• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1670 Environment courses in Dursley delivered Live Online

Online Dental Practice Legionella Responsible Person Course

By The First Principle Group Ltd

Enhance your dental practice's safety and compliance with our 3-hour CPD accredited Dental Practice Legionella Responsible Person Course. Designed for Practice Owners, Registered Managers, and Senior Infection Control Leads, this online course offers expert guidance on legionella management, aligning with HSE ACOP L8, HSG274 Part 2, HTM 04-01, and HTM01-05 standards. Gain advanced understanding and confidence in legionella prevention in dental settings. Receive a GDC-compliant CPD Certificate upon completion. Join our live sessions led by skilled instructors for a transformative learning experience in dental health and safety management.

Online Dental Practice Legionella Responsible Person Course
Delivered OnlineFlexible Dates
£99 to £270

3ds Max Basic to Intermediate Training

By London Design Training Courses

Why Choose 3ds Max Basic to Intermediate Training Course? Course info Looking to take your 3D modelling and animation skills to the next level then Our Intermediate 3DS Max course is designed to help you do just that! A bespoke course ideal for anyone who has a solid understanding of modelling in the 3D environment for films & games. Duration: 20 hrs Method: 1-on-1, Personalized attention. Schedule: Tailor your own schedule and hours of your choice, available from Mon to Sat between 9 am and 7 pm. Why Opt for Our 3ds Max Basic to Intermediate Course? Elevate your 3D modeling and animation skills with our tailored Intermediate 3DS Max course, perfect for those proficient in 3D modeling for films and games. 3ds Max Interface: Familiarize yourself with essential interface areas, tool names, and shortcuts. Master the Scene Explorer for comprehensive scene control. Learn initial software settings for an efficient workflow. Organize your project folder for streamlined work management. Enhance workflow through scene navigation shortcuts and visual styles setup. Understand scene unit configuration for precision. Foundations of 3D Modeling: Acquire industry-standard 3D modeling techniques. Implement compositing modeling with procedural geometry. Utilize non-destructive methods via Modifiers to enhance base geometries. Create 3D models using Splines and modifiers like Extrude, Sweep, and Lathe. Explore Boolean operations for complex shape creation. Delve into Mesh Modeling, enabling manual mesh editing for customized objects. Mesh Modeling: Navigate mesh modeling tools in 3ds Max. Model hard surface objects using mesh modeling and other techniques. Unleash creativity in modeling various objects. Material Creation and Application: Understand material basics and texture application. Create, apply, and resize materials on models. Utilize pictures as references for modeling. Apply multiple materials to one object. Incorporate transparency, reflection, and self-illuminating textures. Utilize images with transparency for intricate texture designs. Camera Control Techniques: Learn camera creation and viewpoint adjustment. Modify camera focal length and lock settings for stability. Adjust camera exposure for desired image brightness. Explore cameras with and without targets, understanding their differences. Lighting: Create realistic lighting using daylight systems. Fine-tune daylight settings based on geographical location. Optimize render settings for high-quality output. Utilize various light types for interior illumination. Master light distribution and apply color filters and textures. Implement HDRI environment images for realistic lighting effects. Animation Essentials: Gain a basic understanding of animation principles. Animate objects manually through keyframing. Create walkthrough animations using cameras and paths. Construct efficient camera rigs for path-based animations. Render animations as video output. Advanced Rendering Techniques: Explore rendering with V-Ray Simulate daylight systems and interior lighting in V-Ray Set up studio lighting configurations in both V-Ray advanced rendering. Course Requirements: A computer with 3ds Max and Vray installed (trial versions available on Autodesk and Chaos Group websites) Basic familiarity with 3D modeling concepts is beneficial but not mandatory Enthusiasm for learning 3ds Max and Vray to create impressive 3D models, visualizations, and animations

3ds Max Basic to Intermediate Training
Delivered in London or OnlineFlexible Dates
£600

Emotional Intelligence and Me (EI & Me)

5.0(3)

By Lapd Solutions Ltd

Emotional Intelligence, EQ, EI, Moccasin Approach, Moccasin Manager,

Emotional Intelligence and Me (EI & Me)
Delivered in Birmingham + 1 more or UK Wide or OnlineFlexible Dates
£1,250 to £1,500

Recovering Troubled Projects: Virtual In-House Training

By IIL Europe Ltd

Recovering Troubled Projects: Virtual In-House Training Despite our best intentions, many of the projects that organizations undertake either don't achieve their intended business results or end in complete failure. Most seasoned project managers have had their share of experiences with difficult or troubled projects and unless they are careful, they will encounter more. This workshop does not focus on 'failed' projects but rather on those projects which without appropriate intervention would be headed for failure. Failed projects are those beyond help and which should be terminated. Here we focus on projects that are salvageable. It is an exercise-driven, no-nonsense, professional practice-focused workshop positioning the participant to immediately apply the tools and lessons learned in the classroom. The workshop employs the use of both illustrative and practical/working case studies. Illustrative case studies will examine insights from real-world troubled projects. Participants will be asked to bring descriptions of their own examples of troubled projects on which they're currently working or on which they have worked in the past. A number of these will be used as the basis for the practical/working case studies. The approach builds on and complements the disciplines addressed in Project Management Institute's PMBOK® Guide and also addresses issues that arise when managing projects in a complex environment. What You Will Learn You will learn to: Recognize the value of a structured project recovery process Explain the reasons most projects fail Analyze the causes of a project's troubles Construct a negotiation process to use with key stakeholders Apply an effective strategy to planning the recovery effort Manage, evaluate, and adjust the ongoing recovery effort Foundation Concepts Recognizing a troubled project Defining the project recovery process The Reasons Projects Fail Putting failure in perspective Reviewing management issues Analyzing planning issues Exploring complexity issues Assess the Project Stabilizing the project Determining preliminary Go / No-Go Conducting a detailed recovery assessment Negotiate the Recovery Reviewing the basics of negotiation Setting reasonable expectations Obtaining appropriate PM authority Securing key stakeholder support Plan the Recovery Planning for recoveries Rebuilding the project team Reshaping the project plan Managing parallel activities Planning for change management Implement and Adjust the Project Implementing project recoveries Facilitating change Enabling continuous learning Fostering the project team Sustaining stakeholder engagement

Recovering Troubled Projects: Virtual In-House Training
Delivered OnlineFlexible Dates
£850

EC-Council Certified Ethical Hacker (CEH) v12

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The Certified Ethical Hacking v12 course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Overview Information security controls, laws, and standards. Various types of footprinting, footprinting tools, and countermeasures. Network scanning techniques and scanning countermeasures Enumeration techniques and enumeration countermeasures Vulnerability analysis to identify security loopholes in the target organization?s network, communication infrastructure, and end systems. System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities. Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures. Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing. Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures. DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures. Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures. Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures. Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures. SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures. Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools. Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools. Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures. Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools. Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap. Threats to IoT and OT platforms and defending IoT and OT devices. Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools. CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so you will be better positioned to setup your security infrastructure and defend against future attacks. An understanding of system weaknesses and vulnerabilities helps organizations strengthen their system security controls to minimize the risk of an incident. CEH was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to achieve the CEH credential. You will be exposed to an entirely different posture toward the responsibilities and measures required to be secure. Now in its 12th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies. 1 - Introduction to Ethical Hacking Information Security Overview Cyber Kill Chain Concepts Hacking Concepts Ethical Hacking Concepts Information Security Controls Information Security Laws and Standards 2 - 2 - Foot-printing and Reconnaissance Footprinting Concepts Footprinting through Search Engines Footprinting through Web Services Footprinting through Social Networking Sites Website Footprinting Email Footprinting Who is Footprinting DNS Footprinting Network Footprinting Footprinting through Social Engineering Footprinting Tools Footprinting Countermeasures 3 - Scanning Networks Network Scanning Concepts Scanning Tools Host Discovery Port and Service Discovery OS Discovery (Banner Grabbing/OS Fingerprinting) Scanning Beyond IDS and Firewall Draw Network Diagrams 4 - Enumeration Enumeration Concepts NetBIOS Enumeration SNMP Enumeration LDAP Enumeration NTP and NFS Enumeration SMTP and DNS Enumeration Other Enumeration Techniques Enumeration Countermeasures 5 - Vulnerability Analysis Vulnerability Assessment Concepts Vulnerability Classification and Assessment Types Vulnerability Assessment Solutions and Tools Vulnerability Assessment Reports 6 - System Hacking System Hacking Concepts Gaining Access Escalating Privileges Maintaining Access Clearing Logs 7 - Malware Threats Malware Concepts APT Concepts Trojan Concepts Virus and Worm Concepts Fileless Malware Concepts Malware Analysis Countermeasures Anti-Malware Software 8 - Sniffing Sniffing Concepts Sniffing Technique: MAC Attacks Sniffing Technique: DHCP Attacks Sniffing Technique: ARP Poisoning Sniffing Technique: Spoofing Attacks Sniffing Technique: DNS Poisoning Sniffing Tools Countermeasures Sniffing Detection Techniques 9 - Social Engineering Social Engineering Concepts Social Engineering Techniques Insider Threats Impersonation on Social Networking Sites Identity Theft Countermeasures 10 - Denial-of-Service DoS/DDoS Concepts DoS/DDoS Attack Techniques BotnetsDDoS Case Study DoS/DDoS Attack Tools Countermeasures DoS/DDoS Protection Tools 11 - Session Hijacking Session Hijacking Concepts Application Level Session Hijacking Network Level Session Hijacking Session Hijacking Tools Countermeasures 12 - Evading IDS, Firewalls, and Honeypots IDS, IPS, Firewall, and Honeypot Concepts IDS, IPS, Firewall, and Honeypot Solutions Evading IDS Evading Firewalls IDS/Firewall Evading Tools Detecting Honeypots IDS/Firewall Evasion Countermeasures 13 - Hacking Web Servers Web Server Concepts Web Server Attacks Web Server Attack Methodology Web Server Attack Tools Countermeasures Patch Management Web Server Security Tools 14 - Hacking Web Applications Web Application Concepts Web Application Threats Web Application Hacking Methodology Web API, Webhooks, and Web Shell Web Application Security 15 - SQL Injection SQL Injection Concepts Types of SQL Injection SQL Injection Methodology SQL Injection Tools Evasion Techniques Countermeasures 16 - Hacking Wireless Networks Wireless Concepts Wireless Encryption Wireless Threats Wireless Hacking Methodology Wireless Hacking Tools Bluetooth Hacking Countermeasures Wireless Security Tools 17 - Hacking Mobile Platforms Mobile Platform Attack Vectors Hacking Android OS Hacking iOS Mobile Device Management Mobile Security Guidelines and Tools 18 - IoT and OT Hacking IoT Hacking IoT Concepts IoT Attacks IoT Hacking Methodology IoT Hacking Tools Countermeasures OT Hacking OT Concepts OT Attacks OT Hacking Methodology OT Hacking Tools Countermeasures 19 - Cloud Computing Cloud Computing Concepts Container Technology Serverless Computing Cloud Computing Threats Cloud Hacking Cloud Security 20 - Cryptography Cryptography Concepts Encryption Algorithms Cryptography Tools Public Key Infrastructure (PKI) Email Encryption Disk Encryption Cryptanalysis Countermeasures Additional course details: Nexus Humans EC-Council Certified Ethical Hacker (CEH) v.12 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified Ethical Hacker (CEH) v.12 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

EC-Council Certified Ethical Hacker (CEH) v12
Delivered OnlineFlexible Dates
£3,495

DP-900T00 Microsoft Azure Data Fundamentals

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for The audience for this course is individuals who want to learn the fundamentals of database concepts in a cloud environment, get basic skilling in cloud data services, and build their foundational knowledge of cloud data services within Microsoft Azure. Overview Describe core data concepts Identify considerations for relational data on Azure Describe considerations for working with non-relational data on Azure Describe an analytics workload on Azure In this course, students will gain foundational knowledge of core data concepts and related Microsoft Azure data services. Students will learn about core data concepts such as relational, non-relational, big data, and analytics, and build their foundational knowledge of cloud data services within Microsoft Azure. Students will explore fundamental relational data concepts and relational database services in Azure. They will explore Azure storage for non-relational data and the fundamentals of Azure Cosmos DB. Students will learn about large-scale data warehousing, real-time analytics, and data visualization. 1 - Explore core data concepts Identify data formats Explore file storage Explore databases Explore transactional data processing Explore analytical data processing 2 - Explore data roles and services Explore job roles in the world of data Identify data services 3 - Explore fundamental relational data concepts Understand relational data Understand normalization Explore SQL Describe database objects 4 - Explore relational database services in Azure Describe Azure SQL services and capabilities Describe Azure services for open-source databases 5 - Explore Azure Storage for non-relational data Explore Azure blob storage Explore Azure DataLake Storage Gen2 Explore Azure Files Explore Azure Tables 6 - Explore fundamentals of Azure Cosmos DB Describe Azure Cosmos DB Identify Azure Cosmos DB APIs 7 - Explore fundamentals of large-scale data warehousing Describe data warehousing architecture Explore data ingestion pipelines Explore analytical data stores 8 - Explore fundamentals of real-time analytics Understand batch and stream processing Explore common elements of stream processing architecture Explore Azure Stream Analytics Explore Apache Spark on Microsoft Azure 9 - Explore fundamentals of data visualization Describe Power BI tools and workflow Describe core concepts of data modeling Describe considerations for data visualization

DP-900T00 Microsoft Azure Data Fundamentals
Delivered OnlineFlexible Dates
£595

Introduction to Design Thinking: Virtual In-House Training

By IIL Europe Ltd

Introduction to Design Thinking: Virtual In-House Training Innovation is the cornerstone of highly successful companies, especially those that continue to be successful over the years and decades. Design thinking practices fuel this continual innovation, as they are the critical links from inspiration to delivery, concept to showroom floor, and start-up to global business. Design thinking is a structured approach to promoting innovation and creative problem-solving. It is not a new approach. It has been around for centuries, as the art, architecture, and inventions of mankind illustrate. By examining the steps to achieving great design and maximum utility of product, design thinking approaches provide a framework in which to develop new solutions to problems and new products to sell. This highly interactive course is designed to help participants think like designers to generate innovation, and to help teams to produce more innovation and creativity. Since design thinking is based on doing rather than thinking, we participants are challenged to apply the techniques, in the classroom, to create new ideas and solutions to a case study project. What you will Learn At the end of this program, you will be able to: Explain the underlying principles and value of using Design Thinking for innovation Describe the basic concepts of the Stanford Model for Design Thinking Evaluate a set of basic Design Thinking techniques for application to your projects Apply tools, techniques, and skills aligned with the 5 stages of the Stanford Model Drive innovation through Design Thinking at some level in your work environment Foundation Concepts Problems and solutions The Design Thinking difference Design Thinking skills and abilities Design Thinking mindset Design Thinking frameworks Stages of Design Thinking Problems and solutions The Design Thinking difference Design Thinking skills and abilities Design Thinking mindset Design Thinking frameworks General Practices Team formation Visualization Improvisation Personalization Empathize Practices Overview of Empathize techniques Observation Engagement Interviews Define Practices Overview of Define practices Unpacking techniques Defining the customer techniques Integrating the Define experience Ideate Practices Overview of Ideate practices Reusable techniques for the Ideate stage New Ideate techniques to explore Prototype & Test Practices Overview of Prototype practices Examples of prototypes Overview of Testing practices Forms of testing techniques Adopt and Adapt Design Thinking Overview of Design Thinking implementation Design Thinking implementation challenges Success in implementing Design Thinking Summary and Next Steps Workshop summary Next steps: Personal Action Plans

Introduction to Design Thinking: Virtual In-House Training
Delivered OnlineFlexible Dates
£850

Microsoft Excel Macros & VBA - Online classroom

By Microsoft Office Training

Course Objectives At the end of this course you will be able to: Record and edit a Macro Assign macros to keyboard shortcuts, Quick Access Toolbar, Buttons and Shape objects. Use the Visual Basic Editor; change the properties of an object; add a module to a project; write the code for a procedure and then run it; and use the Object Browser to search procedures Manipulate data by declaring variables of different data types; combine data by using expressions; use functions to accept input and display output; and declare variables and procedures with the appropriate scope Use decision structures to create procedures that make decisions; and use loop structures to perform repetitive tasks Create an error handling routine in case things go wrong with VBA code ' 1 year email support service Take a closer look at the consistent excellent feedback from our growing corporate clients visiting our site ms-officetraining co uk Customer Feedback Best Training Ever! Just finished a bespoke 1-1 training course in Excel Advanced, Macros & VBA. Pedro is an excellent trainer, imparting his skills and knowledge in the best way - appropriately to audience skills, knowledge and ability. Pedro is always approachable, encouraging and supportive, giving delegates the optimum learning environment. I would not hesitate to recommend Pedro as a trainer, whatever your level of ability. Amanda Morris - Treasury & Systems Accountant at Reall - Real Equity for All The trainer was very knowledgeable, kept everyone involved and was enthusiastic. A great experience.. Simon Harper - Lloyd's of London My learning experience was awesome. Perdinand Reagan - Subsea7 Very nice and relaxed approach to teaching. Was definitely a good learning experience. Jerome Pupe - S5 Agency World The Trainer – Very positive + patient + helpful + thorough Agnes Souza - Direct Wines ' With more than 20 years experience, we deliver courses on all levels of the Desktop version of Microsoft Office and Office 365; ranging from Beginner, Intermediate, Advanced to the VBA level. Our trainers are Microsoft certified professionals with a proven track record with several years experience in delivering classroom, one to one, tailored and bespoke courses. Tailored In Company training: You can choose to run the course exactly as they are outlined by us or we can customise it so that it meets your specific needs. A tailored or bespoke course will follow the standard outline but may be adapted to your specific organisational needs. Introduction to Macros and VBA Introducing Visual Basic for Applications Recording a Macro Naming conventions for Macro Procedures Running a Macro Absolute or Relative Cell Referencing Saving and Opening Files with Macros Making macros always available Adding Macros to Keyboard Shortcuts, Quick Access Toolbar, Buttons and Shapes Editing a Macro in the Visual Basic Editor Understanding the Development Environment Customising the Editor Tips for General Typing in VBA Using Visual Basic Help Working with Procedures Program Design Understanding Modules Naming Rules Creating a Module Understanding Procedures Programming Macro Concepts Creating a Subroutine Creating a Function Understanding Arguments Exiting Procedures Calling Procedures Objects, Properties, Methods and Events Understanding Objects Properties, Methods, and Events Navigating the Object Hierarchy Understanding Collections Accessing a Member of a Collection Understanding Hierarchy Using the Object Browser Using the With Statement Working with Properties Working with Methods Creating an Event Procedure Reserved Macro Names Using Expressions, Variables and Intrinsic Functions Understanding Expressions and Statements Declaring Variables Understanding Data Types Determining the Value of Variables Working with Variable Scope Using Built-in VBA Functions Understanding Constants Using Message Boxes Controlling the Answer to a Message Box Using Input Boxes Declaring and Using Object Variables Controlling Program Execution Understanding Control-of-Flow Structures Using the If...End If Decision Structures Nested If Statements Using the Select Case ... End Select Structure Using the Do ... Loop Structure Using the For ... Next Structure Using the For Each ... Next Structure Guidelines for Use of Control-of-Flow Structures Debugging and Handling Errors Understanding Errors Using Debugging Tools Setting Breakpoints and Using Break Mode Stepping Through Code Trapping Errors with the On Error Statement Understanding the Err Object Working with Inline Error Handling Writing an Error-Handling Routine Working with Forms and Controls Understanding UserForms Creating a Form Displaying and Removing a Form Aligning and Sizing Controls Using the Toolbox Working with a Form's Properties, Methods, and Events Working with Form and Control Properties, Methods and Event Setting the Tab Order Populating a Control Who is this course for? Who is this course for? This course is designed to give proficiency in the Visual Basic Editor (VBE), predominantly making use of Excel objects, understanding Object's Properties, Events and Methods, basic VBA Object oriented programming, event handling, control structures, and debugging tools. Requirements Requirements Preferably, delegates should have attended the Excel Advanced course. Career path Career path Excel know-how can instantly increase your job prospects as well as your salary. 80 percent of job openings require spreadsheet and word-processing software skills Certificates Certificates Certificate of completion Digital certificate - Included

Microsoft Excel Macros & VBA - Online  classroom
Delivered OnlineFlexible Dates
£550

Microsoft Powerpoint Advanced (live online classes)

By Microsoft Office Training

Course Objectives At the end of this course you will be able to: Modify the PowerPoint environment Using Master View in order to customise a design template Add and customize SmartArt graphics Add animations and change its effect options Add action buttons to control the flow of the presentation Use various options to customise slide shows Use different PowerPoint file types to distribute presentations ' 1 year email support service Take a closer look at the consistent excellent feedback from our growing corporate clients visiting our site ms-officetraining co uk Customer Feedback Very clearly explained Good pace. Lucy Tailor - ACER ' With more than 20 years experience, we deliver courses on all levels of the Desktop version of Microsoft Office and Office 365; ranging from Beginner, Intermediate, Advanced to the VBA level. Our trainers are Microsoft certified professionals with a proven track record with several years experience in delivering public, one to one, tailored and bespoke courses. Tailored in company training courses: You can choose to run the course exactly as they are outlined by us or we can customise it so that it meets your specific needs. A tailored or bespoke course will follow the standard outline but may be adapted to your specific organisational needs. Customising the PowerPoint Environment Customise the User Interface Set PowerPoint Options Customising Design Templates Modify Slide Masters and Slide Layouts Add Headers and Footers Modify the Notes Master and the Handout Master Adding SmartArt to a Presentation Create SmartArt Modify SmartArt Working with Media Add Audio to a Presentation Add Video to a Presentation Working with Animations Entrance, Emphasis and Exit Animations Animate Charts by Category and Series Customise Animations and Transitions Collaborating on a Presentation Review a Presentation Store and Share Presentations on the Web Customising a Slide Show Annotate a Presentation Set Up a Slide Show Create a Custom Slide Show Add Hyperlinks Add Action Buttons Record a Presentation Securing and Distributing a Presentation Secure a Presentation Create a Video or a CD Distribute the Presentation in different File Formats Who is this course for? Who is this course for? This course is designed for delegates who want to gain the skills necessary to work with design templates, various types of diagrams, special effects, custom slide shows, collaboration functionality, and advanced presentation delivery. Requirements Requirements Preferably, delegates should have attended the Powerpoint Introduction course. Career path Career path Microsoft Office know-how can instantly increase your job prospects as well as your salary. 80 percent of job openings require spreadsheet and word-processing software skills

Microsoft Powerpoint Advanced (live online classes)
Delivered OnlineFlexible Dates
£225

Microsoft Word Introduction (live online classes)

By Microsoft Office Training

Course Objectives At the end of this course you will be able to: Identify and work with basic Word 2013 tools and features Edit text in a Word document Modify the appearance of text in a Word document Organise data in tables and lists Insert special characters and graphical objects Control the appearance of pages in a Word document Proof a document Customise the Word environment '1 year email support service Take a look at the consistent excellent feedback from our corporate clients visiting our site ms-officetraining co uk Customer Feedback Good pace, questions encoraged, trainer ensured everyone was kept at same level. Jenny Price - ACER ' With more than 20 years experience, we deliver courses on all levels of the Desktop version of Microsoft Office and Office 365; ranging from Beginner, Intermediate, Advanced to the VBA level. Our trainers are Microsoft certified professionals with a proven track record with several years experience in delivering public, one to one, tailored and bespoke courses. Tailored in company training courses: You can choose to run the course exactly as they are outlined by us or we can customise it so that it meets your specific needs. A tailored or bespoke course will follow the standard outline but may be adapted to your specific organisational needs. Getting Started with Word Identify the Components of the Word Interface Create a Word Document Help Editing a Document Navigate and Select Text Modify Text Find and Replace Text Formatting Text and Paragraphs Apply Character Formatting Align Text Using Tabs Display Text as List Items Control Paragraph Layout Apply Borders and Shading Apply Styles Manage Formatting Adding Tables Insert a Table Modify a Table Format a Table Convert Text to a Table Managing Lists Sort a List Renumber a List Customise a List Inserting Graphic Objects Insert Symbols and Special Characters Add Images to a Document Page Setup Apply a Page Border and Color Add a Watermark Add Headers and Footers Control Page Layout Proofing a Document Check Spelling and Grammar Other Proofing Tools Check Accessibility Customising the Word Environment Customise the Word Interface Additional Save Options Who is this course for? Who is this course for? This course is intended for delegates who want to learn the fundamentals skills of working with Microsoft Word Requirements Requirements General knowledge of the Windows OS Career path Career path Microsoft Office know-how can instantly increase your job prospects as well as your salary. 80 percent of job openings require spreadsheet and word-processing software skills

Microsoft Word Introduction (live online classes)
Delivered OnlineFlexible Dates
£225