• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1797 Courses in Leicester

Diploma in Architecture and Interior Design Diploma 1-2-1

By Real Animation Works

Face to face One to one.

Diploma in Architecture and Interior Design Diploma 1-2-1
Delivered in Internationally or OnlineFlexible Dates
£4,000

Financial Analysis and Reporting

5.0(10)

By GBA Corporate

Overview Financial Analysis and reporting play a very important role within the organisation and its stakeholders. This course is designed to analyse the functions of financial reporting in communication and its effects on decision-making processes or managerial decisions. It will highlight the accounting and financial standards-setting process and its implication on the organisation globally. Financial Analysis and reporting discuss how accountants act as processors and purveyors of information for decision-making and the needs of those who use accounting information. It also looks at the role performed by accountants and notes the need to be aware of relevant regulatory and conceptual frameworks.

Financial Analysis and Reporting
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,626

Financial Accounting and Reporting

5.0(10)

By GBA Corporate

Overview Financial Accounting and reporting play a very important role within the organization and its stakeholders. This course is designed to analyze the functions of financial reporting in communication and its effects on decision-making processes or managerial decisions. It will highlight the accounting and financial standards-setting process and its implication on the organization globally. Financial accounting and reporting discuss how accountants act as processors and purveyors of information for decision-making and the needs of those who use accounting information. It also looks at the role performed by accountants and notes the need to be aware of relevant regulatory and conceptual frameworks. 

Financial Accounting and Reporting
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,626

Network management technologies

5.0(3)

By Systems & Network Training

Network management technologies course description A comprehensive tour of the available network management technologies available for todays networks. The course starts with basic tools such as syslog along with Python network automation. SNMP is then covered with the *flow technologies and streaming telemetry. Configuration management with ansible, Python, NETCONF and RESTCONF is then studied. The final part of the course looks at SDN. Hands on sessions are used throughout to reinforce the theory rather than teach specific manufacturer equipment. Note that sections are available as individual courses. What will you learn Evaluate network management technologies. Evaluate network management technologies. Recognise the weaknesses of SNMP versus NETCONF and streaming telemetry. Explain the role of NETCONF and RESTCONF. Compare & contrast *flow and streaming telemetry. Explain the role of SDN in network management. Automate network configuration with ansible and Python. Network management technologies course details Who will benefit: Those wishing to manage networks. (Previous Python experience is NOT needed) Prerequisites: Intro to data comms Duration 5 days Network management technologies course content Basic network management Network management What is network management? Benefits, issues. FCAPS model. Fault management, Configuration management, accounting, performance, security. What to manage, what not to manage. Managing network devices, managing servers. Monitoring networks Traditional network tools Ping..., SSH, syslog, TFTP for configurations. nmap. Wireshark. CLI. Web based management. Splunk. Nessus, snort, Kali. Hands on syslog, network inventories. Network automation using the CLI Programming and automating networks, netOps. Python, Git. Python network modules, SSH, paramiko, netmiko. EVE-NG. Hands onPython network modules. Structured versus unstructured data Problems with automation and unstructured data. XML, JSON, YAML. The role of YANG. Hands on Parsing data. SNMP SNMP architecture, SNMP MIBs, SMI, the SNMP protocol, polling security. Configuring SNMP. SNMPv1, v2, v3, SNMP security. Which version should you use? MIBs and MIB structure. mib-2, extra parts of mib-2, Private enterprise MIBs. Summary: What SNMP is good/bad at. Hands on Configuring agents and a NMS. MIB browsing. Server management Microsoft, Linux, application polling. WMI vs SNMP. Hands on: Application polling. Performance management *flow Polling, push vs pull, netflow, sflow, IPFIX, *flow. Flows. Where to monitor traffic. Comparing *flow with SNMP. Architecture: Generators and collectors. When flows are exported. NetFlow reporting products. SolarWinds. Hands on Netflow configuration. Collectors. Streaming telemetry Model driven telemetry, periodic/on change. Structured data. Telemetry protocol stack. gRPC and gNMI. Protobuf. gNMI operations. Telemetry architecture. Telegraf, databases, Grafana. Hands on Telemetry example. Configuration management Configuration management tools Chef, puppet, ansible, saltstack. Ansible architecture, controlling machines, nodes, agentless, SSH, modules. Inventories, playbooks, modules, network modules, jinja2 templates. Hands on Network configuration with ansible. NETCONF What is NETCONF? Protocol stack, Data stores, traffic flows, validating configurations, rollback. YANG data models and how YANG is used by NETCONF. XML. Explorers and other tools. Hands on anx, Python and NETCONF. RESTCONF The REST API, HTTP, What is RESTCONF? Tools including Postman. Comparison with NETCONF. Hands on Configuration with RESTCONF. Python network automation: configuration SSH issues. Using structured data. Jinja2. ncclient, requests, NAPALM, Nornir. Automated testing. Hands on Python network device configuration with nornir. Software Defined Networks and orchestration Classic SDN What is SDN? benefits. SDN architecture. SDN applications, SDN switches, SDN controllers, Network Operating Systems. Control plane, data plane. Northbound interfaces. SDN components. Southbound interfaces. OpenFlow. ONF, OpenFlow ports, Flow tables. Network virtualization Virtual networks, virtual switches, NfV. Service chaining. NfV and SDN. SDN implementations Classic SDN, Hybrid SDN, SDN via APIs, SDN via overlays. Data centre SDN, VXLAN, Service Provider SDN, SD WAN, Enterprise SDN, WiFi. SDN and open source OpenDaylight, OpenVSwitch, Open Networking Forum, Open Network Operating System. Hands onOpenStack. SD-WAN What is SD-WAN? Architecture: Edge, gateway, orchestrator, controller. Overlay and underlay. Use of MPLS, 4G/5G. Benefits and features. Secure Access Service Edge (SASE).

Network management technologies
Delivered in Internationally or OnlineFlexible Dates
£3,697

Analysing Financial Statement and Annual Reports

5.0(10)

By GBA Corporate

Overview The most significant network between the organisation and their investors is Financial Statements and annual reports. It is very important to understand the role of these factors to have better communication channels. This course will give you intense knowledge to prepare financial statements according to International Financial Reporting Standards. IFRS regulates financial reporting standards and according to it the company's financial reporting should be transparent. Thus, if it is as per IFRS rules, its credibility can be trusted. It will also help to analyse the financial statement and annual reports. It will enable you to evaluate corporate accounts and make strong decisions and judgements about the company's status.

Analysing Financial Statement and Annual Reports
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,626

Client Relationship Management

5.0(10)

By GBA Corporate

Overview By the end of the course, delegates will have:   Identify and prioritise key accounts Increasing business revenue through effective CRM The importance of client care in the business environment Contribution of Customer care towards to quality service Understand the benefits of high-level CRM and the part it plays in client retention Understanding the service excellence and its strengths Necessary attitudes for inspiring customer service Develop the important skills necessary for an effective Customer Relationship Manager Building rapport and creating strong working relationships Effective Communication between the clients Understanding the importance of interpersonal contact and behaviour

Client Relationship Management
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,626

Client Relationship Management

5.0(10)

By GBA Corporate

Overview By the end of the course, delegates will have:   Identify and prioritise key accounts Increasing business revenue through effective CRM The importance of client care in the business environment Contribution of Customer care towards to quality service Understand the benefits of high-level CRM and the part it plays in client retention Understanding the service excellence and its strengths Necessary attitudes for inspiring customer service Develop the important skills necessary for an effective Customer Relationship Manager Building rapport and creating strong working relationships Effective Communication between the clients Understanding the importance of interpersonal contact and behaviour

Client Relationship Management
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,626

Requirement and Implementation to Internal Auditing

5.0(10)

By GBA Corporate

Overview This course is specially designed to enhance generic auditing skills and to attain the necessary skills as required and implementation to be a certified Internal Auditor. It is not aimed at any particular ISO Management Standard or process.  Objective Improve their knowledge of best practices in the audit industry Validate their proficiency and skills in audit Differentiate themselves from their peers and create a unique advantage for themselves Set the precedence for continued improvement and advancement Recognise and apply the International Standards for the Professional Practice of Internal Auditing Become a more competent professional who is knowledgeable in organizational governance

Requirement and Implementation to Internal Auditing
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,626

Complete Perl programming

5.0(3)

By Systems & Network Training

Perl training course description A hands on introduction to programming in Perl. What will you learn Write Perl programs. Use Perl modules. Debug Perl programs. Examine existing code and determine its function. Perl training course details Who will benefit: Anyone wishing to learn Perl. Prerequisites: None although experience in another high level language would be useful. Duration 5 days Perl training course contents Introduction to Perl What is Perl? When to use Perl, downloading Perl, installing Perl, documentation, perldoc, running Perl, the Perl environment. Perl under UNIX, Perl under Windows. "Hello world". Variables Scalars, data types, $_, strings and numbers, assignment, constants, strict, scope, STDIN. Operators Number operators, string operators, precedence and associativity, converting numbers and strings, shortcut operators. Flow control Blocks, if, else, elseif, unless, foreach, while, for do, until. Regular expressions What are regular expressions? Pattern matching, Perl as a filter, file editing. Strings Comparing strings, concatenating, substrings, chomp, chop, formatting, string manipulation. Subroutines Comparing strings, concatenating, substrings, chomp, chop, formatting, string manipulation. Arrays and hashes Working with arrays, element access, push(), pop(), shift(), unshift(), <STDIN> as an array, associative arrays, hashes of arrays, hash references, arrays of hashes, hashes of hashes. Files Simple file handling, open, close, <FILEHANDLE>, <>, file tests, directory access, directory handles, database access, packing and packing binary data. I/O STDIN, STDOUT and STDERR, Command line arguments,@ARGV. Perl debugging The built in debugger, running the debugger, debugger commands, graphical debuggers. Script syntax errors, single stepping, breakpoints, watches. Packages and modules CPAN, Finding modules, installing modules, using modules, scope. Report formatting Formats, defining a format, invoking a format, field holders. Process management System interaction, system(), exec(), signals. Security issues.

Complete Perl programming
Delivered in Internationally or OnlineFlexible Dates
£3,697

Principles and Practices of Cyber Security

5.0(10)

By GBA Corporate

Overview Cyber Security plays an important role in every business as it encompasses everything that relates to protecting sensitive data, personal information, intellectual property, data, and governmental and industry information systems from theft and damage attempted by criminals and adversaries. This course is designed to understand and gain practical skills to plan, deliver and monitor IT/cyber security to internal and external clients understanding a complete, knowledge in the areas of IT policies, Security-Operational-Run-Book, security/penetration testing, ethical hacking and black hat hacking including understanding the basics of Kali Operating System and its tools and techniques. It will also cover WiFi security, Website security, human factors, cyber forensics, and cyber security team management, including all other areas in relation to Cyber Security.

Principles and Practices of Cyber Security
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,626