• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

27561 Development courses delivered Online

Risk Analysis for Professionals

5.0(10)

By GBA Corporate

Overview The Risk Analysis course is a highly demanded certification for roles in project risk management. It recognizes skills, competency, and competency in assessing and identifying project risks, mitigating threats and capitalising on opportunities, while still possessing core knowledge and practical application in all areas of project management. The risk management specialist role on project teams is becoming more important to an organization's success. This course has been designed to benefit professionals who have the responsibility of regularly making important business decisions and wish to enhance their Risk Management abilities and apply them to their businesses. Upcoming Events Online (USD 2250) Online Streaming Live (Flexible Dates) For more dates and Venue, Please email sales@gbacorporate.co.uk

Risk Analysis for Professionals
Delivered in Internationally or OnlineFlexible Dates
FREE

An introduction to soft skills

By ElsatHub

An introduction to soft skills
Delivered Online On Demand1 hour
FREE

Big Data Architecture Workshop

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Senior Executives CIOs and CTOs Business Intelligence Executives Marketing Executives Data & Business Analytics Specialists Innovation Specialists & Entrepreneurs Academics, and other people interested in Big Data Overview More specifically, BDAW addresses advanced big data architecture topics, including, data formats, transformation, real-time, batch and machine learning processing, scalability, fault tolerance, security and privacy, minimizing the risk of an unsound architecture and technology selection. Big Data Architecture Workshop (BDAW) is a learning event that addresses advanced big data architecture topics. BDAW brings together technical contributors into a group setting to design and architect solutions to a challenging business problem. The workshop addresses big data architecture problems in general, and then applies them to the design of a challenging system. Throughout the highly interactive workshop, students apply concepts to real-world examples resulting in detailed synergistic discussions. The workshop is conducive for students to learn techniques for architecting big data systems, not only from Cloudera?s experience but also from the experiences of fellow students. Workshop Application Use Cases Oz Metropolitan Architectural questions Team activity: Analyze Metroz Application Use Cases Application Vertical Slice Definition Minimizing risk of an unsound architecture Selecting a vertical slice Team activity: Identify an initial vertical slice for Metroz Application Processing Real time, near real time processing Batch processing Data access patterns Delivery and processing guarantees Machine Learning pipelines Team activity: identify delivery and processing patterns in Metroz, characterize response time requirements, identify Machine Learning pipelines Application Data Three V?s of Big Data Data Lifecycle Data Formats Transforming Data Team activity: Metroz Data Requirements Scalable Applications Scale up, scale out, scale to X Determining if an application will scale Poll: scalable airport terminal designs Hadoop and Spark Scalability Team activity: Scaling Metroz Fault Tolerant Distributed Systems Principles Transparency Hardware vs. Software redundancy Tolerating disasters Stateless functional fault tolerance Stateful fault tolerance Replication and group consistency Fault tolerance in Spark and Map Reduce Application tolerance for failures Team activity: Identify Metroz component failures and requirements Security and Privacy Principles Privacy Threats Technologies Team activity: identify threats and security mechanisms in Metroz Deployment Cluster sizing and evolution On-premise vs. Cloud Edge computing Team activity: select deployment for Metroz Technology Selection HDFS HBase Kudu Relational Database Management Systems Map Reduce Spark, including streaming, SparkSQL and SparkML Hive Impala Cloudera Search Data Sets and Formats Team activity: technologies relevant to Metroz Software Architecture Architecture artifacts One platform or multiple, lambda architecture Team activity: produce high level architecture, selected technologies, revisit vertical slice Vertical Slice demonstration Additional course details: Nexus Humans Big Data Architecture Workshop training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Big Data Architecture Workshop course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Big Data Architecture Workshop
Delivered OnlineFlexible Dates
Price on Enquiry

VMware Spring Boot: Developer

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Application developers who want to increase their understanding of Spring and Spring Boot and a focus on fundamentals. Overview By the end of the course, you should be able to meet the following objectives: Describe the benefits provided by Spring Boot Initialize a project using Spring Boot Starters Leverage Spring Boot's auto configuration features Create simplified backing-store solutions using Spring Data JPA Build a simple MVC application using Spring Boot, embedded Web Server and fat JARs or classic WARs Build a RESTful Web application Use Spring Security to secure Web and REST endpoints Enable and extend metrics and monitoring capabilities using Spring Boot actuator Leverage advance configuration capabilities Utilize Spring Boot enhancements to testing This course offers experience with Spring Boot and its major features, including auto-configuration, Actuator, Spring Boot testing framework and more. On completion, participants will have a foundation for creating enterprise and cloudready applications. Please note that this course is a subset of the material in our 4-day Spring: Core Training course - there is no need to take both courses. This course is recommended if you have a good working knowledge of Spring Basics (see Prerequisites) but are new to Spring Boot. Introduction to Spring Essentials Why Spring Configuration using Spring Bean creation Data Management Spring Boot Introduction Introduction to Spring Boot Features Value Proposition of Spring Boot Creating a simple Boot application using Spring Initializer website Spring Boot Dependencies, Auto-configuration, and Runtime Dependency management using Spring Boot starters How auto-configuration works Configuration properties Overriding auto-configuration Using CommandLineRunner JPA with Spring and Spring Data Quick introduction to ORM with JPA Benefits of using Spring with JPA JPA configuration in Spring Configuring Spring JPA using Spring Boot Spring Data JPA dynamic repositories Spring MVC Architecture and Overview Introduction to Spring MVC and request processing Controller method signatures Using @Controller, @RestController and @GetMapping annotations Configuring Spring MVC with Spring Boot Spring Boot packaging options, JAR or WAR Rest with Spring MVC An introduction to the REST architectural style Controlling HTTP response codes with @ResponseStatus Implementing REST with Spring MVC, @RequestMapping, @RequestBody and @ResponseBody Spring MVC?s HttpMessageConverters and automatic content negotiation Spring Security What problems does Spring Security solve? Configuring authentication Implementing authorization by intercepting URLs Authorization at the Java method level Understanding the Spring Security filter chain Spring security testing Actuators, Metrics and Health Indicators Exposing Spring Boot Actuator endpoints Custom Metrics Health Indicators Creating custom Health Indicators External monitoring systems Spring Boot Testing Enhancements Spring Boot testing overview Integration testing using @SpringBootTest Web slice testing with MockMvc framework Slices to test different layers of the application

VMware Spring Boot: Developer
Delivered OnlineFlexible Dates
Price on Enquiry

DevSecOps Practitioner (DevOps Institute)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for The target audience for the DevSecOps Practitioner course are professionals including: Anyone focused on implementing or improving DevSecOps practices in their organization Anyone interested in modern IT leadership and organizational change approaches Business Managers Business Stakeholders Change Agents Consultants DevOps Practitioners IT Directors IT Managers IT Team Leaders Product Owners Scrum Masters Software Engineers Site Reliability Engineers System Integrators Tool Providers Overview After completing this course, students will be able to: Comprehend the underlying principles of DevSecOps Distinguish between the technical elements used across DevSecOps practices Demonstrate how practical maturity concepts can be extended across multiple areas. Implement metric-based assessments tied to your organization. Recognize modern architectural concepts including microservice to monolith transitions. Recognize the various languages and tools used to communicate architectural concepts. Contrast the options used to build a DevSecOps infrastructure through Platform as a Service, Server-less construction, and event-driven mediums Prepare hiring practices to recognize and understand the individual knowledge, skills, and abilities required for mature Dev Identify the various technical requirements tied to the DevSecOps pipelines and how those impact people and process choices. Review various approaches to securing data repositories and pipelines. Analyze how monitoring and observability practices contribute to valuable outcomes. Comprehend how to implement monitoring at key points to contribute to actionable analysis. Evaluate how different experimental structures contribute to the 3rd Way. Identify future trends that may affect DevSecOps The DevSecOps Practitioner course is intended as a follow-on to the DevSecOps Foundation course. The course builds on previous understanding to dive into the technical implementation. The course aims to equip participants with the practices, methods, and tools to engage people across the organization involved in reliability through the use of real-life scenarios and case stories. Upon completion of the course, participants will have tangible takeaways to leverage when back in the office such as implementing DevSecOps practices to their organizational structure, building better pipelines in distributed systems, and having a common technological language. This course positions learners to successfully complete the DevSecOps Practitioner certification exam. DevSecOps Advanced Basics Why Advance Practices? General Awareness People-Finding Them Core Process Technology Overview Understanding Applied Metrics Metric Terms Accelerating People-Reporting and Recording Integrating Process Technology Automation Architecting and Planning for DevSecOps Architecture Basics Finding an Architect Reporting and Recording Environments Process Accelerating Decisions Creating a DevSecOps Infrastructure What is Infrastructure? Equipping the Team Design Challenges Monitoring Infrastructure Establishing a Pipeline Pipelines and Workflows Engineers and Capabilities Continuous Engagement Automate and Identify Observing DevSecOps Outcomes Observability vs. Monitoring Who gets which Report? Setting Observation Points Implementing Observability Practical 3rd Way Applications Revisiting 3rd Way Building Experiments Getting the Most from the Experiment The Future of DevOps Looking Towards the Future Staying Trained Innovation What, and from Who? Post-Class Assignments/Exercises Extended advanced reading associated with Case Stories from the course Additional course details: Nexus Humans DevSecOps Practitioner (DevOps Institute) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the DevSecOps Practitioner (DevOps Institute) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

DevSecOps Practitioner (DevOps Institute)
Delivered OnlineFlexible Dates
Price on Enquiry

Employment Law Level 3 Diploma

By EduXpress

Overview Our comprehensive course is designed to provide you with the necessary skills and knowledge to excel in your field. Developed by professionals with years of experience, this course is perfect for anyone looking to kick start their career or advance their skills. It features an audio-visual presentation and easy-to-learn modules, allowing for a self-paced learning experience. Our expert online support team is available during weekdays to assist you throughout the course. Learning Outcomes Upon completion of the course, you will be able to: Understand the fundamentals and its applications. Develop the necessary skills to succeed in the field . Apply your newly acquired knowledge to real-world scenarios. Create effective and efficient solutions for relevant topics. Enhance your employability and career prospects. It is designed to provide you with the knowledge needed to stand out in the competitive job market. With lifetime access to course materials and the ability to learn at your own pace, this course is the perfect opportunity to improve your skills and advance your career. You can learn at your own pace, from the comfort of your home, as all course materials are accessible online at any time. Why Choose Us? Lifetime access to course materials Full tutor support is available Monday through Friday for all courses Learn essentials skills at your own pace from the comfort of your home Gain a thorough understanding of the course Access informative video modules taught by expert instructors 24/7 assistance and advice available through email and live chat Study the course on your computer, tablet, or mobile device Improve your chances of gaining professional skills and earning potential by completing the course. Why should you study this course? The course offers a comprehensive introduction to the subject matter and provides a solid foundation for further study. It will also help students to gain knowledge and skills that can be applied in their professional or personal life. Assessment The course includes a series of quizzes that will test your understanding and retention of the material covered in the course. The quizzes will help you to identify areas where you may need further practice, and you will have the opportunity to review the course materials as needed. Upon successfully passing the final quiz, you will be able to order your certificate of achievement. Career Path The course is designed to equip you with the skills and knowledge you need to succeed in the field. After completing the course, you will be able to pursue a variety of career opportunities in different industries. Course Content Employment Law Basic of Employment Law Legal Recruitment Process Employment Contracts Employee Handbook Disciplinary Procedure National Minimum Wage & National Living Wage Parental Rights, Sick Pay & Pension Scheme Discrimination in the Workplace Health & Safety at Work Dismissal, Grievances and Employment Tribunals

Employment Law Level 3 Diploma
Delivered Online On Demand
£10.49

AS28 IBM BRMS for IBM i

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This is an intermediate course for POWER i administrators, IBM Business Partners, and anyone else who would like practical knowledge of the features and functions supported by BRMS. Overview Describe the major features and functions of BRMS List the steps to install BRMS on a single system or in a BRMS Network environment Implement a previously defined backup and recovery strategy using BRMS Implement a previously defined archival and retrieval plan, including dynamic retrieval, using BRMS Explain how to utilize a tape drive, tape library system, virtual tape, and optical drive with BRMS Implement and use BRMS using the green screen, System i Navigator, and IBM Navigator for i This course covers the features & functions supported by Backup Recovery & Media Services (BRMS). Learn how to perform the supported functions when using a 5250 emulation session, when using System i Navigator, & when using IBM Navigator for i. Overview of BRMS . Installing BRMS . BRMS policies overview . Media devices and encryption using software and hardware . Overview and implementation of virtual tape, DVD, and optical device support . Creating a simple backup control group . BRMS log . Saving IFS data . Working with backup lists . Parallel save, user exits, and save-while-active . Performing a backup and full system backup . Other backup topics i . Storage locations . Containers . Move management . Media class . Media policies . Media topics . BRMS networking . Scheduling BRMS jobs . Daily maintenance . BRMS reports . Recovery . Tape duplication and label print . Functional usage . Archive . Retrievaltion . TSM Client and BRMS on IBM i . BRMS Enterprise . Summary .

AS28 IBM BRMS for IBM i
Delivered OnlineFlexible Dates
Price on Enquiry

xVA - Computing, Metrics & Pricing

5.0(5)

By Finex Learning

Overview This 1 day course focus on comprehensive review of the current state of the art in quantifying and pricing counterparty credit risk. Learn how to calculate each xVA through real-world, practical examples Understand essential metrics such as Expected Exposure (EE), Potential Future Exposure (PFE), and Expected Positive Exposure (EPE) Explore the ISDA Master Agreement, Credit Support Annexes (CSAs), and collateral management. Gain insights into hedging strategies for CVA. Gain a comprehensive understanding of other valuation adjustments such as Funding Valuation Adjustment (FVA), Capital Valuation Adjustment (KVA), and Margin Valuation Adjustment (MVA). Who the course is for Derivatives traders, structurers and salespeople xVA desks Treasury Regulatory capital and reporting Risk managers (market and credit) IT, product control and legal Quantitative researchers Portfolio managers Operations / Collateral management Consultants, software providers and other third parties Course Content To learn more about the day by day course content please request a brochure To learn more about schedule, pricing & delivery options, book a meeting with a course specialist now

xVA - Computing, Metrics & Pricing
Delivered in Internationally or OnlineFlexible Dates
Price on Enquiry

Designing conversations with AI: a guide for UX professionals

5.0(5)

By UX Academy

Artificial Intelligence brings exciting new opportunities to the field of Conversational User Interfaces (CUI). Learn key concepts and proven design methods to deliver cutting-edge experiences and reach better business outcomes. Silvia Podesta is a Designer in the Client Engineering Team at IBM Nordics. She leverages design thinking, service and UX design to help clients identify opportunities for innovation and pioneer transformational experiences through IBM technology.

Designing conversations with AI: a guide for UX professionals
Delivered OnlineFlexible Dates
FREE

Live UI Expert Session

5.0(5)

By UX Academy

About UX Academy: UX Academy provides live online hands-on training to help you take the next step in your career no matter what level you’re at. Offering Beginner, Intermediate UX courses, Product Design, Strategy and Voice Design developed in collaboration with Amazon.

Live UI Expert Session
Delivered OnlineFlexible Dates
FREE