• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

12286 Environment courses in Sutton-in-Ashfield delivered Online

Cyber Security and Digital Forensics for Pentesters - Hands-on

By Study Plex

Highlights of the Course Course Type: Online Learning Duration: 8 hours 13 minutes Tutor Support: Tutor support is included Customer Support: 24/7 customer support is available Quality Training: The course is designed by an industry expert Recognised Credential: Recognised and Valuable Certification Completion Certificate: Free Course Completion Certificate Included Instalment: 3 Installment Plan on checkout What you will learn from this course? Gain comprehensive knowledge about forensic investigation Understand the core competencies and principles of forensic investigation Explore the various areas of forensic investigation Know how to apply the skills you acquired from this course in a real-life context Become a confident and expert pentester Cyber Security and Digital Forensics for Pentesters - Hands-on Course Master the skills you need to propel your career forward in digital forensic investigation. This course will equip you with the essential knowledge and skillset that will make you a confident pentester and take your career to the next level. This comprehensive cyber security and digital forensics course is designed to help you surpass your professional goals. The skills and knowledge that you will gain through studying this cyber security and digital forensics course will help you get one step closer to your professional aspirations and develop your skills for a rewarding career. This cyber security and digital forensics course is endorsed by the Quality Licence Scheme for its high-quality, non-regulated provision and training programmes. The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries.  This comprehensive course will teach you the theory of effective digital forensic investigation practice and equip you with the essential skills, confidence and competence to assist you in the digital forensic investigation industry. You'll gain a solid understanding of the core competencies required to drive a successful career in digital forensic investigation. This course is designed by industry experts, so you'll gain knowledge and skills based on the latest expertise and best practices. This extensive course is designed for pentester or for people who are aspiring to specialise in digital forensic investigation. This cyber security and digital forensics course has been endorsed by the Quality Licence Scheme for its high-quality, non-regulated provision and training programmes. This course is not regulated by Ofqual and is not an accredited qualification.  Enrol in this cyber security and digital forensics course today and take the next step towards your personal and professional goals. Earn industry-recognised credentials to demonstrate your new skills and add extra value to your CV that will help you outshine other candidates. Who is this Course for? This comprehensive cyber security and digital forensics course is ideal for anyone wishing to boost their career profile or advance their career in this field by gaining a thorough understanding of the subject. Anyone willing to gain extensive knowledge on this digital forensic investigation can also take this course. Whether you are a complete beginner or an aspiring professional, this course will provide you with the necessary skills and professional competence, and open your doors to a wide number of professions within your chosen sector. Entry Requirements This cyber security and digital forensics course has no academic prerequisites and is open to students from all academic disciplines. You will, however, need a laptop, desktop, tablet, or smartphone, as well as a reliable internet connection. Assessment This cyber security and digital forensics course assesses learners through multiple-choice questions (MCQs). Upon successful completion of the modules, learners must answer MCQs to complete the assessment procedure. Through the MCQs, it is measured how much a learner could grasp from each section. In the assessment pass mark is 60%. Advance Your Career This cyber security and digital forensics course will provide you with a fresh opportunity to enter the relevant job market and choose your desired career path. Additionally, you will be able to advance your career, increase your level of competition in your chosen field, and highlight these skills on your resume. Recognised Accreditation This course is accredited by continuing professional development (CPD). CPD UK is globally recognised by employers, professional organisations, and academic institutions, thus a certificate from CPD Certification Service creates value towards your professional goal and achievement. The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries. What is CPD? Employers, professional organisations, and academic institutions all recognise CPD, therefore a credential from CPD Certification Service adds value to your professional goals and achievements. Benefits of CPD Improve your employment prospects Boost your job satisfaction Promotes career advancement Enhances your CV Provides you with a competitive edge in the job market Demonstrate your dedication Showcases your professional capabilities What is IPHM? The IPHM is an Accreditation Board that provides Training Providers with international and global accreditation. The Practitioners of Holistic Medicine (IPHM) accreditation is a guarantee of quality and skill. Benefits of IPHM It will help you establish a positive reputation in your chosen field You can join a network and community of successful therapists that are dedicated to providing excellent care to their client You can flaunt this accreditation in your CV It is a worldwide recognised accreditation What is Quality Licence Scheme? This course is endorsed by the Quality Licence Scheme for its high-quality, non-regulated provision and training programmes. The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries. Benefits of Quality License Scheme Certificate is valuable Provides a competitive edge in your career It will make your CV stand out Course Curriculum Course Overview Course Overview 00:06:00 Building Your Forensics Lab Environment Using VirtualBox Video - Downloading ISO and OVA Files for VirtualBox 00:08:00 Video and lab - Create a Virtual Install of CSI Linux 2021.2 00:12:00 Video and Lab - Create a Kali Live (Forensic Mode) VM Using VirtualBox 00:06:00 Video and lab - Create a Virtual Install Kali Image Using VirtualBox 00:11:00 Video and Lab - Create Virtual Install of Windows 10 Using VirtualBox 00:08:00 Video and Lab - Create a Virtual Install of Metasploitable2 Using VirtualBox 00:10:00 Using Kali Forensic Mode and Autopsy Video and Lab -Getting Started with Autopsy 00:10:00 Video and Lab - Simulate Creating a Disk Image for a Forensic Analysis 00:11:00 Video and Lab - Examining a forensic Disk Image Using Autopsy 00:12:00 Digital Forensics Case Management Video and Lab - Installing the WebMap-Nmap Dashboard 00:12:00 Open-source Intelligence (OSINT) Video and Lab - Conducting OSINT Using CSI Linux Investigator 00:08:00 Video and Lab - Find Social Media Accounts Using Sherlock 00:07:00 Video - OSINT Framework - Overview 00:16:00 Using Shodan to Search for Vulnerable Devices Video and Lab - Preparing CSI Investigator to Use Shodan 00:05:00 Video and Lab - Using Shodan to Find Vulnerable Devices 00:16:00 Video and lab - Using Shodan to Search for Vulnerable Databases 00:08:00 Computer Forensics Video - Attaching an External USB Device in Kali 00:07:00 Video and Lab - Acquiring a Forensic Copy of the Windows Registry 00:15:00 Video and Lab - Analyzing the Windows Registry for Evidence 00:14:00 Video and Lab - Dumping Wi-Fi Credentials Using netsh 00:04:00 Video and Lab - Email Header Analysis 00:17:00 Video and Lab - Using Shellbags to View Hidden or Deleted Folders 00:06:00 Video and Lab - Extracting Thumbnail Images From a Suspects Machine 00:05:00 Video and lab - Memory Forensics Using the Volatility Framework 00:19:00 Reverse Engineering and Malware Analysis Video and Lab - Install Ghidra on CSI Linux 00:07:00 Video and Lab - Introduction to Using Ghidra 00:14:00 Video and Lab - Reverse Engineering crackme0x00 Using Ghidra 00:06:00 Video and Lab - Reverse Engineering crackme0x05 Using Ghidra 00:12:00 Video and Lab - Analyzing the WannaCry KillSwitch Using Ghidra 00:17:00 Malware Hunting with Sysinternal Tools Video - Overview of Sysinternal Tools 00:08:00 Video - Overview of Sysinternal's Process Explorer 00:00:00 Video and Lab - Finding Malware with Sysinternals Process Explorer 00:09:00 Stenography Video and Lab - Using Steghide for Hiding and Extracting Data 00:11:00 Video and Lab - Using the EXIFtool to Read and Write EXIF Tags 00:10:00 Network Forensics Using Wireshark Video - Overview of Wireshark 3.2 00:11:00 Video - Wireshark Capture Options 00:07:00 Video - Wireshark Toolbar Icons 00:03:00 Video and Lab - Installing a Wireless Adapter in Kali 00:09:00 Video and Lab - Hacking a Wireless Network Using Kali Linux 00:14:00 Video - Capturing Wireless Traffic Using Wireshark 00:05:00 Practice What You Learned Video and Lab - CTF Lab Build for HA: Forensics 00:11:00 Video and lab - Capture flag #1 00:12:00 Video and lab - Capture flag #2 00:10:00 Video and lab - Capture flag #3 00:20:00 Video and lab - Capture flag #4 00:09:00 Obtain Your Certificate Order Your Certificate of Achievement 00:00:00 Get Your Insurance Now Get Your Insurance Now 00:00:00 Feedback Feedback 00:00:00

Cyber Security and Digital Forensics for Pentesters - Hands-on
Delivered Online On Demand
£19

EUSR SHEA Core

5.0(179)

By Cross Compliance Training Limited

EUSR SHEA Core Qualification – Safety, Health & Environmental Awareness The EUSR SHEA Core Qualification (Safety, Health and Environmental Awareness) is a foundational training programme that provides essential health, safety, and environmental understanding for individuals working across a wide range of industries, including utilities, construction, and engineering. Developed by Energy & Utility Skills, the SHEA Core qualification is recognised nationally and forms the basis of all SHEA schemes. It delivers a strong grounding in workplace safety principles and prepares learners for more specialised SHEA sector schemes such as SHEA Water, SHEA Gas, SHEA Power, and SHEA Waste & Resource Management.

EUSR SHEA Core
Delivered OnlineFlexible Dates
£210

Corporate Social Responsibility with Business Law - QLS Certificate

By Imperial Academy

Level 3 & 5 Endorsed Diploma | QLS Hard Copy Certificate Included | Plus 5 CPD Courses | Lifetime Access

Corporate Social Responsibility with Business Law - QLS Certificate
Delivered Online On Demand
£300

ICM-WA-CT-Installing and Configuring Meraki MR Wireless Aps

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for The primary audience for this course is as follows: IT Staff and Managers Network and systems personnel and engineers Small to mid-sized organizations that require fundamental knowledge on networking terms/concepts and configuration guidance for Meraki equipment. This also includes organizations looking to implement remote sites, provide a guest wireless solution, and collect user analytics. Overview Following completion of this course, students will understand, Install, Configure, Monitor, and Troubleshoot the following: Navigate and Configure the dashboard Add MX/MR/MS/MV devices to the Dashboard Understand and Configure Configuration Templates Understand and Configure Group Policies Manage/Configure/Integrate Users and Radius Policies Configure, Monitor, and Troubleshoot MR Access Points Monitor Meraki Network Health Troubleshoot devices and Connectivity This 3-day Cisco course provide students with the skills to configure, optimize, and troubleshoot a Cisco Meraki solution. Students will learn how to install and optimize Meraki MR Access Points. Students will also learn how to configure the Meraki Dashboard, troubleshoot and configure the Meraki environment and learn how to diagnose and resolve user and Network issues that may arise. Introduction to Meraki The Meraki Mission Cisco Meraki: Bringing the Cloud to Enterprise Networks Cloud-Managed Networking Architecture Benefits of a Cloud-Based Solution The Meraki Full Stack: New and Unique Value Proposition Meraki Deployment ? How it works Why Customers Choose Meraki Meraki MS Switches Overview Meraki MX Security Appliances Overview Meraki SD-WAN Overview Meraki MR Wireless Access Points Overview Cisco Meraki Systems Manager Overview Cisco Meraki MV Vision Security Cameras Overview Meraki API Overview Meraki Licensing Enterprise Support Cisco Meraki Documentation Cloud Management with the Meraki Dashboard The Meraki Dashboard Dashboard: Organizational Structure Out-of-band Cloud Management Loss of Connectivity to the Cisco Meraki Cloud Meraki Dashboard Logins Create Dashboard Accounts and Organization MSP Logins - Manage Multiple Organizations Modify an Organization View Organizations Health Meraki Dashboard Best Practices Dashboard Search Meraki Help Organizational Wide Settings Configure Monitor Create and Manage Configuration Templates Network-Wide Settings Configure Meraki MR Wireless Meraki MR Wireless Overview Meraki 2.5G Multigigabit (MGig) Wireless Meraki Mesh Routing Meraki?s solution for RF Environments Securing Guest Wireless Bluetooth Integrated Analytics Meraki Location Heatmap High Density Wireless Zero-Touch Provisioning for Wireless Dedicated Scanning Radio for Rouges and Interference Mounting indoor and Outdoor Antennas Meraki MR Licensing IEEE 802.11 Wireless LAN Standards Site Survey & Design for ensuring connectivity and user experience Meraki AP Models Overview Configuring Meraki APs Configuring SSIDs Firewall & Traffic Shaping Configuration for Wireless Monitoring Meraki APs Trouble Shooting

ICM-WA-CT-Installing and Configuring Meraki MR Wireless Aps
Delivered OnlineFlexible Dates
Price on Enquiry

Oracle Database 12c R2 - Administration Workshop Ed 3

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Data Warehouse Administrator Database Administrators Database Designers Support Engineer Technical Administrator Overview Back up, restore, and patch DBCS database deployments Describe the DBaaS and on-premises Oracle Database architectures Manage database instances Manage UNDO data Move data between databases Implement basic backup and recovery procedures Monitor and tune database performance Tune SQL to improve performance Manage resources with Oracle Database Resource Manager Create pluggable databases (PDBs) Configure the Oracle network environment Administer user security and implement auditing Create and manage tablespaces Manage storage space Create and manage Database as a Cloud Service (DBCS) database deployments Register databases and manage performance with Enterprise Manager Cloud Control The Oracle Database 12c R2: Administration Workshop Ed 3 course is designed to provide students with a firm foundation in administration of an Oracle Database. In this course students will gain a conceptual understanding of Oracle Database architecture and learn how to manage an Oracle Database in an effective and efficient manner. Exploring Oracle Database Architecture Introducing Oracle Database Relation Database Models Oracle SQL and PL/SQL Oracle Database Server Architecture Connecting to Oracle Databases Oracle Database Tools Oracle-Supplied User Accounts Querying the Oracle Data Dictionary Managing Database Instances Initialization Parameter Files Starting Up Oracle Databases Shutting Down Oracle Databases Opening and Closing PDBs Working with the Automatic Diagnostic Repository (ADR) Querying Dynamic Performance Views Creating PDBs Methods and Tools to Create PDBs Creating PDBs from Seed with SQL*Plus Cloning PDBs with SQL*Plus Unplugging and Pluggin In PDBs with SQL*Plus Dropping PDBs with SQL*Plus Configuring the Oracle Network Environment Oracle Net Services How Listeners Work Configuring Listeners for Dynamic Service Registration Configuring Listeners for Static Service Registration Configuring Local Naming for Connections Testing Oracle Net Connectivity with tnsping Configuring Communication Between Databases Dedicated Versus Shared Server Configurations Administering User Security Creating Users Granting Privileges Creating and Granting Roles Revoking Privileges and Roles Creating and Assigning Profiles Authenticating Users Assigning Quotas to Users Applying the Principal of Least Privilege Creating and Managing Tablespaces How Table Data is Stored Creating Tablespaces in SQL*Plus Altering and Dropping Tablespaces in SQL*Plus Viewing Tablespace Information in SQL*Plus Implementing Oracle Managed Files Moving and Renaming Online Data Files in SQL*Plus Managing Storage Space Oracle Database Space Management Features Block Space Management Row Chaining and Migration Free Space Management Within Segments Types of Segments Allocating Extents Understanding Deferred Segment Creation Space-Saving Features Managing UNDO Data Undo Data: Overview Transactions and Undo Data Storing Undo Information Comparing Undo Data and Redo Data Managing Undo Local Undo Mode Versus Shared Undo Mode Configuring Undo Retention Categories of Undo Moving Data Moving Data: General Architecture Oracle Data Pump: Overview Oracle Data Pump: Benefits Data Pump Export and Import Clients Data Pump Utility: Interfaces and Modes Data Pump Import: Transformations SQL*Loader Overview Loading Methods Backup and Recovery Concepts DBA Responsibilities Categories of Failure Understanding Instance Recovery Understanding Types of Backups Comparing Complete and Incomplete Recovery Oracle Data Protection Solutions Flashback Technology Monitoring and Tuning Database Performance Managing Performance Activities Performance Planning Considerations Database Maintenance Automatic Workload Repository (AWR) Automatic Database Diagnostic Monitor Performance Monitoring Performance Tuning Methodology Database Server Statistics and Metrics SQL Tuning SQL Tuning Process Oracle Optimizer Optimizer Statistics SQL Plan Directives Adaptive Execution Plans SQL Tuning Advisor SQL Access Advisor SQL Performance Analyzer Oracle Database Resource Manager Oracle Database Resource Manager: Overview Resource Manager Elements Using Resource Manager to Allocate Resources Creating a Simple Resource Plan Creating a Complex Resource Plan Using the Active Session Pool Feature Limiting CPU Utilization at the Database Level Limiting CPU Utilization at the Server Level Enterprise Manager Cloud Control Controlling the Enterprise Manager Cloud Control Framework Starting the Enterprise Manager Cloud Control Framework Stopping the Enterprise Manager Cloud Control Framework Introduction to Oracle Database Cloud Service Oracle Cloud: Overview Database Cloud Service Offerings DBCS Architecture Features and Tooling Additional Database Configuration Options Creating DBCS Database Deployments Automated Database Provisioning Creating a Database Deployment How SSH Key Pairs are Used Creating an SSH Key Pair Storage Used for Database Files Managing DBCS Database Deployments Cloud Tooling Accessing Tools and Features from the DBCS Console Managing the Compute Node Associated With a Database Deployment Managing Network Access to DBCS Enabling Access to a Compute Node Port Scaling a Database Deployment Backing Up and Restoring DBCS Database Deployments Backing Up and Recovering Databases on DBCS Backup Destination Choices Backup Configuration Creating an On-Demand Backup Customizing the Backup Configuration Performing Recovery by Using the Console Performing Recovery by Using the dbaascli Utility Patching DBCS Database Deployments Patching DBCS Using the DBCS Console to Manage Patches Using the dbaascli Utility to Manage Patches Creating Master Encryption Keys for PDBs CDB and PDB Master Encryption Keys Determining Whether You Need to Create and Activate and Encryption Key for a PDB Creating and Activating an Encryption Key Tablespace Encryption by Default Tablespace Encryption by Default in DBCS Transparent Data Encryption (TDE) Overview Components of TDE Using TDE Defining the Keystore Location Controlling Tablespace Encryption by Default Managing the Software Keystore and Master Encryption Key Managing the Keystore in CDBs and PDBs Additional course details: Nexus Humans Oracle Database 12c R2 - Administration Workshop Ed 3 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Oracle Database 12c R2 - Administration Workshop Ed 3 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Oracle Database 12c R2 - Administration Workshop Ed 3
Delivered OnlineFlexible Dates
Price on Enquiry

Master Spring boot 3.0 and MongoDB

4.5(3)

By Studyhub UK

Embark on a transformative journey into the realm of cutting-edge development with our course, 'Master Spring Boot 3.0 and MongoDB.' Crafted with precision and innovation, this course is a gateway to mastering the intricate dance between Spring Boot and MongoDB, providing you with the skills to revolutionize your coding prowess. Immerse yourself in an engaging learning experience, where each section unfolds like a chapter in a captivating novel, unveiling the secrets of MongoDB, the nuances of Bootstrapping applications, and the artistry of integrating OpenAPI. It's more than a course; it's an odyssey into the heart of modern development, beckoning you to embrace a new era of programming possibilities. In this dynamic learning adventure, traverse through the course curriculum like an explorer unraveling a map to success. From laying the groundwork in the introduction to conquering complex queries and MongoDB templates, you'll navigate the landscape of development with confidence. The course is not just about acquiring knowledge; it's about transforming that knowledge into practical expertise. Whether you're a novice eager to embark on a coding expedition or a seasoned developer seeking to enhance your skills, this course is your compass to navigate the vast territories of Spring Boot and MongoDB, promising a voyage filled with discovery and mastery. Learning Outcomes Develop a profound understanding of MongoDB, from environmental preparation to advanced query methods. Master the art of bootstrapping applications, gaining hands-on experience in crafting robust and efficient systems. Uncover the intricacies of collections relationships and the use of DBRef, adding a layer of sophistication to your database interactions. Seamlessly integrate OpenAPI into your projects, enhancing the accessibility and documentation of your applications. Acquire expertise in document queries and MongoDB templates, empowering you to build scalable and efficient databases. Why choose this Master Spring boot 3.0 and MongoDB course? Unlimited access to the course for a lifetime. Opportunity to earn a certificate accredited by the CPD Quality Standards and CIQ after completing this course. Structured lesson planning in line with industry standards. Immerse yourself in innovative and captivating course materials and activities. Assessments designed to evaluate advanced cognitive abilities and skill proficiency. Flexibility to complete the Course at your own pace, on your own schedule. Receive full tutor support throughout the week, from Monday to Friday, to enhance your learning experience. Unlock career resources for CV improvement, interview readiness, and job success. Who is this Master Spring boot 3.0 and MongoDB course for? Aspiring developers keen on mastering the Spring Boot-MongoDB synergy. Software engineers looking to deepen their understanding of advanced database operations. Students and coding enthusiasts eager to explore the latest tools in the development landscape. Professionals seeking to upgrade their skill set in line with industry demands. Entrepreneurs or tech enthusiasts aiming to build robust applications from the ground up. Career path MongoDB Developer: £40,000 - £60,000 Spring Boot Engineer: £45,000 - £70,000 Database Architect: £55,000 - £80,000 Full Stack Developer: £50,000 - £75,000 Java Developer (Specializing in Spring Boot): £45,000 - £65,000 API Integration Specialist: £50,000 - £70,000 Prerequisites This Master Spring boot 3.0 and MongoDB does not require you to have any prior qualifications or experience. You can just enrol and start learning. This Master Spring boot 3.0 and MongoDB was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Certification After studying the course materials, there will be a written assignment test which you can take at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £4.99 Original Hard Copy certificates need to be ordered at an additional cost of £8. Course Curriculum Section 01: Introduction What is MongoDB 00:02:00 The Difference Between SQL and NoSQL 00:03:00 How to Choose Between SQL and NoSQL 00:04:00 Section 02: Prepare The Mongo Environment MongoDB UI Tools 00:01:00 Why Use Docker for Development 00:01:00 Create an Empty Docker Compose File 00:02:00 Mongo Server (Docker Compose) 00:04:00 Mongo Express (Docker Compose) 00:03:00 Run and Test 00:03:00 Section 03: Mongo Terms Collections and Documents in Mongo 00:03:00 Section 04: Bootstrapping The Application Create a New Spring Boot 3.0 Project 00:04:00 Project Structure 00:02:00 Include the Docker Compose with the Project and Run It 00:04:00 Project Architecture 00:03:00 Connect to MongoDB 00:03:00 Create a New Database 00:01:00 Understand Admin - Local and Config Databases 00:05:00 Create a Java Class 00:04:00 Transform the Java Class into a Collection 00:02:00 Create a Mongo Repository 00:02:00 Insert the First Data into the Collection 00:06:00 Create a Product Service 00:04:00 Save the product 00:03:00 Find Product by ID 00:01:00 Find All Products 00:01:00 Delete Product 00:01:00 Section 05: CRUD Operations Create Product Controller 00:02:00 Save Product Operation 00:02:00 Find All Products 00:01:00 Find Product by ID 00:01:00 Delete Product 00:02:00 Test the CRUD Operations 00:06:00 Section 06: DBRef And Collections Relationships Extend the Product Model 00:02:00 Create Category Java Class 00:02:00 User Category as a Field 00:03:00 Relationship between Category and Product 00:01:00 Transform the Category to a Collection 00:01:00 Create a Category Repository 00:01:00 Insert Categories at Startup 00:02:00 The Issue in Linking Collections 00:03:00 Add Relationship Between Collections 00:04:00 Section 07: OpenApi Integration Add OpenApi Dependency 00:02:00 Test and Play with Swagger UI 00:06:00 Section 08: Documents Queries And Mongo Template Extend the Product Model 00:02:00 Create a Search Service 00:01:00 What is MongoTemplate 00:02:00 Is() Query 00:07:00 Testing the Is() Query 00:02:00 Regex() Query 00:06:00 Lt() Query 00:03:00 Gt() Query 00:02:00 Sorting Data 00:05:00 Paging and Sorting 00:06:00 Section 09: Query Methods Create a Query Method Service 00:03:00 FindByX Query 00:06:00 FinByX Ignore Case Query 00:02:00 FinByX starting with query 00:03:00 FinByX ending with query 00:02:00 FinByX containing query 00:04:00 FinByX less than 00:02:00 FinByX greater than 00:01:00 FinByX between 00:02:00 FinByX and SortByY 00:04:00 Paging and Sorting 00:07:00

Master Spring boot 3.0 and MongoDB
Delivered Online On Demand3 hours 5 minutes
£10.99

Security Guard, CCTV and Door Supervision

5.0(1)

By Course Gate

Join the comprehensive Security Guard, CCTV, and Door Supervision course to gain essential skills and knowledge for a successful career in the security industry. Learn security risk analysis, crisis response, CCTV monitoring, and conflict management to ensure safety and compliance. Suitable for aspiring security professionals and those seeking advanced training.

Security Guard, CCTV and Door Supervision
Delivered Online On Demand8 hours
£11.99

Modern Greek for Kids - Level 5

5.0(14)

By The Greek Online School

This course is for young learners who: Have completed Level 4. Know how to read, write and speak Greek at a very good level. Understand all the ideas presented in Greek, either spoken or written. Communicate with native speakers Greek without any strain.

Modern Greek for Kids - Level 5
Delivered OnlineFlexible Dates
Price on Enquiry

Manual Handling, Work At Height & Working in Confined Spaces QLS Endorsed Diploma

By Compliance Central

Course Overview: Recent statistics highlight the critical importance of proficiency in Manual Handling, Work At Height & Working in Confined Spaces. With workplace accidents on the rise, it's evident that comprehensive training in these areas is essential. According to recent data from the Health and Safety Executive, incidents related to manual handling, working at height, and confined spaces have increased by 15% over the past year. In light of this, our Manual Handling, Work At Height & Working in Confined Spaces bundle offers a holistic approach to tackle these challenges head-on, providing learners with a comprehensive skill set to enhance workplace safety and efficiency. This comprehensive Manual Handling, Work At Height & Working in Confined Spaces QLS Endorsed Diploma bundle encompasses an array of courses designed to equip individuals with the necessary knowledge and expertise to navigate hazardous environments safely. Through a blend of theoretical insights and practical applications, learners will delve into the intricacies of Manual Handling, Work At Height & Working in Confined Spaces, gaining a profound understanding of risk assessment, hazard mitigation, and regulatory compliance. With a focus on personal development and career advancement, participants will also enhance their communication, decision-making, and networking skills, empowering them to excel in their professional endeavors. Bundle Include includes: QLS Endorsed Courses: Course 01: Certificate in Working in Confined Spaces at QLS Level 3 Course 02: Certificate in Work At Height Training at QLS Level 3 Course 03: Certificate in Manual Handling at QLS Level 35 CPD QS Accredited Courses: Course 04: RIDDOR Training Course 05: LOLER Training Course 06: Noise and Hearing Protection Training Course 07: DSEAR Training Course 08: COSHH - Control of Substances Hazardous to Health Course 09: Spill Management Training Course 10: Level 2 Health and Safety in the Workplace Course 11: Oxygen First Aid Training - Online Course Take your career to the next level with our bundle that includes technical courses and five guided courses focused on personal development and career growth. Course 12: Career Development Plan Fundamentals Course 13: CV Writing and Job Searching Course 14: Networking Skills for Personal Success Course 15: Ace Your Presentations: Public Speaking Masterclass Course 16: Decision Making and Critical Thinking Seize this opportunity to elevate your career with our comprehensive bundle, endorsed by the prestigious QLS and accredited by CPD.Manual Handling, Work At Height & Working in Confined Spaces QLS Endorsed Diploma. Learning Outcomes: Acquire comprehensive knowledge and understanding of Manual Handling, Work At Height & Working in Confined Spaces. Develop proficiency in risk assessment, hazard identification, and mitigation strategies by Manual Handling, Work At Height & Working in Confined Spaces course. Gain insights into regulatory requirements and compliance standards governing workplace safety. Enhance personal development skills, including communication, critical thinking, and decision-making. Master the art of effective networking for personal and professional growth. Cultivate confidence and proficiency in public speaking and presentations. This comprehensive Manual Handling, Work At Height & Working in Confined Spaces bundle dives deep into the intricacies of workplace safety, offering participants a thorough understanding of the risks associated with manual handling, working at height, and confined spaces. Through a series of meticulously crafted modules, learners will explore the fundamental principles underpinning each area, from the mechanics of lifting and carrying to the intricacies of fall prevention and rescue procedures. Emphasis is placed on developing practical skills in risk assessment and hazard management, empowering individuals to identify potential dangers and implement effective control measures to mitigate risks proactively. Moreover, participants will gain invaluable insights into regulatory frameworks and industry best practices governing workplace safety. From familiarising themselves with the latest legislative requirements to understanding the importance of compliance audits and safety inspections, learners will emerge equipped with the knowledge and expertise necessary to uphold the highest standards of safety and wellbeing in any professional setting. By blending theoretical concepts with real-world applications, this Manual Handling, Work At Height & Working in Confined Spaces course ensures that graduates are well-prepared to navigate the complexities of hazardous environments with confidence and competence. CPD 160 CPD hours / points Accredited by CPD Quality Standards Who is this course for? This Manual Handling, Work At Height & Working in Confined Spaces course is ideal for: Professionals working in industries prone to manual handling, working at height, and confined space hazards. Health and safety officers seeking to enhance their expertise in risk management and regulatory compliance. Individuals aspiring to pursue careers in occupational health and safety through Manual Handling, Work At Height & Working in Confined Spaces cource. Employers looking to upskill their workforce and improve workplace safety standards. Students studying relevant disciplines interested in broadening their knowledge base. Anyone keen on advancing their personal development and career prospects. Requirements You are warmly invited to register for this bundle. Please be aware that there are no formal entry requirements or qualifications necessary. This curriculum has been crafted to be open to everyone, regardless of previous experience or educational attainment. Career path Upon completion of the Manual Handling, Work At Height & Working in Confined Spaces courses, you will be able to: Health and Safety Manager Risk Assessment Officer Compliance Specialist Occupational Health Advisor Safety Consultant Site Supervisor Emergency Response Coordinator Certificates 13 CPD Quality Standard Certificates Digital certificate - Included 3 QLS Endorsed Certificates Hard copy certificate - Included

Manual Handling, Work At Height & Working in Confined Spaces  QLS Endorsed Diploma
Delivered Online On Demand4 days
£310

Wildlife Rescue, Rehabilitation and Animal Science

By Imperial Academy

Level 4- Two Endorsed Diploma | QLS Hard Copy Certificate Included | Plus 5 CPD Courses | Lifetime Access

Wildlife Rescue, Rehabilitation and Animal Science
Delivered Online On Demand4 hours
£300