Principles and Methods Key Terms Covered in the Module Module Learning Objectives Basics of OCM OCM throughout DPI and Service Value Chain Resistance and Reinforcement Communication Principles and Methods Key Terms Covered in the Module Module Learning Objectives Basics of Effective Communication Communication with Stakeholders SVS Development Using Four Dimensions Key Terms Covered in the Module Module Learning Objectives Organizations and People in the SVS Partners and Suppliers in the SVS Value Streams and Processes in the SVS Information and Technology in the SVS