• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

8277 Courses delivered Online

Excel 2019 Introduction

5.0(1)

By Course Gate

The Professional Presenter Training provides you with the knowledge and skill building in the planning, preparation and delivery of truly engaging presentations. Exploring all aspects of concept, design and delivery, you will gain a range of tools and techniques to help you plan and deliver engaging and effective presentations to a range of audiences. You'll learn how to use specific tools and techniques for presentation creation and delivery which will enable you to conduct powerful presentations that engage your audience every time. This course will give you the framework needed to develop and deliver an effective, memorable presentation. You will learn proven tips and examples that will guide you through the presentation process no matter how large the audience. Who is this course for? Excel 2019 Introduction is suitable for anyone who wants to gain extensive knowledge, potential experience and professional skills in the related field. This course is CPD accredited so you don't have to worry about the quality. Requirements Our Excel 2019 Introduction is open to all from all academic backgrounds and there are no specific requirements to attend this course. It is compatible and accessible from any device including Windows, Mac, Android, iOS, Tablets etc. CPD Certificate from Course Gate At the successful completion of the course, you can obtain your CPD certificate from us. You can order the PDF certificate for £9 and the hard copy for £15. Also, you can order both PDF and hardcopy certificates for £22. Career path This course opens a new door for you to enter the relevant job market and also gives you the opportunity to acquire extensive knowledge along with required skills to become successful. You will be able to add our qualification to your CV/resume which will help you to stand out in the competitive job industry. Course Curriculum Introduction Introduction 00:01:00 Section 01 What is Excel 00:04:00 Opening Excel 00:07:00 Navigating the Excel User Interface 00:10:00 Using the Excel Ribbon 00:07:00 Understanding Excel Worksheet Components 00:07:00 Using the Backstage View 00:09:00 Section 02 Creating a New Workbook 00:06:00 Creating Workbooks Using Templates 00:03:00 Saving an Excel Workbook 00:05:00 Using the Accessibility Checker 00:04:00 Section 03 Navigating a Worksheet by Mouse or Keyboard 00:05:00 Understanding Excel Data Types 00:06:00 Using the Inking Tools 00:06:00 Working with Cell and Range Addressing 00:03:00 Using various Data Selection Techniques 00:03:00 Working with Common Excel Commands 00:05:00 Using the Autofill Handle 00:04:00 Using Flash Fill 00:02:00 Section 04 What are Formulas and Functions 00:04:00 Understanding the Components of a Formula 00:06:00 Understanding Calculation Hierarchy and the Order of Operations 00:03:00 Creating Basic Formulas 00:03:00 Working with Basic Functions and AutoSum 00:06:00 Using Cell References 00:05:00 Using the Quick Analysis Tools 00:03:00 Section 05 Modifying Columns and Rows 00:06:00 Hiding and Unhiding Columns and Rows 00:04:00 Section 06 Formatting and Aligning Data 00:11:00 Merging Data 00:08:00 Wrapping Text and Adjusting Orientation 00:07:00 Formatting Numbers 00:08:00 Using Borders and Shading 00:07:00 Using the Format Painter 00:04:00 Removing Formatting Quickly 00:05:00 Section 07 Using Cell Styles 00:06:00 Applying Themes 00:04:00 Section 08 Inserting and Formatting Images 00:06:00 Inserting and Formatting Shapes 00:06:00 Inserting and Formatting SmartArt 00:09:00 Working with Icons 00:06:00 Working with 3-D Models 00:05:00 Inserting Screenshots 00:05:00 Inserting Hyperlinks 00:05:00 Inserting Symbols and Equations 00:05:00 Inserting WordArt and Text Boxes 00:08:00 Inserting Other Excel Objects 00:06:00 Arranging Objects 00:05:00 Section 09 Using Find and Replace 00:03:00 Using Go To and Go To Special 00:03:00 Using the Spell Checker 00:05:00 Using the Thesaurus and Translation Features 00:05:00 Section 10 Printing and Previewing Excel Files 00:05:00 Creating Custom Margins and Scaling 00:05:00 Adding Headers and Footers 00:05:00 Exporting to PDF and XPS 00:04:00 Section 11 Renaming and Coloring Worksheet Tabs 00:04:00 Adding, Deleting, and Navigating Worksheets 00:05:00 Section 12 Viewing Workbooks 00:05:00 Using Zoom Tools 00:02:00 Configuring Sheet Options 00:04:00 Using the Freeze Panes and Split Commands 00:06:00 Working with Window Commands 00:03:00 Adjusting Workbook Properties 00:06:00 Recap Recap 00:01:00 Certificate and Transcript Order Your Certificates or Transcripts 00:00:00

Excel 2019 Introduction
Delivered Online On Demand5 hours 34 minutes
£11.99

Working in Confined Spaces

5.0(3)

By School Of Health Care

Working in confined spaces is extremely dangerous. Proper precautions and training are required before working long hours in a small, compact area. Every year, many people are seriously injured or killed due to inadequate training, faulty equipment, and negligence. This Working in Confined Spaces course is designed to provide learners with an understanding of the legal requirements outlined in the Confined Space Regulations 1997. It covers the risks associated with confined space entry and working and safe work practices, appropriate control measures, and emergency procedures. Why choose this Working in Confined Spaces course from the School of Health Care? Self-paced course, access available from anywhere in the world. High-quality study materials that are easy to understand. Course developed by industry experts. After each module, there will be an MCQ quiz to assess your learning. Assessment results are generated automatically and instantly. 24/7 support is available via live chat, phone call, or email. Free PDF certificate after completing the course. Learning Objectives After completing this Working in Confined Spaces course, the learner will be able to: Gain a better understanding of the dangers of working within confined spaces. Understand the law regarding working in confined spaces. Know the procedures to assess and address risks. Identify imposed regulatory practices and employer responsibilities. Understand how to take necessary protective measures or conduct emergency procedures. Certificate of Completion You will receive a course completion certificate for free as soon as you complete the Asbestos Awareness Training course. Who is this course for? This Working in Confined Spaces course is ideal for anyone who works in a building or facility that requires the knowledge of working in confined spaces. Those who need this course include: Workers working in tunnels Workers working in sewers Workers working in pits Workers working in tanks Requirements To enroll in this Working in Confined Spaces course, students must fulfill the following requirements: Good Command over English language Be energetic and self-motivated Basic computer Skill You must be at least 15 years old Career path After completing this Working in Confined Spaces course, you will be eligible to work in the following fields: Mining Industry Storage Vessels Engineering Industry Excavation Industry Exploration Industry Mineral extraction Industry Automobile industry

Working in Confined Spaces
Delivered Online On Demand42 minutes
£12

Working in Confined Spaces

5.0(3)

By School Of Health Care

Working in confined spaces is extremely dangerous. Proper precautions and training are required before working long hours in a small, compact area. Every year, many people are seriously injured or killed due to inadequate training, faulty equipment, and negligence. This Working in Confined Spaces course is designed to provide learners with an understanding of the legal requirements outlined in the Confined Space Regulations 1997. It covers the risks associated with confined space entry and working and safe work practices, appropriate control measures, and emergency procedures. Why choose this Working in Confined Spaces course from the School of Health Care? Self-paced course, access available from anywhere in the world. High-quality study materials that are easy to understand. Course developed by industry experts. After each module, there will be an MCQ quiz to assess your learning. Assessment results are generated automatically and instantly. 24/7 support is available via live chat, phone call, or email. Free PDF certificate after completing the course. Learning Objectives After completing this Working in Confined Spaces course, the learner will be able to: Gain a better understanding of the dangers of working within confined spaces. Understand the law regarding working in confined spaces. Know the procedures to assess and address risks. Identify imposed regulatory practices and employer responsibilities. Understand how to take necessary protective measures or conduct emergency procedures. Certificate of Completion You will receive a course completion certificate for free as soon as you complete the Asbestos Awareness Training course. Who is this course for? This Working in Confined Spaces course is ideal for anyone who works in a building or facility that requires the knowledge of working in confined spaces. Those who need this course include: Workers working in tunnels Workers working in sewers Workers working in pits Workers working in tanks Requirements To enroll in this Working in Confined Spaces course, students must fulfill the following requirements: Good Command over English language Be energetic and self-motivated Basic computer Skill You must be at least 15 years old Career path After completing this Working in Confined Spaces course, you will be eligible to work in the following fields: Mining Industry Storage Vessels Engineering Industry Excavation Industry Exploration Industry Mineral extraction Industry Automobile industry

Working in Confined Spaces
Delivered Online On Demand42 minutes
£12

Ethical Hacking Masterclass

By Study Plex

Highlights of the Course Course Type: Online Learning Duration: 28 Hours 44 Minutes Tutor Support: Tutor support is included Customer Support: 24/7 customer support is available Quality Training: The course is designed by an industry expert Recognised Credential: Recognised and Valuable Certification Completion Certificate: Free Course Completion Certificate Included Instalment: 3 Installment Plan on checkout What you will learn from this course? Gain comprehensive knowledge about ethical hacking and network security Understand the core competencies and principles of ethical hacking and network security Explore the various areas of ethical hacking and network security Know how to apply the skills you acquired from this course in a real-life context Become a confident and expert ethical hacker Ethical Hacking Masterclass Course Master the skills you need to propel your career forward in ethical hacking and network security. This course will equip you with the essential knowledge and skillset that will make you a confident ethical hacker and take your career to the next level. This comprehensive ethical hacking masterclass course is designed to help you surpass your professional goals. The skills and knowledge that you will gain through studying this ethical hacking masterclass course will help you get one step closer to your professional aspirations and develop your skills for a rewarding career. This comprehensive course will teach you the theory of effective ethical hacking and network security practice and equip you with the essential skills, confidence and competence to assist you in the ethical hacking and network security industry. You'll gain a solid understanding of the core competencies required to drive a successful career in ethical hacking and network security. This course is designed by industry experts, so you'll gain knowledge and skills based on the latest expertise and best practices. This extensive course is designed for ethical hacker or for people who are aspiring to specialise in ethical hacking and network security. Enrol in this ethical hacking masterclass course today and take the next step towards your personal and professional goals. Earn industry-recognised credentials to demonstrate your new skills and add extra value to your CV that will help you outshine other candidates. Who is this Course for? This comprehensive ethical hacking masterclass course is ideal for anyone wishing to boost their career profile or advance their career in this field by gaining a thorough understanding of the subject. Anyone willing to gain extensive knowledge on this ethical hacking and network security can also take this course. Whether you are a complete beginner or an aspiring professional, this course will provide you with the necessary skills and professional competence, and open your doors to a wide number of professions within your chosen sector. Entry Requirements This ethical hacking masterclass course has no academic prerequisites and is open to students from all academic disciplines. You will, however, need a laptop, desktop, tablet, or smartphone, as well as a reliable internet connection. Assessment This ethical hacking masterclass course assesses learners through multiple-choice questions (MCQs). Upon successful completion of the modules, learners must answer MCQs to complete the assessment procedure. Through the MCQs, it is measured how much a learner could grasp from each section. In the assessment pass mark is 60%. Advance Your Career This ethical hacking masterclass course will provide you with a fresh opportunity to enter the relevant job market and choose your desired career path. Additionally, you will be able to advance your career, increase your level of competition in your chosen field, and highlight these skills on your resume. Recognised Accreditation This course is accredited by continuing professional development (CPD). CPD UK is globally recognised by employers, professional organisations, and academic institutions, thus a certificate from CPD Certification Service creates value towards your professional goal and achievement. The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries. What is CPD? Employers, professional organisations, and academic institutions all recognise CPD, therefore a credential from CPD Certification Service adds value to your professional goals and achievements. Benefits of CPD Improve your employment prospects Boost your job satisfaction Promotes career advancement Enhances your CV Provides you with a competitive edge in the job market Demonstrate your dedication Showcases your professional capabilities What is IPHM? The IPHM is an Accreditation Board that provides Training Providers with international and global accreditation. The Practitioners of Holistic Medicine (IPHM) accreditation is a guarantee of quality and skill. Benefits of IPHM It will help you establish a positive reputation in your chosen field You can join a network and community of successful therapists that are dedicated to providing excellent care to their client You can flaunt this accreditation in your CV It is a worldwide recognised accreditation What is Quality Licence Scheme? This course is endorsed by the Quality Licence Scheme for its high-quality, non-regulated provision and training programmes. The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries. Benefits of Quality License Scheme Certificate is valuable Provides a competitive edge in your career It will make your CV stand out Course Curriculum Introduction Introduction To The Course 00:05:00 VirtualBox Installation 00:16:00 Kali Linux Installation 00:14:00 Enabling Full-Screen 00:18:00 Basic Linux Commands Basic Commands Part 1 00:10:00 Basic Commands Part 2 00:21:00 Basic Commands Part 3 00:13:00 Creating a Secure Hacking Environment Changing IP Address And Wireless Adapter Setup 00:05:00 Creating A Bootable Kali USB Drive 00:05:00 Essential Networking Terms 00:10:00 Essential Hacking Terms 00:18:00 Additional Kali Tools To Install 00:08:00 Changing our MAC Address With Macchanger 00:06:00 Footprinting Google Hacking 00:13:00 Nikto Basics 00:11:00 Whois Tool 00:07:00 Email Harvesting 00:06:00 Shodan 00:10:00 Zone Transfer With Dig 00:07:00 Scanning Installing Metasploitable 00:07:00 Nmap Part 1 00:16:00 Nmap Part 2 00:12:00 Nmap part 3 00:12:00 Zenmap 00:08:00 Nmap Bypassing Defenses 00:17:00 Nmap Bypassing Defenses 00:17:00 Nmap Scripts Part 1 00:09:00 Nmap Scripts Part 2 00:14:00 Website Penetration Testing Installing OWASP 00:08:00 HTTP Request 00:10:00 HTTP Response 00:10:00 Burpsuite Configuration 00:13:00 Editing Packets In Burpsuite 00:12:00 Whatweb And Dirb 00:10:00 Password Recovery Attack 00:16:00 Burpsuite Login Bruteforce 00:11:00 Hydra Login Bruteforce 00:09:00 Session Fixation 00:14:00 Injection Attacks 00:06:00 Simple Command Injection 00:11:00 Exploiting Command Injection Vulnerability 00:08:00 Finding Blind Command Injection 00:14:00 SQL Basics 00:10:00 Manual SQL Injection Part 1 00:13:00 Manual SQL Injection Part 2 00:21:00 SQLmap Basics 00:17:00 XML Injection 00:16:00 Installing XCAT And Preventing Injection Attacks 00:06:00 Reflected XSS 00:11:00 Stored XSS 00:12:00 Changing HTML Code With XSS 00:07:00 XSSer And XSSsniper 00:14:00 Wireless Cracking Wireless Attacking Theory 00:11:00 Enabling Monitor Mode 00:05:00 Capturing Handshake With Airodump 00:15:00 RockYou.txt 00:14:00 Cracking With Aircrack 00:16:00 Cracking With Hashcat 00:15:00 Creating Password Lists With Crunch 00:18:00 Creating Password Lists With Cupp 00:07:00 Rainbow Tables Part 1 00:17:00 Rainbow Tables Part 2 00:06:00 Installing Fluxion 00:06:00 Finding And Cracking Hidden Networks 00:08:00 Preventing Wireless Attacks 00:08:00 Man in the Middle Attacks ARP Protocol Basics 00:10:00 Man In The Middle Attack Theory 00:07:00 Installing MITMf 00:07:00 Manual ARP Spoofing 00:13:00 Problems While Installing MITMf 00:06:00 HTTP Traffic Sniffing 00:08:00 DNS Spoofing And HTTPS Password Sniffing 00:24:00 Hooking Browsers With BEEF 00:16:00 Screenshotting Targets Browser 00:11:00 Cloning Any Webpage 00:09:00 Ettercap Basics 00:07:00 System Hacking with Metasploit MSFconsole Environment 00:16:00 Bruteforcing SSH With Metasploit 00:15:00 Attacking Tomcat With Metasploit 00:09:00 Getting Meterpreter With Command Injection 00:25:00 PHP Code Injection 00:06:00 2 Metasploitable Exploits 00:07:00 Wine Installation 00:12:00 Creating Windows Payloads With Msfvenom 00:10:00 Encoders And Hex Editor 00:19:00 Windows 10 Meterpreter Shell 00:12:00 Meterpreter Environment 00:11:00 Windows 10 Privilege Escalation 00:11:00 Preventing Privilege Escalation 00:06:00 Post Exploitation Modules 00:14:00 Getting Meterpreter Over Internet With Port Forwarding 00:11:00 Eternalblue Exploit 00:20:00 Persistence Module 00:13:00 Hacking Over The Internet With Ngrok 00:10:00 Android Device Attack With Venom 00:10:00 Python Crash Course Variables 00:14:00 Raw Input 00:11:00 If-Else Statements 00:10:00 For Loops 00:06:00 While Loops 00:08:00 Python Lists 00:08:00 Functions 00:15:00 Classes 00:10:00 Importing Libraries 00:07:00 Files In Python 00:12:00 Try And Except Rule 00:05:00 Coding an Advanced Backdoor Theory Behind Reverse Shells 00:07:00 Simple Server Code 00:13:00 Connection With Reverse Shell 00:07:00 Sending And Receiving Messages 00:11:00 Sending Messages With While True Loop 00:08:00 Executing Commands On Target System 00:10:00 Fixing Backdoor Bugs And Adding Functions 00:20:00 First test Using Our Backdoor 00:18:00 Trying To Connect Every 20 Seconds 00:12:00 Creating Persistence Part 1 00:06:00 Creating Persistence Part 2 00:17:00 Changing Directory 00:12:00 Uploading And Downloading Files 00:22:00 Downloading Files From The Internet 00:23:00 Starting Programs Using Our Backdoor 00:07:00 Capturing Screenshot On The Target PC 00:19:00 Embedding Backdoor In An Image Part 1 00:13:00 Embedding Backdoor In An Image Part 2 00:09:00 Checking For Administrator Privileges 00:12:00 Adding Help Option 00:09:00 Creating a Keylogger for the Backdoor Importing Pynput 00:10:00 Simple keylogger 00:10:00 Adding Report Function 00:11:00 Writing Keystrokes To A File 00:14:00 Adding The Keylogger To Our Reverse Shell Part 1 00:23:00 Adding The Keylogger To Our Reverse Shell Part 2 00:08:00 Final Project Test 00:14:00 Basic Authentication Bruteforcer Printing Banner 00:11:00 Adding Available Options 00:11:00 Writing Function To Run The Attack 00:11:00 Bruteforcing Router Login 00:10:00 Bypassing Antivirus With Your Future Programs 00:14:00 Sending Malware With Spoofed Email 00:15:00 Bonus - Building a Career in Cyber Security What Will You Learn In This Section 00:03:00 Why Is Ethical Hacking A Valuable Skill 00:23:00 What Is The Best Ethical Hacking Certification 00:17:00 Tips For Getting Your First Job As An Ethical Hacker 00:18:00 How I Started My Career As An Ethical Hacker 00:14:00 How To Price Your Work 00:11:00 Assessment Assessment - Ethical Hacking Masterclass 00:10:00 Certificate of Achievement Certificate of Achievement 00:00:00 Get Your Insurance Now Get Your Insurance Now 00:00:00 Feedback Feedback 00:00:00

Ethical Hacking Masterclass
Delivered Online On Demand
£19

BA28 - Requirements Analysis and Use Cases

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course has been expressly designed for the Business Analyst, Business System Analyst, System Analyst, and/or Requirements Engineer. The Designer, Developer and Tester who are actively involved in utilizing use cases may also benefit from this workshop. Overview Employ use cases to elicit requirements, at a business, system or subsystem levelEmploy use cases to document the scope of a projectWrite use cases in a clear and unambiguous way.Model use cases with workflow diagramsPlan and divide up the project work based on your use casesManage a use case as it evolves over time and goes through many changes This course provides a strong foundation in the mechanics of use case diagramming and writing textual descriptions of use cases. In this highly interactive workshop, you will learn how to enhance and refine your use case skills, how to involve your stakeholders in the use case process, and how to develop use cases that provide valuable information to the designers and testers. Use cases that meet the needs of designers can be too technical and too detailed for other stakeholders. Use cases that satisfy business users are usually not very helpful to designers and testers. How do you satisfy these two disparate interests? And how do you handle the details like business rules, data validations and user interface specifications? Introduction Course objectives Understanding of business analysis Knowledge areas of BABOK© Guide Overview of Use Cases Describe the purpose and value of a use case approach Use case terminology Introducing a use case approach Needs Assessment Purpose of Needs Assessment Needs Assessment and use cases Defining and understanding the strategic goals and objectives Understanding the business process Identifying actors Identifying business information Analyzing locations and operations Drawing the business use case diagram Building the business architecture Defining solution options Defining System Scope Product scope/project scope System actors versus business actors Analyzing the business process model Analyzing business use cases Identifying candidate use cases Identifying scenarios Diagramming use cases Draw a use case diagram Create a use case catalog Evaluating, Prioritizing, and Packaging Use Cases Iterative nature of this work Evaluating use cases Use case priority Use case risk Use case complexity Use case dependencies Evaluate and Prioritize use cases Dividing work up between releases Packaging A process for how to perform packaging Writing the Main Success Scenario Use case descriptions Primary and secondary goals Assumptions Pre-conditions Triggers Post-conditions Scenario example Main success scenario Conditional execution Use cases and requirements Best practices for writing a use case description Writing the Other Scenarios Scenarios and flows Alternate scenarios and flows Alternate vs. basic flow Guidelines for alternate flows Exception flows Failed post conditions Write alternate and exception flows Process Modeling to Describe Use Case Flows UML© Activity Diagram Notation Sequencing activities Developing an activity diagram Facilitated sessions Draw a UML© Activity Diagram Using Advanced Diagramming Techniques Commonality Dependency Relationships Identify relationships Comparing the different relationships Developing a Requirements Specification Requirements and use cases Detailed requirements Common approaches to specifications Non-functional requirements Write non-functional requirements User interface requirements UI data descriptions Business rules Decision tables and inference rules How to document simple calculations Reporting requirements Data requirements Data accessibility requirements Traceability Course Summary Wrap-up Finding more information Additional course details: Nexus Humans BA28 - Requirements Analysis and Use Cases training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the BA28 - Requirements Analysis and Use Cases course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

BA28 - Requirements Analysis and Use Cases
Delivered OnlineFlexible Dates
Price on Enquiry

Professional Boundaries and Workplace Confidentiality

4.9(27)

By Apex Learning

11-in-1 Premium Bundle | CPD QS Certified | 110 CPD Points | Free Hardcopy + PDF Certificate + Exam | Lifetime Access

Professional Boundaries and Workplace Confidentiality
Delivered Online On Demand3 days
FREE

Adult Care Management: Introductory Course For Care Workers

4.3(43)

By John Academy

Explore the dynamic world of adult care management with our comprehensive introductory course designed for care workers. Gain essential skills in communication, team collaboration, and service development planning. Navigate the complexities of adult care settings, address safeguarding challenges, and promote well-being. Elevate your career in healthcare with our #AdultCareManagement course – where compassionate care meets professional excellence.

Adult Care Management: Introductory Course For Care Workers
Delivered Online On Demand
£24.99

Stock and Bond Investment for Beginners: Build Your Investment Portfolio

4.3(43)

By John Academy

Embark on your financial journey with 'Stock and Bond Investment for Beginners: Build Your Investment Portfolio.' Master the fundamentals of investing, from understanding financial markets to navigating stock and bond markets. Gain insights into risk and portfolio management, explore advanced investment strategies, and discover international perspectives. This comprehensive course empowers you to make informed decisions, build a diversified portfolio, and confidently shape your financial future. Ideal for beginners seeking to unlock the secrets of successful investing. Start your investment journey today!

Stock and Bond Investment for Beginners: Build Your Investment Portfolio
Delivered Online On Demand
£24.99

Team Leader/Supervisor Level 3

By Rachel Hood

Managing teams and projects to meet a private, public or voluntary organisation's goals.

Team Leader/Supervisor Level 3
Delivered OnlineFlexible Dates
Price on Enquiry

Salesforce Design and Build Integration Solutions (ARC101)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This class is designed for experienced administrators and platform developers as well as solution, enterprise, and technical architects responsible for designing or building integration solutions on the Salesforce Platform. It's also designed for project or program managers looking to understand the big picture of integration in order to better manage their projects and programs. Ideally, you hold the Salesforce Administrator, Salesforce App Builder, or Salesforce Platform Developer I credential and/or are knowledgeable about standard and custom objects; how to work with flows and Process Builder; how to navigate Salesforce, Lightning Components, and Schema Builder; and Apex basics such as creating a Class and Anonymous Blocks. This class is recommended for anyone looking to earn their Salesforce Certified Integration Designer credential. Overview When you complete this course, you will be able to: Identify integration requirements by asking relevant integration questions to business stakeholders. Recommend appropriate integration patterns (Remote Process Invocation - Request and Reply, Remote Process Invocation - Fire and Forget, Batch Data Synchronization, Remote Call-In, and UI Update Based on Data Changes, Data Virtualization) to design integration solutions. Recommend appropriate integration capabilities (SOAP, REST, bulk, streaming, Outbound Messaging, Callouts, and Salesforce Connect) to build integration solutions. Explore architectural concepts and the big picture thinking of how to integrate on the Salesforce Platform. In this 3-day class, our Salesforce integration experts will demonstrate how to build solutions that provide a single view of your customers. You?ll learn about integration capabilities and the considerations that should be made when architecting an integration solution. Through a combination of demos, discussions, and hands-on exercises, you?ll design and build secure, scalable, and high-performing integration solutions that seamlessly surface the information that matters most Integration Overview Understand the Importance of Integration Explore Integration Architecture Explore the Meaning of Single View of the Customer Explore the Meaning of System Landscape Understand the Role of Enterprise Service Bus (ESB) and Extract Transform Load (ETL) in System Landscape Integration Capabilities Introduction to Salesforce APIs Create External Applications Using SOAP API Build Mobile Applications Using REST API Work with Large Data Volumes Using BULK API Build Event-Driven Applications Using Streaming API Build Event-Driven Applications Using Platform Events Build Event-Driven Applications Using Change Data Capture Send Data from Salesforce to External Applications Using Outbound Message Call External APIs Programmatically Using Callouts Integrate Data from an External Data Source Using Salesforce Connect Synchronize Data with Heroku Connect Call External APIs Declaratively Using External Services Integration Patterns Understand Use Cases for a Request and Reply Pattern Understand Use Cases for a Fire and Forget Pattern Understand Use Cases for a Batch Data Synchronization Pattern Understand Use Cases for a Remote Call-In Pattern Understand Use Cases for a UI Update Based on Data Changes Pattern Understand Use Cases for a Data Virtualization Pattern Integration Security Explore Two-Way Transport Layer Security (TLS) Understand When to Use Remote Site Settings Understand the Benefits of Using Named Credentials Understand Certificates Encrypt Your Data at Rest Using Salesforce Shield Platform Encryption Advanced Integration Discussions Design Solutions for Performance Design Solutions for Scale Review Integration Regulatory Requirements Review Integration Best Practices Case Study Draw a System Landscape Diagram Evaluate Business Needs Translate Needs to Integration Requirements Design an Integration Solution Build an Integration Solution Maintain an Integration Solution Additional course details: Nexus Humans Salesforce Design and Build Integration Solutions (ARC101) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Salesforce Design and Build Integration Solutions (ARC101) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Salesforce Design and Build Integration Solutions (ARC101)
Delivered OnlineFlexible Dates
Price on Enquiry