• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

3139 Development courses in Belfast delivered Live Online

Memory Book: Create The Life You Love: Thursday 19.00 - 21.00

By Craft4Smiles C.I.C.

Memory Book: Create The Life You Love. Over 3-weeks/sessions, this course will take you, through the construction of this attractive die cut memory book. You will produce a memory book as shown to embellish with your own memories and thoughts, or to give to someone for them to embellish themselves. If you have no previous paper crafting experience, this course will introduce you to some of the basic materials, tools, equipment and techniques used in paper crafting and mixed media work. The course is suitable for experienced crafters too! You will be sent all the materials and equipment needed to complete the course.

Memory Book: Create The Life You Love: Thursday 19.00 - 21.00
Delivered OnlineFlexible Dates
£148 to £165

BA01 - Business Analysis Essentials

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Designed for individuals new to the business analyst role or those who supervise and/or work with business analysts. Overview Understand the role of the business analyst Discuss industry standards/resources for obtaining more information about business analysis Acquire a solid understanding of the various tasks/activities that comprises business analysis Recognize the pre and post project business analysis activities Learn how to plan, elicit, analyze, model, and test requirements This is an introductory course designed to provide students with a basic understanding of the benefits, functions and impact a business analyst has within an organization. The course discusses the business analysis process as it is applied throughout a project as well as the pre-project activities that comprise strategy analysis. Students learn how a business analyst supports the project throughout the solution development life cycle, from defining business needs and solution scope to validating that requirements have been met in the testing phase and ensuring the solution continues to provide value after implementation. Introduction to Business Analysis Business analysis defined The activities that comprise business analysis IIBA/PMI and the goals of a professional association IIBA?s BABOK© Guide and PMI?s Practice Guide in Business Analysis Exercise: Requirements challenges The IIBA? and the role of the Business Analyst Business analyst defined BA role vs. PM role Importance of communication/collaboration The deliverables produced as part of business analysis The BA career path Exercise: Review case Study Strategy Analysis and Change The definition of Strategy Analysis Components of Strategy Analysis Identifying stakeholders and business needs Exercises: Business Need development and RACI Stakeholder Identification Understanding and Defining Solution Scope Defining Solution Scope Project scope vs. product scope Defining a problem statement Techniques for defining scope Exercises: Conduct a brainwriting session and create a context diagram Optional exercise: Create a Use Case Diagram Understanding Requirements Define the term requirement Understand requirement types Present the requirements process Requirements vs. specifications and business rules Exercise: Identify Requirements Planning & Eliciting Requirements The Requirements Work Plan (RWP) Components of the RWP Identifying good questions for elicitation Active listening Categories and types of elicitation techniques Exercise: Planning for elicitation Analzying & Documenting Requirements Understanding requirements analysis The Business Requirements Document (BRD) The BRD vs. the functional requirements specification BRD components The purpose of packaging requirements Exercise: Analyzing Requirements Elicitation & Process Modeling Why models are created Objectives of modeling What is process management Understanding process modeling Modeling using BPMN AS-IS vs. TO-BE modeling BPMN subclasses BPMN simple structure Prototyping Business Process Modeling case study Exercises: Modeling and create a Prototype of your application Verifying & Validating Requirements The difference between validation and verification Characteristics of good requirements Risks associated with requirements Types of testing approaches Creating a test plan Requirements traceability matrix Verified and validated requirements Exercise: Testing Requirements Additional Resources Helpful links for obtaining additional business analysis information Additional course details: Nexus Humans BA01 - Business Analysis Essentials training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the BA01 - Business Analysis Essentials course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

BA01 - Business Analysis Essentials
Delivered OnlineFlexible Dates
Price on Enquiry

Spring Boot Quick Start | Core Spring, Spring AOP, Spring Boot 2.0 and More (TT3322)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This introduction to Spring development course requires that incoming students possess solid Java programming skills and practical hands-on Java experience. This class is geared for experienced Java developers who are new to Spring, who wish to understand how and when to use Spring in Java and JEE applications. Overview Working in a hands-on learning environment, led by our expert practitioner, students will: Explain the issues associated with complex frameworks such as JEE and how Spring addresses those issues Understand the relationships between Spring and JEE, AOP, IOC and JDBC. Write applications that take advantage of the Spring container and the declarative nature of assembling simple components into applications. Understand how to configure the Spring Boot framework Understand and work on integrating persistence into a Spring application Explain Spring's support for transactions and caching Work with Spring Boot to facilitate Spring setup and configuration Apply Aspect Oriented Programming (AOP) to Spring applications Become familiar with the conditionally loading of bean definitions and Application Contexts Understand how to leverage the power of Spring Boot Use Spring Boot to create and work with JPA repositories Introduction to Spring Boot | Spring Boot Quick Start is a hands-on Spring training course geared for experienced Java developers who need to understand what the Spring Boot is in terms of today's systems and architectures, and how to use Spring in conjunction with other technologies and frameworks. This leading-edge course provides added coverage of Spring's Aspect-Oriented Programming and the use of Spring Boot. Students will gain hands-on experience working with Spring, using Maven for project and dependancy management, and, optionally, a test-driven approach (using JUnit) to the labs in the course. The Spring framework is an application framework that provides a lightweight container that supports the creation of simple-to-complex components in a non-invasive fashion. Spring's flexibility and transparency is congruent and supportive of incremental development and testing. The framework's structure supports the layering of functionality such as persistence, transactions, view-oriented frameworks, and enterprise systems and capabilities. This course targets Spring Boot 2 , which includes full support for Java SE 11 and Java EE 8. Spring supports the use of lambda expressions and method references in many of its APIs. The Spring Framework Understand the value of Spring Explore Dependency Injection (DI) and Inversion of Control (IoC) Introduce different ways of configuring collaborators Spring as an Object Factory Initializing the Spring IoC Container Configuring Spring Managed Beans Introduce Java-based configuration The @Configuration and @Bean annotations Define bean dependencies Bootstrapping Java Config Context Injection in Configuration classes Using context Profiles Conditionally loading beans and configurations Bean Life-Cycle Methods Defining Bean dependencies Introduce Spring annotations for defining dependencies Explore the @Autowired annotation Stereotype Annotations Qualifying injection points Lifecycle annotations Using properties in Java based configuration The @Value annotation Using the Candidate Components Index Introduction to Spring Boot Introduce the basics of Spring Boot Explain auto-configuration Introduce the Spring Initializr application Bootstrapping a Spring Boot application Working with Spring Boot Provide an overview of Spring Boot Introduce starter dependencies Introduce auto-configuration @Enable... annotations Conditional configuration Spring Boot Externalized Configuration Bootstrapping Spring Boot Introduction to Aspect Oriented Programming Aspect Oriented Programming Cross Cutting Concerns Spring AOP Spring AOP in a Nutshell @AspectJ support Spring AOP advice types AspectJ pointcut designators Spring Boot Actuator Understand Spring Boot Actuators Work with predefined Actuator endpoints Enabling Actuator endpoints Securing the Actuator Developing in Spring Boot Introduce Spring Boot Devtools Enable the ConditionEvaluationReport Debugging Spring Boot applications Thymeleaf Provide a quick overview of Thymeleaf Introduce Thymeleaf templates Create and run a Spring Thymeleaf MVC application Additional course details: Nexus Humans Spring Boot Quick Start | Core Spring, Spring AOP, Spring Boot 2.0 and More (TT3322) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Spring Boot Quick Start | Core Spring, Spring AOP, Spring Boot 2.0 and More (TT3322) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Spring Boot Quick Start | Core Spring, Spring AOP, Spring Boot 2.0 and More (TT3322)
Delivered OnlineFlexible Dates
Price on Enquiry

Information Assurance (STIG) Overview (TT8800)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The intended audience for this comprehensive course on Information Assurance and STIGs includes professionals with roles such as: IT professionals - System administrators, network engineers, and security analysts who are responsible for maintaining and securing IT infrastructure and web applications. Developers - Software engineers and web developers who design, implement, and maintain web applications, and need to integrate security best practices throughout the development process. Project teams - Cross-functional teams that collaborate on application development projects, including members from development, testing, and deployment teams. Technical leads - Senior software engineers or architects who oversee technical aspects of projects and ensure the implementation of secure design and coding practices. Project managers - Professionals responsible for planning, executing, and closing projects, ensuring that security requirements are met throughout the project lifecycle. Overview Working in an interactive learning environment, guided by our application security expert, you'll explore: The concepts and terminology behind defensive coding Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against meaningful assets The entire spectrum of threats and attacks that take place against software applications in today's world The role that static code reviews and dynamic application testing to uncover vulnerabilities in applications The vulnerabilities of programming languages as well as how to harden installations The basics of Cryptography and Encryption and where they fit in the overall security picture The requirements and best practices for program management as specified in the STIGS The processes and measures associated with the Secure Software Development (SSD) The basics of security testing and planning Understand the concepts and terminology behind defensive coding Understand Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against meaningful assets Learn the entire spectrum of threats and attacks that take place against software applications in today's world Discuss the role that static code reviews and dynamic application testing to uncover vulnerabilities in applications Understand the vulnerabilities of programming language as well as how to harden installations Understand the basics of Cryptography and Encryption and where they fit in the overall security picture Understand the fundamentals of XML Digital Signature and XML Encryption as well as how they are used within the web services arena Understand the requirements and best practices for program management as specified in the STIGS Understand the processes and measures associated with the Secure Software Development (SSD) Understand the basics of security testing and planning The Information Assurance (STIG) Overview is a comprehensive two-day course that delves into the realm of Information Assurance, empowering you to enhance your cybersecurity skills, understand the essentials of STIGs, and discover cutting-edge web application security practices. This immersive experience is tailored for IT professionals, developers, project teams, technical leads, project managers, testing/QA personnel, and other key stakeholders who seek to expand their knowledge and expertise in the evolving cybersecurity landscape. The course focuses on the intricacies of best practices for design, implementation, and deployment, inspired by the diverse and powerful STIGs, ultimately helping participants become more proficient in application security.The first half of the course covers the foundations of DISA's Security Technical Implementation Guides (STIGs) and learn the ethical approach to bug hunting, while exploring the language of cybersecurity and dissecting real-life case studies. Our expert instrtors will guide you through the importance of respecting privacy, working with bug bounty programs, and avoiding common mistakes in the field.The next half delves into the core principles of information security and application protection, as you learn how to identify and mitigate authentication failures, SQL injections, and cryptographic vulnerabilities. You?ll gain experience with STIG walkthroughs and discover the crucial steps for securing web applications.Throughout the course, you'll also explore the fundamentals of application security and development, including checklists, common practices, and secure development lifecycle (SDL) processes. You?ll learn from recent incidents and acquire actionable strategies to strengthen your project teams and IT organizations. You'll also have the opportunity to explore asset analysis and design review methodologies to ensure your organization is prepared to face future cybersecurity challenges. DISA's Security Technical Implementation Guides (STIGs) The motivations behind STIGs Requirements that the various software development roles must meet Implementing STIG requirements and guidelines Why Hunt Bugs? The Language of CyberSecurity The Changing Cybersecurity Landscape AppSec Dissection of SolarWinds The Human Perimeter Interpreting the 2021 Verizon Data Breach Investigation Report First Axiom in Web Application Security Analysis First Axiom in Addressing ALL Security Concerns Lab: Case Study in Failure Safe and Appropriate Bug Hunting/Hacking Working Ethically Respecting Privacy Bug/Defect Notification Bug Bounty Programs Bug Hunting Mistakes to Avoid Principles of Information Security Secuity Is a Lifecycle Issue Minimize Attack Surface Area Layers of Defense: Tenacious D Compartmentalize Consider All Application States Do NOT Trust the Untrusted Identification and Authentication Failures Applicable STIGs Quality and Protection of Authentication Data Proper hashing of passwords Handling Passwords on Server Side Session Management HttpOnly and Security Headers Lab: STIG Walk-Throughs Injection Applicable STIGs Injection Flaws SQL Injection Attacks Evolve Drill Down on Stored Procedures Other Forms of Server-Side Injection Minimizing Injection Flaws Client-side Injection: XSS Persistent, Reflective, and DOM-Based XSS Best Practices for Untrusted Data Lab: STIG Walk-Throughs Applications: What Next? Common Vulnerabilities and Exposures CWE/SANS Top 25 Most Dangerous SW Errors Strength Training: Project Teams/Developers Strength Training: IT Organizations Cryptographic Failures Applicable STIGs Identifying Protection Needs Evolving Privacy Considerations Options for Protecting Data Transport/Message Level Security Weak Cryptographic Processing Keys and Key Management Threats of Quantum Computing Steal Now, Crack Later Threat Lab: STIG Walk-Throughs Application Security and Development Checklists Checklist Overview, Conventions, and Best Practices Leveraging Common AppSec Practices and Control Actionable Application Security Additional Tools for the Toolbox Strength Training: Project Teams/Developers Strength Training: IT Organizations Lab: Recent Incidents SDL Overview Attack Phases: Offensive Actions and Defensive Controls Secure Software Development Processes Shifting Left Actionable Items Moving Forward Lab: Design Study Review Asset Analysis Asset Analysis Process Types of Application-Related Assets Adding Risk Escalators Discovery and Recon Design Review Asset Inventory and Design Assets, Dataflows, and Trust Boundaries Risk Escalators in Designs Risk Mitigation Options

Information Assurance (STIG) Overview (TT8800)
Delivered OnlineFlexible Dates
Price on Enquiry

M.D.D WHAT’S APP SERVICE (STUDENTS)

4.9(27)

By Miss Date Doctor Dating Coach London, Couples Therapy

£49.99 per week 7 days of relationships/dating advice and assistance One 15 min conversation per day on your relationship problem /question and receive replies back from an experienced M.D.D date coach https://relationshipsmdd.com/product/m-d-d-studentswhats-app-service/

M.D.D WHAT’S APP SERVICE (STUDENTS)
Delivered in London or UK Wide or OnlineFlexible Dates
£49.99

Continuous Testing Foundation (DevOps Institute)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The target audience for the DevOps Test Engineering course is anyone involved in defining a DevOps Testing strategy, such as: Delivery Staff DevOps Engineers IT Managers Project Managers Lab Staff Maintenance and Support Staff Quality Assurance Managers Quality Assurance Teams Release Managers Testers Software Engineers Overview The learning objectives for DTE include a practical understanding of: The purpose, benefits, concepts and vocabulary of DevOps testing How DevOps testing differs from other types of testing DevOps testing strategies, test management and results analysis Strategies for selecting test tools and implementing test automation Integration of DevOps testing into Continuous Integration and Continuous Delivery workflows How DevOps testers fit with a DevOps culture, organization and roles This comprehensive course addresses testing in a DevOps environment and covers concepts such as the active use of test automation, testing earlier in the development cycle, and instilling testing skills in developers, quality assurance, security, and operational teams. The course is relevant for every modern IT professional involved in defining or deploying a DevOps testing strategy for their organization, as test engineering is the backbone of DevOps and the primary key for successful DevOps pipeline to support digital transformation. This course prepares you for the Continuous Testing Foundation(CTF) certification. Course Objectives and Modules, Logistics What is DevOps Testing and its Business Benefits?Relation of DevOps Testing in other Test MethodologiesDevOps Testing Best Practices DevOps Testing Terminology Culture changes Organization changes Process and team friction Motivation strategies Measuring Success Continuous Evolution Troubleshooting What is the DevOps pipeline? DevOps Testing on the pipeline Test strategy choices Pre-Flight strategies Continuous Integration Testing System, Delivery and Customer Testing Test Environments Lab Management Topology orchestration Test Automation Frameworks Test Tools Selection criterion Automated metrics Key concepts Test Case Best Practices & Design Exercise Test Suite Best Practices & Design Exercise Principles of DevOps Management DevOps Test Management Metrics DevOps Management Tools DevOps Test Results Analysis Integrating DevOps Results Analysis Test Management Exercise Fictitious Product Test Requirements Individual Exercise Class discussion Exam Preparation

Continuous Testing Foundation (DevOps Institute)
Delivered OnlineFlexible Dates
Price on Enquiry

Thu 18 Sep 2025 - Grants Fundraising: preparing and prospecting

By Hospice Income Generation Network

Training - Grants Fundraising: preparing and prospecting Session aimed at charitable trusts, foundations and grants fundraisers FREE for HIGN members | £25 for non-members THIS SESSION WILL NOT BE RECORDED Capacity capped at 50 sign-ups. We will operate a waiting list if we reach this number, and may ask hospices with more than one sign-up to release places. Grants are the most significant source of income for small charities, but what are the key elements underlying a successful grants income stream? In this session we look at those foundational criteria essential to setting your organisation up for a win and tips how to find the best grants. This session is less appropriate for those with mature grant funding programmes. By the end of this session, we aim for you to: · Gain insight into the overall process of grants funding · Understand what fundraisers need to know before writing applications · See how to cost effectively find funders David describes himself as a “product of small charities”. A service user as a child, volunteer since his teenage years and now is helping to payback through training, mentoring and consultancy projects. He started a ranging career in fundraising in 2006, before maturing into a training and consultancy role with small charities some 12 years later. In early 2022, David joined the FSI and re-built their partnership training programme, carrying it forward in his own style with Triceratops Training after the closure of the previous charity. Most of our associate trainers, like David, were also training or consultancy associates for the FSI, NCVO, Lloyds Bank Foundation or DSC. David currently leads training programmes with Battersea Dogs & Cats Home, several funders, CVS and other sector infrastructure organisations across the UK.

Thu 18 Sep 2025 - Grants Fundraising: preparing and prospecting
Delivered Online
FREE

Learn The Art of Smudging

5.0(13)

By Spiritual Vitality

Learn The Art of Smudging Learn everything you need to know to confidently begin incorporating this powerful Smudging Ceremony into your life today! Smudging is a practice of connecting with the Spirit of specific plants and herbs to help cleanse, uplift, protect, and unite the physical and spiritual planes. Ancient traditions all around the world have incorporated the practice of smudging into their ceremonies. Now is your time to connect with “that which is greater than us”.

Learn The Art of Smudging
Delivered in person or OnlineFlexible Dates
£100

Personalised Care: From Rhetoric to Reality through Lived Experience

5.0(1)

By Born at the Right Time

Inspiring, interactive and unique 4-hour CPD certified Communication and Co-production training.

Personalised Care: From Rhetoric to Reality through Lived Experience
Delivered OnlineFlexible Dates
£200

From Practitioner to Leader

By The Leadership Wizard

From Practitioner to Leader

From Practitioner to Leader
Delivered OnlineFlexible Dates
£50