Enhance your skills in seismic interpretation in fold and thrust belts with EnergyEdge's course. Join our classroom training to gain valuable insights.
Learn to effectively integrate and build RESTful API clients into Java and Spring Boot applications using WireMock.
Dive into the world of decarbonization in shipping and marine ports with EnergyEdge's comprehensive course. Gain valuable knowledge and skills today!
Course Overview: Are you ready to embark on a journey into SQL Programming? Unlock the power of data manipulation and database management with the SQL Programming Masterclass. This comprehensive course is meticulously designed throughout this masterclass to provide you with an in-depth understanding of SQL, starting from the basics and progressing to advanced topics. You will explore SQL data types, filtering and sorting data, working with functions, handle NULL values, and even diving into complex SQL concepts like joins, unions, etc. With a course duration of carefully crafted lessons, this Masterclass ensures you grasp SQL's nuances and develop the proficiency to apply these skills effectively.By the end of the SQL Programming Masterclass, you will be prepared to navigate the world of databases confidently. Enrol in this course today and start your journey! Key Features of the Course: CPD certificate upon completion 24/7 learning assistance and support Who is This Course For? This course is perfect for individuals seeking to enhance their data management and analysis skills. Whether you're a data analyst, database administrator, software developer, or professional looking to upskill, this course will empower you to harness the power of SQL programming. Prior programming experience is not mandatory, making it accessible to beginners and intermediate learners. What You Will Learn: Foundations of SQL programming: Learn the basics of SQL, database management systems, and the tools used in this course, such as PostgreSQL and SQLectron. Data manipulation: Master the art of extracting, filtering, and sorting data based on specific requirements using various SQL keywords and operators. Advanced querying techniques: Dive deeper into SQL programming by exploring functions, grouping and aggregating data, and using advanced query techniques. Data conversion and manipulation: Discover how to convert data types, concatenate strings, manipulate characters and numbers, and utilise case statements for more sophisticated queries. Joining tables: Understand the different types of joins and how to combine data from multiple tables using join operations effectively. Data modification: Learn how to insert, update, and delete records in a database, as well as manage table structures and constraints.Joining tables: Understand the different types of joins and how to combine data from multiple tables using join operations effectively. Views and schemas: Explore the concepts of views and schemas, and learn how to create and use them to organise and present data effectively. Why Enrol in This Course: Top-reviewed course: Join thousands of satisfied learners who have praised this course for its clear explanations, comprehensive content, and examples. Recently updated curriculum: Benefit from the most up-to-date information and industry best practices in SQL programming. In-demand skills: SQL programming is a highly sought-after skill in today's job market, opening up numerous career opportunities across industries. Requirements: No prior programming experience is required. All you need is a computer with an internet connection and a willingness to learn. Career Path: Upon completing the SQL Programming Masterclass, you'll have the knowledge and skills for various career paths, including: Data Analyst - Average UK salary: £35,000 per year Database Administrator - Average UK salary: £40,000 per year Business Intelligence Analyst - Average UK salary: £45,000 per year SQL Developer - Average UK salary: £40,000 per year Data Engineer - Average UK salary: £55,000 per year Software Developer - Average UK salary: £45,000 per year Data Scientist - Average UK salary: £60,000 per year Certification: Upon completing the Hygiene and Infection Control CPD Level 4 course, you will receive a CPD certificate. It demonstrates your commitment to maintaining the highest standards of hygiene and infection control. Course Curriculum 17 sections • 117 lectures • 10:47:00 total length •Introduction: 00:01:00 •Tools Used in This Course: 00:01:00 •Download PostgreSQL: 00:02:00 •Install PostgreSQL: 00:03:00 •Download SQLectron: 00:02:00 •Install SQLectron: 00:01:00 •Connect to PostgreSQL - Credentials: 00:01:00 •Connect to PostgreSQL Using SQLectron: 00:02:00 •Import Course Data Using SQLectron: 00:02:00 •FOR WINDOWS 32-BIT USERS: Download, Install, Configure & Import Data: 00:08:00 •Check Imported Data: 00:06:00 •What is a Database?: 00:01:00 •SQL Data Types: 00:02:00 •Finally Some Fun! Extracting Data Based on Requirements: 00:01:00 •Filtering Data using WHERE Keyword: 00:08:00 •Filter Data by Range Using BETWEEN: 00:03:00 •Filter Data by Set of Values Using IN: 00:03:00 •Filter Data by Date: 00:05:00 •More Filtering by Date: 00:03:00 •Another Query Filtering by Date: 00:01:00 •Filter Data by Strings: 00:04:00 •More Filtering by Strings: 00:05:00 •More Filtering by Strings 2: 00:10:00 •More Filtering by Strings 3: 00:02:00 •How to Ignore Caps when Filtering by String: 00:04:00 •AND Operator: 00:10:00 •OR Operator: 00:12:00 •NOT Operator: 00:09:00 •AND, OR & NOT Operators: Which Has the Highest Priority?: 00:06:00 •Basic Math Operations: 00:06:00 •Modulo Operator: 00:04:00 •Calculate The Net Salary for Employees: 00:06:00 •Filter Data with Math Equations: 00:03:00 •Concatenate Strings with '||' Operator: 00:06:00 •Concatenate Strings with Numbers: 00:02:00 •Give Your Report Fields A Cool Name: 00:04:00 •A Report for Payroll: 00:07:00 •Order Records by Column: 00:06:00 •Order Records by Multiple Columns: 00:12:00 •How Alias Names Cannot Be Used with WHERE: 00:02:00 •LIMIT Record Count Fetched by Your Query: 00:08:00 •Fetch A Field's Unique Values Using DISTINCT: 00:03:00 •Using DISTINCT Keyword with Multiple Columns: 00:06:00 •What is a NULL Value Anyway?: 00:05:00 •Build More Sophisticated Queries with CASE Statements: 00:10:00 •Your Knowledge So Far Under A Great Test: 00:09:00 •Let Me Introduce You to Functions: 00:04:00 •SUM Function: 00:04:00 •AVG (Average) Function: 00:04:00 •COUNT Function: 00:07:00 •MIN & MAX Functions: 00:04:00 •How To Count Your Field's Unique Values: 00:04:00 •GROUP BY Clause: Use Functions with Dimensions: 00:06:00 •GROUP BY More Than One Dimension: 00:05:00 •Now For Some Tough Workout: 00:09:00 •Filter By Aggregate Functions with HAVING Clause: 00:08:00 •Character Functions - UPPER, LOWER & INITCAP: 00:08:00 •Character Functions - CONCAT & LENGTH: 00:10:00 •Character Functions - LPAD & RPAD: 00:13:00 •Character Functions - TRIM: 00:04:00 •Character Functions - REPLACE: 00:09:00 •Character Functions - SUBSTR: 00:10:00 •Number Functions - MOD & ROUND: 00:11:00 •Number Functions - TRUNC: 00:07:00 •Selectception: A Select Query inside another Select Query!: 00:06:00 •Auto Data Conversion in SQL: 00:11:00 •Cast Date to Character: 00:10:00 •Cast Number to Character: 00:09:00 •Cast Timestamp to Character: 00:07:00 •Cast Character to Number: 00:08:00 •Cast Character to Date & Timestamp: 00:09:00 •UNION: 00:03:00 •UNION ALL: 00:02:00 •Important Note about Combining Queries: 00:02:00 •INTERSECT: 00:01:00 •EXCEPT: 00:01:00 •Employees & Departments Tables Revised: 00:03:00 •Entity Relationship Diagram (ERD): 00:09:00 •Cartesian Join: 00:09:00 •Table Aliases with Joins: 00:07:00 •Why I Don't Recommend Cartesian Joins: 00:08:00 •Inner Join: 00:06:00 •In-Depth Look into Join Types in SQL: 00:03:00 •Outer Join - Right, Left & Full: 00:08:00 •INSERT a New Record to a Table: 00:09:00 •Insert Without Specifying Column Names: 00:09:00 •UPDATE a Record's Field Values: 00:07:00 •CAUTION! How an UPDATE Query Can Go Wrong: 00:04:00 •Update a Record Using Single-Row Functions: 00:04:00 •A Good Exercise: Extract Employee's Email Address: 00:02:00 •Solution: Extract Employee's Email Address: 00:13:00 •DELETE a Table's Record: 00:06:00 •Insert Records with Nested Select Queries: 00:06:00 •SQL Data Types Revised: 00:13:00 •Bookstore Data Set: Let's Move It to Database: 00:04:00 •Create Your First Table!: 00:08:00 •Insert Data to Your New Table: 00:08:00 •Change Column Data Type: 00:07:00 •Rename Column: 00:04:00 •Add a New Column to Table: 00:04:00 •Constraints in SQL: 00:01:00 •Primary Keys: 00:14:00 •NOT NULL Constraint: 00:05:00 •UNIQUE Constraint: 00:04:00 •DEFAULT Constraint: 00:04:00 •Foreign Keys: 00:08:00 •Use Foreign Keys with Joins - Books & Publishers: 00:06:00 •Foreign Keys - Properties: 00:06:00 •Drop Column: 00:01:00 •DROP Table: 00:01:00 •Create a New Table with Select Statement: 00:05:00 •A Trick to Create an Empty Table with Select Statement: 00:03:00 •Insert New Records Using Select Statement: 00:06:00 •Views: 00:03:00 •Schemas: 00:02:00 •Create & Use Schemas: 00:04:00 •Resources - SQL Programming Masterclass: 00:00:00
About this Training Course In the oil & gas industry, it is common knowledge that operators and main contractors, contract or sub-contract a wide range of their activities. The service contract is the tool used to share the risk of a service between the operator and contractor. It is also an approach adopted by the operator to control the efficiency of his contractor. This course allows all parties involved, company, contractors and subcontractors, to better understand the contractual relationship, their rights and obligations. It gives a detailed review of the contract and its main features. This course will particularly focus on the services contracts that are put in place to support a drilling campaign, covering all specificities of the various contracts. Training Objectives At the end of this course, participants will: Get a thorough understanding of the service contract clauses Be able to administer the contract and optimise the relationship with the company or contractor Target Audience This course will be useful and applicable for the following professionals: contract engineers, contracts administrators, any party involved in the relationship between the company and the contractors of a service contract Drillers and logisticians may also have interest in this course as it covers the contractual aspects of their operational activity: They are the 'Owners' of these services contracts Trainer Your expert course leader has 25 years of experience in management positions in Contracting, Procurement and Logistics, mainly in the Oil & Gas Industry. During his Oil & Gas industry experience, he has worked on major Oil and Gas development projects like the Yadana project in Myanmar, Akpo project in Nigeria and YLNG in Yemen. His international experience allows him to adapt very easily and integrate the multicultural specificities of the Oil & Gas industry in his teaching. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations
Enhance your knowledge in coal power plant life cycle management and flexible operations with EnergyEdge. Learn about decommissioning, preservation, repurposing, and recommissioning.
Whether you're fluent in Python or still mistaking JavaScript for coffee, this bundle has your name scribbled somewhere in code. The 8-in-1 Computer Programming Premium Bundle rolls out a structured and digestible dive into popular languages and core computing essentials. From SQL queries to scripting secure networks, it’s all stacked neatly with zero techy overkill. Mix in a touch of Excel and computer security, and you've got the basics sorted for building a solid career foundation in programming, development, and IT roles—without rewriting your life. 🟨 Learning Outcomes Learn foundational programming skills in Python and Go language. Understand JavaScript functions and browser-side interactions. Use SQL to manage and extract data from databases. Build logic and server-side functionality with PHP. Explore basic concepts of computer and network security. Apply Excel in computing and data interpretation tasks. 🟨 Who is this Course For Beginners interested in learning multiple coding languages Aspiring web developers or software engineers Students keen on expanding programming foundations Data lovers curious about SQL and backend operations Tech enthusiasts with an eye on software development IT support staff wanting programming knowledge Professionals upskilling in coding and automation tools Curious minds ready to code without the jargon headache 🟨 Career Path (UK average salary) Junior Software Developer – £30,000/year Web Developer – £31,500/year Network Engineer – £35,000/year SQL Database Analyst – £32,000/year IT Security Technician – £33,500/year Python Developer (Entry-Level) – £36,000/year
Blue CSCS Card Level 2 NVQ Diploma in Construction Operations and Civil Engineering Services - Roadbuilding This qualification provides you with the opportunity to showcase their knowledge, skills and understanding in their chosen within the Civil Engineering and Highways Sector. You will have the relevant experience at least one of the 14 specific specialisms. You will work in one of the following areas: Pathway 1: Bituminous Paving - Machine Pathway 2: Concrete Paving - Machine Pathway 3: Slurry/Micro Surfacing - Machine Pathway 4: Slurry/Micro Surfacing - Manual Pathway 5: Surface Dressing - Machine Pathway 6: High Friction Surfacing - Machine Pathway 7: High Friction Surfacing - Manual Pathway 8: Planing - Machine Pathway 9: Road Recycling - Machine Pathway 10: Soil Stabilisation - Machine Pathway 11: Surface Retexturing - Machine Pathway 12: Pavement Marking - Machine Pathway 13 Pavement Marking - Manual operations Pathway 14: Pavement Marking - Road Studs Induction - As soon as you register you will be given a dedicated assessor. They will arrange an induction and together with your assessor, you will get to decide on the pathway which best proves your competency. The induction is used to plan out how you will gather the relevant evidence to complete the course. During the course - The assessor will work with you to build a portfolio of evidence that allows you to showcase your knowledge, skills and experience. The assessor will also regularly review and provide you with feedback. This will allow you to keep on track to progress quickly. You will be assessed through various methods such as observations, written questions, evidence generated from the workplace, professional discussion, and witness testimonials. On completion - Once all feedback has been agreed, the Internal Quality Assurer will review your portfolio and in agreement with your assessor the certificate will be applied for. To download our PDF for this course then please click here.
Duration 4 Days 24 CPD hours This course is intended for This course is for experienced cloud security engineers who have taken a previous certification in the security, compliance and identity portfolio. Specifically, students should have advanced experience and knowledge in a wide range of security engineering areas, including identity and access, platform protection, security operations, securing data, and securing applications. They should also have experience with hybrid and cloud implementations. Beginning students should instead take the course SC-900: Microsoft Security, Compliance, and Identity Fundamentals. This is an advanced, expert-level course. Although not required to attend, students are strongly encouraged to have taken and passed another associate level certification in the security, compliance and identity portfolio (such as AZ-500, SC-200 or SC-300) before attending this class. This course prepares students with the expertise to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Governance Risk Compliance (GRC), security operations (SecOps), and data and applications. Students will also learn how to design and architect solutions using zero trust principles and specify security requirements for cloud infrastructure in different service models (SaaS, PaaS, IaaS). Prerequisites Highly recommended to have attended and passed one of the associate level certifications in the security, compliance and identity portfolio (such as AZ-500T00 Microsoft Azure Security Technologies, SC-200T00: Microsoft Security Operations Analyst, or SC-300T00: Microsoft Identity and Access Administrator.) Advanced experience and knowledge in identity and access, platform protection, security operations, securing data and securing applications. Experience with hybrid and cloud implementations. 1 - Introduction to Zero Trust and best practice frameworks Zero Trust initiatives Zero Trust technology pillars part 1 Zero Trust technology pillars part 2 2 - Design solutions that align with the Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF) Define a security strategy Cloud Adoption Framework secure methodology Design security with Azure Landing Zones The Well-Architected Framework security pillar 3 - Design solutions that align with the Microsoft Cybersecurity Reference Architecture (MCRA) and Microsoft cloud security benchmark (MCSB) Design solutions with best practices for capabilities and controls Design solutions with best practices for attack protection 4 - Design a resiliency strategy for common cyberthreats like ransomware Common cyberthreats and attack patterns Support business resiliency Ransomware protection Configurations for secure backup and restore Security updates 5 - Case study: Design solutions that align with security best practices and priorities Case study description Case study answers Conceptual walkthrough Technical walkthrough 6 - Design solutions for regulatory compliance Translate compliance requirements into a security solution Address compliance requirements with Microsoft Purview Address privacy requirements with Microsoft Priva Address security and compliance requirements with Azure policy Evaluate infrastructure compliance with Defender for Cloud 7 - Design solutions for identity and access management Design cloud, hybrid and multicloud access strategies (including Azure AD) Design a solution for external identities Design modern authentication and authorization strategies Align conditional access and Zero Trust Specify requirements to secure Active Directory Domain Services (AD DS) Design a solution to manage secrets, keys, and certificates 8 - Design solutions for securing privileged access The enterprise access model Design identity governance solutions Design a solution to secure tenant administration Design a solution for cloud infrastructure entitlement management (CIEM) Design a solution for privileged access workstations and bastion services 9 - Design solutions for security operations Design security operations capabilities in hybrid and multicloud environments Design centralized logging and auditing Design security information and event management (SIEM) solutions Design solutions for detection and response Design a solution for security orchestration, automation, and response (SOAR) Design security workflows Design threat detection coverage 10 - Case study: Design security operations, identity and compliance capabilities Case study description Case study answers Conceptual walkthrough Technical walkthrough 11 - Design solutions for securing Microsoft 365 Evaluate security posture for collaboration and productivity workloads Design a Microsoft 365 Defender solution Design configurations and operational practices for Microsoft 365 12 - Design solutions for securing applications Design and implement standards to secure application development Evaluate security posture of existing application portfolios Evaluate application threats with threat modeling Design security lifecycle strategy for applications Secure access for workload identities Design a solution for API management and security Design a solution for secure access to applications 13 - Design solutions for securing an organization's data Design a solution for data discovery and classification using Microsoft Purview Design a solution for data protection Design data security for Azure workloads Design security for Azure Storage Design a security solution with Microsoft Defender for SQL and Microsoft Defender for Storage 14 - Case study: Design security solutions for applications and data Case study description Case study answers Conceptual walkthrough Technical walkthrough 15 - Specify requirements for securing SaaS, PaaS, and IaaS services Specify security baselines for SaaS, PaaS, and IaaS services Specify security requirements for web workloads Specify security requirements for containers and container orchestration 16 - Design solutions for security posture management in hybrid and multicloud environments Evaluate security posture by using Microsoft Cloud Security Benchmark Design integrated posture management and workload protection Evaluate security posture by using Microsoft Defender for Cloud Posture evaluation with Microsoft Defender for Cloud secure score Design cloud workload protection with Microsoft Defender for Cloud Integrate hybrid and multicloud environments with Azure Arc Design a solution for external attack surface management 17 - Design solutions for securing server and client endpoints Specify server security requirements Specify requirements for mobile devices and clients Specify internet of things (IoT) and embedded device security requirements Secure operational technology (OT) and industrial control systems (ICS) with Microsoft Defender for IoT Specify security baselines for server and client endpoints Design a solution for secure remote access 18 - Design solutions for network security Design solutions for network segmentation Design solutions for traffic filtering with network security groups Design solutions for network posture management Design solutions for network monitoring 19 - Case study: Design security solutions for infrastructure Case study description Case study answers Conceptual walkthrough Technical walkthrough Additional course details: Nexus Humans SC-100T00 Microsoft Cybersecurity Architect training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SC-100T00 Microsoft Cybersecurity Architect course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Enhance your knowledge with EnergyEdge course on geothermal exploration and development. Join us to gain valuable insights and skills.