• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

2538 Courses in Sheffield delivered Online

The Flo Sessions - Short Flo

5.0(2)

By The Flo Coach

Boost your productivity and focus with The Flo Sessions

The Flo Sessions - Short Flo
Delivered OnlineFlexible Dates
£10.50

Complete Accounting & Bookkeeping Training

5.0(3)

By School Of Health Care

Accounting & Bookkeeping: Complete Accounting & Bookkeeping Training Accounting is concerned with the daily flow of money into and out of a business or institution. Finance refers to the management of assets and liabilities as well as the planning of future growth. Accounting & Bookkeeping help companies measure, monitor, and plan their operations. Accounting & Bookkeeping help companies measure, monitor, and plan their operations. This Complete Accounting & Bookkeeping Training course is designed to provide a comprehensive introduction to business Accounting & Bookkeeping as an idea and a profession. If you're interested in becoming an account assistant or finance manager, other opportunities are available if you are passionate then this is the course for you. ThisComplete Accounting & Bookkeeping Training course will give you a solid understanding of accounting and financial processes, concepts, and responsibilities, preparing you for a career in the Accounting & Bookkeeping industry. Learning Outcomes After completing the Complete Accounting & Bookkeeping Training course, the learner will be able to - Learn the fundamentals of Accounting & Bookkeeping. Recognize the various types of cost data and cost analysis. Cost management and analysis reports. Understand how to handle accounts receivable and credit. Understand inventory management. Recognize the time value of money Identify accounting conventions and how to record financial data Improve managerial performance by understanding Special Offers of this Accounting & Bookkeeping: Complete Accounting & Bookkeeping Training Course This Accounting & Bookkeeping: Complete Accounting & Bookkeeping Training Course includes a FREE PDF Certificate. Lifetime access to this Accounting & Bookkeeping: Complete Accounting & Bookkeeping Training Course Instant access to this Accounting & Bookkeeping: Complete Accounting & Bookkeeping Training Course 24/7 Support Available to this Accounting & Bookkeeping: Complete Accounting & Bookkeeping Training Course [ Note: Free PDF certificate as soon as completing the Accounting & Bookkeeping: Complete Accounting & Bookkeeping Training Course] Accounting & Bookkeeping: Complete Accounting & Bookkeeping Training Unlock the key to managing business finances with our Accounting & Bookkeeping: Complete Accounting & Bookkeeping Training course! This program focuses on the daily flow of money and the management of assets and liabilities. Accounting & Bookkeeping: Complete Accounting & Bookkeeping Training will equip you with the skills needed to measure, monitor, and plan financial operations effectively. Designed to offer a comprehensive introduction to both business Accounting & Bookkeeping, the Accounting & Bookkeeping: Complete Accounting & Bookkeeping Training course is perfect for aspiring professionals. Start your journey today and master the essentials of Accounting & Bookkeeping: Complete Accounting & Bookkeeping Training! Certificate of Completion You will receive a course completion certificate for free as soon as you complete the Accounting & Bookkeeping: Complete Accounting & Bookkeeping Training Course. Who is this course for? Accounting & Bookkeeping: Complete Accounting & Bookkeeping Training This Complete Accounting & Bookkeeping Training is for the ones who are interested in banking sector specially account and finance. Anyone who wants to advance their professional life. Requirements Accounting & Bookkeeping: Complete Accounting & Bookkeeping Training To enrol in this Complete Accounting & Bookkeeping Training Course, students must fulfil the following requirements: Good Command over English language is mandatory to enrol in our Complete Accounting & Bookkeeping Training Course. Be energetic and self-motivated to complete our Complete Accounting & Bookkeeping Training Course. Basic computer Skill is required to complete our Complete Accounting & Bookkeeping Training Course. If you want to enrol in our Accounting & Bookkeeping: Complete Accounting & Bookkeeping Training Course, you must be at least 15 years old. Career path Accounting & Bookkeeping: Complete Accounting & Bookkeeping Training After completing this Complete Accounting & Bookkeeping Training course, you may be able to pursue a variety of promising career opportunities, such as: Account manager Finance manager Administrative specialist and many more.

Complete Accounting & Bookkeeping Training
Delivered Online On Demand4 hours 36 minutes
£12

Level 5 Accounting and Finance & Payroll Management

5.0(3)

By School Of Health Care

Level 5 Accounting and Finance & Payroll Management Level 5 Accounting and Finance & Payroll Management is concerned with the daily flow of money into and out of businesses or institutions. Level 5 Accounting and Finance & Payroll Management refers to the management of assets, liabilities, and planning for future growth. This Level 5 Accounting and Finance & Payroll Management course helps companies measure, monitor, and plan their operations effectively. If you're passionate about becoming an accounting assistant or finance manager, the Level 5 Accounting and Finance & Payroll Management course is for you. This Level 5 Accounting and Finance & Payroll Management course provides a comprehensive introduction to accounting, financial processes, concepts, and responsibilities, preparing you for a successful career in this field. Learning Outcomes After completing the Level 5 Accounting and Finance & Payroll Managementcourse, the learner will be able to - Learn the fundamentals of accounting and finance. Recognize the various types of cost data and cost analysis. Cost management and analysis reports. Understand how to handle accounts receivable and credit. Understand inventory management. Recognize the time value of money Identify accounting conventions and how to record financial data Improve managerial performance by understanding Special Offers of this Level 5 Accounting and Finance & Payroll Management Course This Level 5 Accounting and Finance & Payroll Management Course includes a FREE PDF Certificate. Lifetime access to this Level 5 Accounting and Finance & Payroll Management Course Instant access to this Level 5 Accounting and Finance & Payroll Management Course 24/7 Support Available to this Level 5 Accounting and Finance & Payroll Management Course [ Note: Free PDF certificate as soon as completing the Level 5 Accounting and Finance & Payroll Management Course] Level 5 Accounting and Finance & Payroll Management Unlock your potential with our Level 5 Accounting and Finance & Payroll Management course! This comprehensive program focuses on the daily flow of money in and out of businesses, equipping you with the essential tools to manage finances effectively. With Level 5 Accounting and Finance & Payroll Management, you’ll master the management of assets, liabilities, and the strategic planning of future growth. Designed to help companies measure, monitor, and plan their financial operations, the Level 5 Accounting and Finance & Payroll Management course provides a deep dive into business finance as both an idea and profession. Start today and elevate your career with Level 5 Accounting and Finance & Payroll Management! Certificate of Completion You will receive a course completion certificate for free as soon as you complete the Level 5 Accounting and Finance & Payroll Management Course. Who is this course for? Level 5 Accounting and Finance & Payroll Management This Level 5 Accounting and Finance & Payroll Management is for the ones who are interested in banking sector specially account and finance. Anyone who wants to advance their professional life. Requirements Level 5 Accounting and Finance & Payroll Management To enrol in this Level 5 Accounting and Finance & Payroll Management Course, students must fulfil the following requirements: Good Command over English language is mandatory to enrol in our Level 5 Accounting and Finance & Payroll Management Course. Be energetic and self-motivated to complete our Level 5 Accounting and Finance & Payroll Management Course. Basic computer Skill is required to complete our Level 5 Accounting and Finance & Payroll Management Course. If you want to enrol in our Level 5 Accounting and Finance Course, you must be at least 15 years old. Career path Level 5 Accounting and Finance & Payroll Management After completing this Level 5 Accounting and Finance & Payroll Management course, you may be able to pursue a variety of promising career opportunities, such as: Account manager Finance manager Administrative specialist and many more.

Level 5 Accounting and Finance & Payroll Management
Delivered Online On Demand10 hours 42 minutes
£12

JSEC - Junos Security

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The primary audiences for this course are the following: • Operators of Juniper Networks security solutions, including network engineers, administrators, support personnel, and resellers. Overview After successfully completing this course, you should be able to: Identify security challenges in today's networks. Identify products that are incorporated into the Juniper Connected Security solution. Explain the value of implementing security solutions. Explain how Juniper Connected Security solves the cyber security challenges of the future. Explain SRX Series session management. Explain Junos ALG functions and when to use them. Describe policy logging on the SRX series device. Explain security policy scheduling. Describe application security theory. Explain application signature usage in AppID. Describe the AppTrack service. Describe the AppFW service. Describe the AppQoS service. Configure security policies using the AppSecure suite of services. Explain unified security policies. Describe IPS signatures. Configure an IPS policy using pre-defined templates. Describe how to update the IPS attack object database. Describe IPS rules and rule bases. Configure custom attack objects. Describe Junos Space and Security Director. Configure policy management using Security Director. Describe Security Director objects. Explain the different licensing options for Sky ATP List Sky ATP's features and benefits. Configure Sky ATP profiles and enroll an SRX Series device. Configure file scanning on Sky ATP. Configure Sky ATP to scan email Configure GeoIP on Sky ATP. Describe the JATP features and benefits List the JATP device options. Explain the JATP architecture. List 3rd party support options for JATP. Explain JATP SmartCore analytics processes. Describe Policy Enforcer configuration options. Describe Policy Enforcer integration with Sky ATP. Configure Policy Enforcer to block lateral malware movement. Explain Juniper Secure Analytics features and benefits. Describe JSA log collection. Describe JSA network flow collection. Describe the JSA Offense Management workspace. Explain the JSA Risk Manager features. Configure JSA to collect network and log collection. Explain the features of JIMS. Describe JIMS integration into the current AD network. Describe the Sky Enterprise service and how it can save resources. Explain the Sky Enterprise monitoring service. Explain the vSRX Series device benefits. Describe use cases for the vSRX. Explain the cSRX Series device benefits. Describe use cases for the cSRX. Describe SSL Proxy Concepts. Explain Forward and Reverse Proxy and the limitations of each. Configure both Forward and Reverse Proxy. This five-day course uses the Junos J-Web, CLI, Junos Space, and other user interfaces to introduce students to the concept of Juniper Connected Security. Chapter 1: Course Introduction Course Introduction Chapter 2: CLI Overview User Interface Options Command-Line Interface Initial Configuration Interface Configuration Lab 1: CLI Overview Chapter 3: Advanced Security Policy Session Management Junos ALGs Policy Scheduling Policy Logging Lab 2: Advanced Security Policy Chapter 4: Application Security Theory Application ID Application Signatures App Track App Firewall App QoS App QoE Chapter 5: Application Security Implementation AppTrack Implementation AppFW Implementation AppQos Implementation APBR Implementation Lab 3: Application Security Chapter 6: Intrusion Detection and Prevention IPS Overview IPS Policy Attack Objects IPS Configuration IPS Monitoring Lab 4: Implementing IPS Chapter 7: Security Director Overview Security Director Objects Security Director Policy Management Lab 5: Security Director Chapter 8: Sky ATP Implementation Architecture and Key Components Features and Benefits Configuration Compromised Hosts Command and Control File Scanning E-mail Scanning Geo IP Security Policy Integration Troubleshooting Lab 6: Sky ATP Implementation Chapter 9: Policy Enforcer Policy Enforcer Concepts Configuration Options Policy Enforcer Installation Lab 7: Policy Enforcer Chapter 10: JATP Overview Traffic Inspection Threat Detection Threat Analysis JATP Architecture Chapter 11: JATP Implementation Data Collectors Configure SmartCore Analytics Engine Log Ingestion Incident Management SRX Threat Prevention 3rd Party support for Threat Prevention Reporting Lab 8: JATP Chapter 12: Juniper Secure Analytics (JSA) JSA Overview Data Collection Log Analytics Threat Analytics Vulnerability Management Risk Management Lab 9: JSA Chapter 13: JIMS JIMS Overview JIMS Integration Lab 10: JIMS Chapter 14: vSRX and cSRX vSRX Overview vSRX Supported Features vSRX Use Cases cSRX Overview Lab 11: vSRX Installation Chapter 15: SSL Proxy SSL Proxy Overview SSL Concepts SSL Proxy Configurations Troubleshooting Lab 12: SSL Proxy Chapter 16: Cluster Concepts Chassis Cluster Concepts Chassis Cluster Operation Chapter 17: Chassis Cluster Implementation Chassis Cluster Configuration Chassis Cluster Advanced Options Lab 13: Chassis Cluster Implementation Chapter 18: Chassis Cluster Troubleshooting Chassis Cluster Case Studies Troubleshooting Examples Lab 14: Chassis Cluster Troubleshooting Additional course details: Nexus Humans JSEC - Junos Security training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the JSEC - Junos Security course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

JSEC - Junos Security
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Securing Email with Cisco Email Security Appliance v3.1 (SESA)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Security engineers Security administrators Security architects Operations engineers Network engineers Network administrators Network or security technicians Network managers System designers Cisco integrators and partners Overview After taking this course, you should be able to: Describe and administer the Cisco Email Security Appliance (ESA) Control sender and recipient domains Control spam with Talos SenderBase and anti-spam Use anti-virus and outbreak filters Use mail policies Use content filters Use message filters to enforce email policies Prevent data loss Perform LDAP queries Authenticate Simple Mail Transfer Protocol (SMTP) sessions Authenticate email Encrypt email Use system quarantines and delivery methods Perform centralized management using clusters Test and troubleshoot This course shows you how to deploy and use Cisco© Email Security Appliance to establish protection for your email systems against phishing, business email compromise, and ransomware, and to help streamline email security policy management. This hands-on course provides you with the knowledge and skills to implement, troubleshoot, and administer Cisco Email Security Appliance, including key capabilities such as advanced malware protection, spam blocking, anti-virus protection, outbreak filtering, encryption, quarantines, and data loss prevention. This course helps you prepare to take the exam, Securing Email with Cisco Email Security Appliance (300-720 SESA). Describing the Cisco Email Security Appliance Cisco Email Security Appliance Overview Technology Use Case Cisco Email Security Appliance Data Sheet SMTP Overview Email Pipeline Overview Installation Scenarios Initial Cisco Email Security Appliance Configuration Centralizing Services on a Cisco Administering the Cisco Email Security Appliance Distributing Administrative Tasks System Administration Managing and Monitoring Using the Command Line Interface (CLI) Other Tasks in the GUI Advanced Network Configuration Using Email Security Monitor Tracking Messages Logging Controlling Sender and Recipient Domains Public and Private Listeners Configuring the Gateway to Receive Email Host Access Table Overview Recipient Access Table Overview Configuring Routing and Delivery Features Controlling Spam with Talos SenderBase and Anti-Spam SenderBase Overview Anti-Spam Managing Graymail Protecting Against Malicious or Undesirable URLs File Reputation Filtering and File Analysis Bounce Verification Using Anti-Virus and Outbreak Filters Anti-Virus Scanning Overview Sophos Anti-Virus Filtering McAfee Anti-Virus Filtering Configuring the Appliance to Scan for Viruses Outbreak Filters How the Outbreak Filters Feature Works Managing Outbreak Filters Using Mail Policies Email Security Manager Overview Mail Policies Overview Handling Incoming and Outgoing Messages Differently Matching Users to a Mail Policy Message Splintering Configuring Mail Policies Using Content Filters Content Filters Overview Content Filter Conditions Content Filter Actions Filter Messages Based on Content Text Resources Overview Using and Testing the Content Dictionaries Filter Rules Understanding Text Resources Text Resource Management Using Text Resources Using Message Filters to Enforce Email Policies Message Filters Overview Components of a Message Filter Message Filter Processing Message Filter Rules Message Filter Actions Attachment Scanning Examples of Attachment Scanning Message Filters Using the CLI to Manage Message Filters Message Filter Examples Configuring Scan Behavior Preventing Data Loss Overview of the Data Loss Prevention (DLP) Scanning Process Setting Up Data Loss Prevention Policies for Data Loss Prevention Message Actions Updating the DLP Engine and Content Matching Classifiers Using LDAP Overview of LDAP Working with LDAP Using LDAP Queries Authenticating End-Users of the Spam Quarantine Configuring External LDAP Authentication for Users Testing Servers and Queries Using LDAP for Directory Harvest Attack Prevention Spam Quarantine Alias Consolidation Queries Validating Recipients Using an SMTP Server SMTP Session Authentication Configuring AsyncOS for SMTP Authentication Authenticating SMTP Sessions Using Client Certificates Checking the Validity of a Client Certificate Authenticating User Using LDAP Directory Authenticating SMTP Connection Over Transport Layer Security (TLS) Using a Client Certificate Establishing a TLS Connection from the Appliance Updating a List of Revoked Certificates Email Authentication Email Authentication Overview Configuring DomainKeys and DomainKeys Identified Mail (DKIM) Signing Verifying Incoming Messages Using DKIM Overview of Sender Policy Framework (SPF) and SIDF Veri?cation Domain-based Message Authentication Reporting and Conformance (DMARC) Verification Forged Email Detection Email Encryption Overview of Cisco Email Encryption Encrypting Messages Determining Which Messages to Encrypt Inserting Encryption Headers into Messages Encrypting Communication with Other Message Transfer Agents (MTAs) Working with Certificates Managing Lists of Certificate Authorities Enabling TLS on a Listener?s Host Access Table (HAT) Enabling TLS and Certi?cate Verification on Delivery Secure/Multipurpose Internet Mail Extensions (S/MIME) Security Services Using System Quarantines and Delivery Methods Describing Quarantines Spam Quarantine Setting Up the Centralized Spam Quarantine Using Safelists and Blocklists to Control Email Delivery Based on Sender Configuring Spam Management Features for End Users Managing Messages in the Spam Quarantine Policy, Virus, and Outbreak Quarantines Managing Policy, Virus, and Outbreak Quarantines Working with Messages in Policy, Virus, or Outbreak Quarantines Delivery Methods Centralized Management Using Clusters Overview of Centralized Management Using Clusters Cluster Organization Creating and Joining a Cluster Managing Clusters Cluster Communication Loading a Configuration in Clustered Appliances Best Practices Testing and Troubleshooting Debugging Mail Flow Using Test Messages: Trace Using the Listener to Test the Appliance Troubleshooting the Network Troubleshooting the Listener Troubleshooting Email Delivery Troubleshooting Performance Web Interface Appearance and Rendering Issues Responding to Alerts Troubleshooting Hardware Issues Working with Technical Support References Model Specifications for Large Enterprises Model Specifications for Midsize Enterprises and Small-to-Midsize Enterprises or Branch O?ces Cisco Email Security Appliance Model Specifications for Virtual Appliances

Cisco Securing Email with Cisco Email Security Appliance v3.1 (SESA)
Delivered OnlineFlexible Dates
Price on Enquiry

Psychology Mini Bundle

By Compete High

The Psychology Mini Bundle explores the human mind from multiple angles, with modules in general psychology, brain disorders, and mental health. Designed with an insightful flow, this course bundle also guides learners through the principles of cognitive behavioural therapy (CBT) and effective negotiation—because communication matters just as much as cognition. This bundle is ideal for anyone curious about the intricacies of thought, emotion, and interpersonal influence. Whether you're keen on understanding behavioural patterns or wish to support mental wellness professionally, this bundle helps set the intellectual foundation needed to explore deeper perspectives. Learning Outcomes: Understand core psychological theories and human behaviour patterns. Recognise key symptoms of various brain disorders and dysfunctions. Explore strategies to support positive mental health awareness. Learn essential CBT frameworks for behavioural understanding. Develop negotiation approaches grounded in psychology and empathy. Apply psychological knowledge across diverse communication settings. Who is this Course For: Those interested in human behaviour and emotional patterns. Individuals considering a role in mental wellness sectors. Professionals wanting communication grounded in psychology. Students pursuing further study in psychological sciences. Caregivers looking to understand mental health challenges. Support workers aiming to build informed relationships. Managers needing emotional insight for team interactions. Anyone intrigued by how thoughts shape our actions. Career Path: Mental Health Support Worker – £24,000/year Psychological Wellbeing Practitioner – £27,000/year CBT Assistant – £26,000/year Behavioural Coach – £30,000/year Health and Social Care Assistant – £23,000/year Care Coordinator – £28,000/year

Psychology Mini Bundle
Delivered Online On Demand11 hours
£26.99

Google Cloud Engineer Associate Certification Bootcamp

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Cloud Solutions Architects  DevOps Engineers  Individuals using Google Cloud Platform who deploy applications, monitor operations, and manage enterprise solutions Overview At course completion, you will have attained knowledge of: Fundamentals of Google Cloud Platform (GCP) Google Cloud Storage Google Compute Engine Google Cloud SQL Load Balancing (LB) Google Cloud Monitoring Auto-Scaling Virtual Private Cloud (VPC) Network Cloud Identity and Access Management (IAM) Cloud CDN and DNS Cloud VPN Google Cloud Deployment Manager Google Container Engine Cloud Run Cloud Bigtable Cloud Datastore Cloud BigQuery Cloud DataFlow Cloud DataProc Cloud Pub/Sub In this course you will attain a deep knowledge of Google Cloud Platform infrastructure and design patterns on developing applications on GCP. This course will prepare you for the Google Cloud Architect Associate Certification Exam. Fundamentals of Google Cloud Platform (GCP) Overview Regions and Zones Review of major GCP services Google Cloud Storage Fundamental APIs Consistency Cloud Storage Namespace Buckets and Objects Bucket and Object Naming Guidelines Encryption Object Versioning Object Lifecycle Management Access Control Access Control Lists Signed URL Multipart upload Resumable upload Understanding Pricing for Cloud Storage Offline Media Import/Export Architecture case study of common Use Cases of Google Cloud Storage Hands-on: Cloud Storage Lab; Creating Buckets, objects, and managing access control Google Compute Engine Compute Engine Architecture VM Instances types Persistence Disks Images Generating Custom Images IP Addresses Static IPs Ephemeral Access Control Options IAM Service Account Monitoring Instances with Google Cloud Monitoring Compute Engine Networks and Firewalls Hands-on: Hosting an Application on Compute Engine Google Cloud SQL Core advantages of Cloud SQL Cloud SQL database instance types Access Control High availability options Failover Read replica Backup options On Demand Automated Understanding Pricing of Cloud SQL Load Balancing (LB) Fundamentals of a Load Balancer Network Load balancing HTTPS Load balancing Cross region Load balancing Content Load balancing Target proxies SSL Load Balancing Internal Load Balancing Network Load Balancing Understanding Pricing for Load Balancer Google Cloud Monitoring Architecture of Cloud Monitoring Supported metrics Stackdriver Monitoring APIs Auto-Scaling Overview of Autoscaling Auto-scaling Fundamentals Instance groups Templates Policies Decisions Hands-on: Deploying a scale application on GCP using Autoscaling, Compute Engine, Cloud SQL, Load Balancers. Virtual Private Cloud (VPC) Network Salient features of Virtual Private Cloud (VPC) Network Infrastructure Virtual Private Cloud (VPC) Networking Fundamentals Subnetworks Firewall Internal DNS Network Routes Hands-on: Hosting Secure Applications in Google Cloud VPC Networks Cloud Identity and Access Management (IAM) Introduction User and Service Accounts IAM Roles Policy Hands-on: Managing Users, Policies and Granting Roles using Service Accounts Cloud CDN and DNS What is CDN Google Cloud CDN Cloud CDN Concepts Some of the Cloud CDN Edge locations Cloud DNS Cloud DNS Terminologies Supported Record Types Hands-on: Moving an Existing Domain Name to Cloud DNS Cloud VPN Cloud VPN overview Types of Cloud VPN Specifications Maintenance and Availability Google Cloud Deployment Manager Deployment Manager Deployment Manager Fundamentals Runtime Configurator Quotas Hands-on: Generating and Creating Cloud Deployment Manager Template Google Container Engine Google Container Engine Overview Docker Overview Kubernetes Terminologies Replication Controller Deployment Price and Quotas Hands-on: Deploying WordPress Cluster using Container Engine Cloud Run Overview of Cloud Run Deploy a Prebuilt Sample container Cloud Bigtable Overview of Cloud Bigtable Access Control Performance Locations Cloud Datastore Overview of Cloud Datastore Limits Storage Size Multitenancy Benefits of Multitenancy Encryption Locations Cloud BigQuery BigQuery Overview Interacting with BigQuery Datasets, Tables, and Views Partitioned Tables Query Plan Explanation Hands-on: Getting Started with BigQuery Cloud DataFlow Overview Programming Model DataFlow SDK 1.x for java Cloud Dataflow SDK 2.x Security and Permissions Advanced Access Control Cloud DataProc Overview Clusters Versioning Cloud Pub/Sub Overview of Cloud Pub/Sub Pub/Sub Concepts and Message Flow Data Model Cleanup of All Services Hands-on: Cloud Pub/Sub Lab with Background Cloud Function Additional course details: Nexus Humans Google Cloud Engineer Associate Certification Bootcamp training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Google Cloud Engineer Associate Certification Bootcamp course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Google Cloud Engineer Associate Certification Bootcamp
Delivered OnlineFlexible Dates
Price on Enquiry

Salesforce Integration With External Systems Part 1

By Packt

Accelerate your Salesforce integration expertise and master SOAP, REST, BULK API, and Streaming. Gain hands-on experience with Postman and SOAP UI and set up your environment with Visual Studio Code. Tailored for developers and Salesforce certification aspirants, this course will elevate your skills technically. Enroll now to advance your career!

Salesforce Integration With External Systems Part 1
Delivered Online On Demand10 hours 9 minutes
£44.99

COBIT 2019 Foundation

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The COBIT 2019 Foundation course would suit candidates working in the following IT professions or areas: IT Auditors IT Managers IT Quality professionals IT Leadership IT Developers Process practitioners Managers in IT service providing firms The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs. Overview This COBIT 2019 Foundation course is designed as an introduction to COBIT 2019 and enables you to understand how an integrated business framework for the governance and management of enterprise IT can be utilized to achieve IT business integration, cost reductions and increased productivity. The syllabus areas that this course is designed to cover are: New framework introduction Key concepts and terminology Governance and Framework Principles Governance system and components Governance and management objectives Performance management Designing a tailored governance system COBIT 2019 builds on and integrates more than 25 years of development in this field, not only incorporating new insights from science, but also operationalizing these insights as practice. The heart of the COBIT framework updates COBIT principles while laying out the structure of the overall framework including: New concepts are introduced and terminology is explained?the COBIT Core Model and its 40 governance and management objectives provide the platform for establishing your governance program. The performance management system is updated and allows the flexibility to use maturity measurements as well as capability measurements. Introductions to design factors and focus areas offer additional practical guidance on flexible adoption of COBIT 2019, whether for specific projects or full implementation. From its foundation in the IT audit community, COBIT has developed into a broader and more comprehensive information and technology (I&T) governance and management framework and continues to establish itself as a generally accepted framework for I&T governance. 1 - COBIT 5 OVERVIEW AND INTRODUCTION Course Administration Course Objectives Exam Overview Certification Scheme History of COBIT COBIT 2019 Improvements Major differences with 2019 Misconceptions about COBIT COBIT and Other Standards 2 - KEY CONCEPTS AND TERMINOLOGY Introduction to Enterprise Governance of Information and Technology Benefits of Information and Technology Governance COBIT Information and Technology Governance Framework Distinction of Governance and Management Three Principles of a Governance Framework Six Principles for a Governance System 3 - GOVERNANCE SYSTEMS AND COMPONENTS Introduction to the Components of a Governance System Processes and Capability Levels Organizational Structures and Defined Roles Information Flows and Items People, Skills and Competencies Principles, Policies and Frameworks Culture, Ethics and Behavior Services, Infrastructure and Applications 4 - GOVERNANCE MANAGEMENT OBJECTIVES Governance and Management Objectives Publication Governance and Management Objectives Governance and Management Objectives Core Model Evaluate, Direct and Monitor Align, Plan and Organize Build, Acquire and Implement Deliver, Service and Support Monitor, Evaluate and Assess 5 - GOALS CASCADE Governance and Management Objective Relationships Governance and Management Objective Descriptions High-Level Information Example Introduction to the Goals Cascade Enterprise Goals Alignment Goals Mapping Tables ? Appendix A 6 - PERFORMANCE MANAGEMENT Introduction to Performance Management COBIT Performance Management Principles COBIT Performance Management (CPM) Overview Process Capability Levels Rating Process Activities Focus Area Maturity Levels Performance Management of Organizational Structures Performance Management of Information Items Performance Management of Culture and Behavior 7 - DESIGNING A TAILORED GOVERNANCE SYSTEM The Need for Tailoring Design Factors Enterprise Strategy Enterprise Goals Risk Profile I&T Related Issues Threat Landscape Compliance Requirements Role of IT Sourcing Model for IT IT Implementation Methods Technology Adoption Strategy Enterprise Size Focus Areas Designing a Tailored Governance System Management Objective Priority and Target Capability Levels Component Variations Specific Focus Areas Stages and Steps in the Design Process 8 - IMPLEMENTING ENTERPRISE GOVERNANCE OF IT The Business Case The COBIT Implementation Guide Purpose COBIT Implementation Approach Phase 1 ? What are the Drivers Phase 2 ? Where are we Now Phase 3 ? Where do we Want to be Phase 4 ? What Needs to be Done Phase 5 ? How do we get There Phase 6 ? Did we get There Phase 7 How do we Weep the Momentum Going? EGIT Implementation Program Challenges

COBIT 2019 Foundation
Delivered OnlineFlexible Dates
£1,330

Electrical/Electrician Training Mini Bundle

By Compete High

Plug into the essentials of modern electrical training with this focused course bundle. Designed to build a strong conceptual foundation, this bundle covers everything from basic electrical engineering to the mathematics that wires it all together—plus electrical inspection and regulations you shouldn’t overlook. With focused learning on electrician theory, PAT, and safety fundamentals, you'll gain an insightful understanding of electrical environments and equipment. Whether you're wiring up knowledge for the first time or brushing up on key areas, this course delivers with clarity and purpose—minus the sparks and voltage. Learning Outcomes: Understand fundamental electrical engineering terms and core system theories. Perform essential calculations using applied electrical mathematics. Identify safe operational protocols in electrical environments and systems. Gain clarity on PAT testing principles and inspection procedures. Recognise electrical hazards and safety regulations in daily setups. Explore concepts relevant to circuit functions and current flow basics. Who is this Course For: Beginners interested in learning the electrician trade theory. Those working around electrical environments needing structured knowledge. Individuals preparing for safety or electrical-related learning. People curious about domestic electrical concepts and systems. Learners needing a maths refresher with an electrical focus. Staff looking to understand PAT testing and equipment checking. Anyone seeking structured electrical fundamentals without unnecessary extras. Office or facilities staff responsible for minor electrical monitoring. Career Path: Electrical Technician – £29,000/year PAT Tester – £25,000/year Electrical Surveyor Assistant – £27,500/year Facilities Support Officer – £26,000/year Energy Auditor Assistant – £28,000/year Maintenance Operative (Electrical) – £30,000/year

Electrical/Electrician Training Mini Bundle
Delivered Online On Demand11 hours
£26.99