• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

2899 Development courses in Nottingham delivered Live Online

55315: Introduction to SQL Databases

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for The primary audience for this course is people who are moving into a database role, or whose role has expanded to include database technologies. Developers that deliver content from SQL Server databases will also benefit from this material. Overview After completing this course, you will be able to: Describe key database concepts in the context of SQL Server Describe database languages used in SQL Server Describe data modelling techniques Describe normalization and denormalization techniques Describe relationship types and effects in database design Describe the effects of database design on performance Describe commonly used database objects This course is provided as an introductory class for anyone getting started with databases. It will be useful to programmers and other IT professionals whose job roles are expanding into database management. Students will learn fundamental database concepts through demonstrations and hands-on labs on a SQL Server instance. This material updates and replaces course Microsoft course 10985 which was previously published under the same title. Module 1: Introduction to databases Introduction to Relational Databases Other Databases and Storage Data Analysis SQL Server Database Languages Module 2: Data Modeling Data Modelling Designing a Database Relationship Modeling Module 3: Normalization Fundamentals of Normalization Normal Form Denormalization Module 4: Relationships Introduction to Relationships Planning Referential Integrity Module 5: Performance Indexing Query Performance Concurrency Module 6: Database Objects Tables Views Stored Procedures, Triggers and Functions

55315: Introduction to SQL Databases
Delivered OnlineFlexible Dates
£1,785

Midlife Opportunities Revealed!

By Antonia Varbanova - The Midlife Disruptor

"Midlife Opportunities Revealed!" is an interactive workshop that supports examining one's midlife to uncover hidden potential and open one's mind to hidden options and opportunities.

Midlife Opportunities Revealed!
Delivered OnlineJoin Waitlist
£12.50

Navigating The Modern Workforce - Diversity, Culture, Generations

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Team leaders, managers, executives and other business professionals who lead others will benefit from this course. Overview Learn to lead in a world of diversity Engage and empower our multi-generational workforce Leverage culture as the new strategic differentiator Develop your path to leadership success In this course, students will learn how to capitalize on the strengths of your diverse team while directing and guiding them to even greater achievements. Private classes on this topic are available. We can address your organization?s issues, time constraints, and save you money, too. Contact us to find out how. 1. A Complex World of Diversity Working in Fluid Dynamic Environments Understanding the New Transient Workforce Addressing the Need for a New Type of Leadership Leading with Authenticity Developing Required Skills and Competencies Decentralizing Power 2. Making Difference Your Strategic Advantage Engaging in the 21st Century Measuring Engagement and Taking Advantage of High Engagement Overcoming Challenges to Employee Engagement Embracing Difference and Bridging Boundaries Developing Cultural Intelligence and Responding Effectively to Cultural Differences Applying SCARF to Direct Behavior 3. Leveraging Change as the New Normal Understanding and Applying Emotional Intelligence Motivating Others Key Areas of Interest - Behavioral and Cognitive, Psychodynamic and Humanistic, and Personality Types Developing Your Leadership Psychological Toolkit Identifying Drivers - Desires and Expectations The Impact of an Environment of Trust Meeting the Needs of the Social Brain Promoting Involvement 4. Creating Leaders for the Future Facing the Challenges of a Modern Leader Avoiding Cultural Pitfalls Creating a Common Culture for All Leading Fluid Teams Seeking Diverse Perspectives Soliciting Feedback Utilizing Various Leadership Styles - Storytelling, Adaptive, and Connective Building a Sustainable Vision, Developing a Path, and Creating a Passion for Excellence Additional course details: Nexus Humans Navigating The Modern Workforce - Diversity, Culture, Generations training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Navigating The Modern Workforce - Diversity, Culture, Generations course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Navigating The Modern Workforce - Diversity, Culture, Generations
Delivered OnlineFlexible Dates
£1,500

Working With Children Training - On Set Date

5.0(1)

By Wahid Academy

This Working with ChildrenTraining course does not provide a direct job qualification. However, you must deal with children as a parent, teacher, family member, or other professional. That is why it is critical to understand the Working with Children.

Working With Children Training - On Set Date
Delivered OnlineFlexible Dates
£12

Introduction to Minor Illness

By BBO Training

Course Description:These two days are dedicated to nurses and other allied healthcare professionals (AHPs) who are either new to or revisiting the realm of minor illness assessment and treatment. The course progression is designed to take you from foundational knowledge to more confident and adept management of patients, encompassing both adults and children.Course Details:Day One:- 09:15 AM: Coffee and registration- 09:30 AM: Introduction and course objectives- 09:40 AM: What constitutes a 'Good Consultation?'- 10:00 AM: Fever and Flu Like Illness- 10:45 AM: Coffee break- 11:00 AM: Respiratory Tract Infections (including breath sounds)- 13:00 PM: Lunch break- 14:00 PM: Case Studies- 14:30 PM: Urinary Tract Infections (UTIs)- 14:30 PM: Ears, Nose, and Throat conditions- 15:00 PM: Abdominal Pain- 15:30 PM: Action plan, evaluation, and resources- 15:45 PM: CloseDay Two:- 09:15 AM: Coffee and registration- 09:30 AM: Review of work from day 1 - any feedback/questions?- 09:45 AM: Head, Neck, and Back Pain- 10:30 AM: Eye Infections- 10:45 AM: Coffee break- 11:00 AM: Mental Health (low mood)- 13:00 PM: Lunch break- 13:45 PM: Rashes- 14:30 PM: Minor Injuries- 16:00 PM: Case Studies, Action plan, evaluation, and resources - next steps?- 16:15 PM: CloseLearning Outcomes:- How to conduct an effective consultation.- Enhanced understanding of diagnosing and treating specific minor illnesses.- Expanded knowledge of medicine management, including when and what to prescribe.- Understanding when to initiate tests for better illness management.- Ability to discuss the patient's options and proposed management plan effectively.- Knowing when to refer a patient to another health professional.- Encouraging discussions about relevant practice problems and their solutions.- Appreciating the importance of ongoing professional development.

Introduction to Minor Illness
Delivered OnlineFlexible Dates
£300

Write & Publish Mentoring Programme from The Write Wild Method

By Creative Writing Mentoring & Creativity Coaching for Writers

Working closely together to support you to finish and publish your book. All the support, skills & techniques you need to help you go from initial idea to published book.

Write & Publish Mentoring Programme from The Write Wild Method
Delivered OnlineFlexible Dates
£1,950

Bitesize Masterclass with Sophie Chapman

5.0(1)

By Own Your Success

Own Your Success is delighted to bring you the 'Bitesize Masterclass' with Sophie Chapman. Not everyone has the flexibility to step away from the office for in-person events or dedicate extended periods from their packed schedules for full or half-day sessions. So we've put together our 'Bitesize Masterclasses' to help assistants develop and learn from professionals such as Sophie - shorter sessions, same big impact!   Bitesize Masterclass with Sophie Chapman Sophie Chapman EA to Steven Bartlett  Although Sophie initially aspired to be a talent agent, she swiftly realised that her career passions lay within the administrative/operational aspects of working life. Following her graduation in Entertainment Management from LIPA in 2008, she gained extensive work experience across renowned entities such as Sony BMG and Sky One, operating within the spheres of TV, music, radio, and the events industry. Her pivotal entry into a PA role came while supporting musician Eliza Doolittle. After five years, Sophie opted to move home to Liverpool and accept a contract supporting Sir Dave Brailsford of Team Sky. Once complete, Sophie received an offer for a position based in the US with an A-list musician. However, her journey led her to discover her "forever role", providing support to Steven Bartlett. Steven, the Founder and former Group CEO of Social Chain, is a multifaceted individual—a published author, podcaster, entrepreneur, and presently, the youngest-ever Dragon on BBC's Dragon's Den. Sophie has been instrumental as Steven's Executive Assistant, operating on a global scale, in both private and corporate realms for six years.  Kate Wood Masterclass Facilitator  Kate will aid the facilitation of this Bitesize Masterclass, ensuring that crucial topics are covered while prioritising an environment where every participant feels acknowledged, valued, and heard throughout the session. Kate is a business owner, qualified coach, consultant, facilitator, trainer, podcaster and public speaker with a background in learning & development, employee engagement strategy, continuous improvement, communications and marketing. After 25 years working across the board in blue-chip, non-profit and civil service organisations she now provides support to businesses looking to evolve and become great places for people to work in and with. Having worked with a wide variety of clients from school-age students to senior executives, she has been designing and running workshops, seminars and classes in person or via web events since she left long commutes and corporate roles behind in 2014 when she created her first two businesses. Her passion is improving working relationships between roles and functions and supporting people to discover their best selves at work. She does this in the automotive industry, financial services, medical teams, charities, global media, retail, education systems and the arts. When she’s not working, she and her classic car Monty Morgan can be found zipping around the English countryside. Session topics: How to establish your self-leadership position in your EA capacity Transition from a PA to EA Career development Boundary setting and wellbeing Q&A with the audience - Open-Book Q&A What is a Bitesize Masterclass? Short burst session. Keynote speakers discuss key themes/topics they are passionate about. Q&A with the audience attendees - ask the questions you don't usually get to ask! Run time of 90 minutes (max 2 hours) - we block out two hours in case we overspill on questions. 😊 Virtually delivered - attend from anywhere that's convenient for you! Packed with content, tips and tricks and from industry professionals who can share their experiences with you. Who will attend? PA's EA's Administrative roles --------------------------- At Own Your Success, we strongly believe in fostering an inclusive environment where diversity is celebrated and discrimination of any form is unwelcome. We welcome attendees from all backgrounds, regardless of race, ethnicity, gender identity, sexual orientation, religion, age, ability, or any other characteristic. Discrimination has no place in our workshops, and we are committed to creating a respectful and supportive space for all participants to learn and grow together. ---------------------------

Bitesize Masterclass with Sophie Chapman
Delivered OnlineJoin Waitlist
£45

EC-Council Certified Ethical Hacker (CEH) v12

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The Certified Ethical Hacking v12 course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Overview Information security controls, laws, and standards. Various types of footprinting, footprinting tools, and countermeasures. Network scanning techniques and scanning countermeasures Enumeration techniques and enumeration countermeasures Vulnerability analysis to identify security loopholes in the target organization?s network, communication infrastructure, and end systems. System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities. Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures. Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing. Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures. DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures. Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures. Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures. Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures. SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures. Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools. Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools. Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures. Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools. Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap. Threats to IoT and OT platforms and defending IoT and OT devices. Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools. CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so you will be better positioned to setup your security infrastructure and defend against future attacks. An understanding of system weaknesses and vulnerabilities helps organizations strengthen their system security controls to minimize the risk of an incident. CEH was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to achieve the CEH credential. You will be exposed to an entirely different posture toward the responsibilities and measures required to be secure. Now in its 12th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies. 1 - Introduction to Ethical Hacking Information Security Overview Cyber Kill Chain Concepts Hacking Concepts Ethical Hacking Concepts Information Security Controls Information Security Laws and Standards 2 - 2 - Foot-printing and Reconnaissance Footprinting Concepts Footprinting through Search Engines Footprinting through Web Services Footprinting through Social Networking Sites Website Footprinting Email Footprinting Who is Footprinting DNS Footprinting Network Footprinting Footprinting through Social Engineering Footprinting Tools Footprinting Countermeasures 3 - Scanning Networks Network Scanning Concepts Scanning Tools Host Discovery Port and Service Discovery OS Discovery (Banner Grabbing/OS Fingerprinting) Scanning Beyond IDS and Firewall Draw Network Diagrams 4 - Enumeration Enumeration Concepts NetBIOS Enumeration SNMP Enumeration LDAP Enumeration NTP and NFS Enumeration SMTP and DNS Enumeration Other Enumeration Techniques Enumeration Countermeasures 5 - Vulnerability Analysis Vulnerability Assessment Concepts Vulnerability Classification and Assessment Types Vulnerability Assessment Solutions and Tools Vulnerability Assessment Reports 6 - System Hacking System Hacking Concepts Gaining Access Escalating Privileges Maintaining Access Clearing Logs 7 - Malware Threats Malware Concepts APT Concepts Trojan Concepts Virus and Worm Concepts Fileless Malware Concepts Malware Analysis Countermeasures Anti-Malware Software 8 - Sniffing Sniffing Concepts Sniffing Technique: MAC Attacks Sniffing Technique: DHCP Attacks Sniffing Technique: ARP Poisoning Sniffing Technique: Spoofing Attacks Sniffing Technique: DNS Poisoning Sniffing Tools Countermeasures Sniffing Detection Techniques 9 - Social Engineering Social Engineering Concepts Social Engineering Techniques Insider Threats Impersonation on Social Networking Sites Identity Theft Countermeasures 10 - Denial-of-Service DoS/DDoS Concepts DoS/DDoS Attack Techniques BotnetsDDoS Case Study DoS/DDoS Attack Tools Countermeasures DoS/DDoS Protection Tools 11 - Session Hijacking Session Hijacking Concepts Application Level Session Hijacking Network Level Session Hijacking Session Hijacking Tools Countermeasures 12 - Evading IDS, Firewalls, and Honeypots IDS, IPS, Firewall, and Honeypot Concepts IDS, IPS, Firewall, and Honeypot Solutions Evading IDS Evading Firewalls IDS/Firewall Evading Tools Detecting Honeypots IDS/Firewall Evasion Countermeasures 13 - Hacking Web Servers Web Server Concepts Web Server Attacks Web Server Attack Methodology Web Server Attack Tools Countermeasures Patch Management Web Server Security Tools 14 - Hacking Web Applications Web Application Concepts Web Application Threats Web Application Hacking Methodology Web API, Webhooks, and Web Shell Web Application Security 15 - SQL Injection SQL Injection Concepts Types of SQL Injection SQL Injection Methodology SQL Injection Tools Evasion Techniques Countermeasures 16 - Hacking Wireless Networks Wireless Concepts Wireless Encryption Wireless Threats Wireless Hacking Methodology Wireless Hacking Tools Bluetooth Hacking Countermeasures Wireless Security Tools 17 - Hacking Mobile Platforms Mobile Platform Attack Vectors Hacking Android OS Hacking iOS Mobile Device Management Mobile Security Guidelines and Tools 18 - IoT and OT Hacking IoT Hacking IoT Concepts IoT Attacks IoT Hacking Methodology IoT Hacking Tools Countermeasures OT Hacking OT Concepts OT Attacks OT Hacking Methodology OT Hacking Tools Countermeasures 19 - Cloud Computing Cloud Computing Concepts Container Technology Serverless Computing Cloud Computing Threats Cloud Hacking Cloud Security 20 - Cryptography Cryptography Concepts Encryption Algorithms Cryptography Tools Public Key Infrastructure (PKI) Email Encryption Disk Encryption Cryptanalysis Countermeasures Additional course details: Nexus Humans EC-Council Certified Ethical Hacker (CEH) v.12 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified Ethical Hacker (CEH) v.12 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

EC-Council Certified Ethical Hacker (CEH) v12
Delivered OnlineFlexible Dates
£3,495

Emergency Response and Crisis Management

5.0(10)

By GBA Corporate

Overview Overview The purpose of this course is to enable participants to understand and apply the principles of emergency response planning and crisis management. It considers the need for emergency and crisis response planning and an integrated approach to emergency management. Training typically covers: Crisis management structure and staffing an emergency response team Incident reporting and notification Operational processes Guidance of facility response policies and procedures Annual testing and evaluation of the crisis management plan Upcoming Events Online (USD 1950) Online Streaming Live (Flexible Dates) At Venue (USD 4500) Dubai 13 March - 17 March Istanbul 20 March - 24 March London 20 March - 24 March For more dates and Venue, Please email sales@gbacorporate.co.uk

Emergency Response and Crisis Management
Delivered in Internationally or OnlineFlexible Dates
FREE to £1,489

Communicating Across Your Organization

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Managers, directors, and other professionals responsible for planning and leading projects and programs will benefit from this course. Overview Describe common communication barriers Understand how to use effective interpersonal skills in their spoken and written communications Analyze the pillars of organizational awareness Apply principles of effective facilitation Understand how to adapt their approach to different learning and communication styles Effective communication is how employees and management interact to reach organizational goals. Getting this right results in a happier, more engaged workforce who get more done. Unfortunately, there are often significant barriers ? language, culture, distrust, distance ? to effective communication. The activities and discussions in this workshop will help you identify the essential elements of effective communications within your organization and develop communication strategies that harness both interpersonal and organizational awareness to build trust, strengthen collaboration, and increase productivity. Private classes on this topic are available. We can address your organization?s issues, time constraints, and save you money, too. Contact us to find out how. 1. A History of Organizational Communication A Historical Perspective Classic vs. Human Relations Communications Generational and Technological Change Digital Communication Effectiveness of Communication Channels 2. The Effectiveness of Interpersonal Skills Limitations of Self-Awareness Transactional Analysis Connecting with Powerful Communication Active Listening Non-Verbal Communication Written Communication The Power of Facilitation 3. The Pillars of Organizational Awareness Culture and Behavior Creating Psychological Safety Inclusion and Belonging Sweaty-Palmed Conversations Care and Challenge Each Other 4. The Adaptation of Communication Strategies Factors in Communication Communication Barriers Adapting to Different Learning and Communication Styles Communication Strategies Across Time Position and Posture Additional course details: Nexus Humans Communicating Across Your Organization (Second Edition) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Communicating Across Your Organization (Second Edition) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Communicating Across Your Organization
Delivered OnlineFlexible Dates
£1,500