• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1924 Courses in Sheffield

Introduction to SQL

5.0(3)

By Systems & Network Training

Intro to SQL training course description A hands on course focusing on the use of SQL. In particular this course does not concentrate on any particular version of SQL but rather enables delegates to recognise the differences found in SQL on different platforms. What will you learn Explain the difference between standard SQL and different flavours. Use SQL statements to query databases. Use SQL statements to define databases. Intro to SQL training course details Who will benefit: Anyone working with databases. Prerequisites: None. Duration 2 days Intro to SQL training course contents What is SQL? What is SQL? History, standards, What is SQL used for? Dialects, ANSI SQL, PL/SQL, Transact SQL, front ends. Database basics RDBMS, Tables. Hands on Investigating a database. Basic SQL commands SQL Overview: SQL DML, SQL DDL, SQL queries. SELECT, WHERE and ORDER BY clauses. Combining conditions. IN, LIKE and BETWEEN. Hands on Querying a database from existing tables. SQL data retrieval Scalar functions. Hands on Selecting data from an existing database. More SQL data retrieval Scalar functions, variations. Aggregate functions, GROUP BY. HAVING. Hands on Selecting data from an existing database. Table joins Multiple tables, joins, keys, inner joins, left joins, right joins. Hands on Selecting data from an existing database. SQL basic data manipulation INSERT, UPDATE, MERGE, DELETE. Transaction controls: COMMIT, ROLLBACK. Hands on Modifying data in tables. SQL Data Definition USE, CREATE, DROP, TRUNCATE, ALTER. Hands on Managing new tables and columns. Data control GRANT, REVOKE. Hands on Defining permissions.

Introduction to SQL
Delivered in Internationally or OnlineFlexible Dates
£1497

RSPH Level 4 Managing Food Safety and Hygiene - on-site training

By Kitchen Tonic Training Company and Food Safety Consultants

We can come to you and deliver Food Safety courses at your business premises.  RSPH Level 4 Managing Food Safety and Hygiene Catering Course!  This Level 4 course is perfect for those looking to enhance their knowledge and skills in food safety and hygiene in the catering industry. Throughout the course, you will learn about advanced food safety management, HACCP principles, and how to effectively implement food safety procedures.  Special Offer: Book on this Level 4 Food Safety Training from July to August 2024 Contact us for a quote or to schedule training. 

RSPH Level 4 Managing Food Safety and Hygiene - on-site training
Delivered In-PersonFlexible Dates
£500 to £2000

Emergency Response and Crisis Management

5.0(10)

By GBA Corporate

Overview Overview The purpose of this course is to enable participants to understand and apply the principles of emergency response planning and crisis management. It considers the need for emergency and crisis response planning and an integrated approach to emergency management. Training typically covers: Crisis management structure and staffing an emergency response team Incident reporting and notification Operational processes Guidance of facility response policies and procedures Annual testing and evaluation of the crisis management plan Upcoming Events Online (USD 1950) Online Streaming Live (Flexible Dates) At Venue (USD 4500) Dubai 13 March - 17 March Istanbul 20 March - 24 March London 20 March - 24 March For more dates and Venue, Please email sales@gbacorporate.co.uk

Emergency Response and Crisis Management
Delivered in Internationally or OnlineFlexible Dates
FREE to £1489

Essential Cloud Technologies

5.0(3)

By Systems & Network Training

Cloud technologies training course description This course provides an introduction to cloud technologies, including, configuration and deployment, security, maintenance, and management. It covers all aspects of cloud computing infrastructure. It will help you to master the fundamental concepts, terminology, and characteristics of cloud computing. . What will you learn Contrast and compare AWS, GCP and Azure. Explain the different cloud services, models and characteristics. Explain cloud virtualization components and options. Explain cloud security options. Describe cloud automation, orchestration, monitoring and performance options. Cloud technologies training course details Who will benefit: Anyone working with or looking to work with cloud technologies. Prerequisites: None. Duration 2 days Cloud technologies training course contents What is the cloud? The Internet Cloud computing Benefits Disadvantages Cloud services IaaS, PaaS, SaaS, others. Cloud service providers AWS, GCP Microsoft Azure, others Cloud architectures Private, public, hybrid others Cloud based delivery The cloud and virtualization Virtual Machines, networks, storage, deployment. Accessing the Virtual Machine Secure cloud environments Security considerations. Data privacy considerations Automation and orchestration Monitoring and performance Performance Cost issues Cost containment

Essential Cloud Technologies
Delivered in Internationally or OnlineFlexible Dates
£1497

RESILIA Foundation: In-House Training

By IIL Europe Ltd

RESILIA™ Foundation: In-House Training AXELOS RESILIA™: Cyber Resilience Best Practice is designed to help commercial and government organizations around the world prevent, detect, and correct any impact cyber attacks will have on the information required to do business. Adding RESILIA to the existing AXELOS global best practice portfolio, including ITIL® and PRINCE2®, brings a common cyber resilience best practice for security, IT service management, and business. Active cyber resilience is achieved through people, process, and technology. The RESILIA™ Foundation course starts with the purpose, key terms, the distinction between resilience and security, and the benefits of implementing cyber resilience. It introduces risk management and the key activities needed to address risks and opportunities. Further, it explains the relevance of common management standards and best practice frameworks to achieve cyber resilience. Subsequently, it identifies the cyber resilience processes, the associated control objectives, interactions, and activities that should be aligned with corresponding ITSM activities. In the final part of the course, it describes the segregation of duties and dual controls related to cyber resilience roles and responsibilities. What you will Learn At the end of this course, you will be able to: Demonstrate your knowledge of the purpose, benefits, and key terms of cyber resilience Demonstrate your knowledge of the risk management and the key activities needed to address risks and opportunities Demonstrate your knowledge of the purpose of a management system and how best practices and standards can contribute Demonstrate your knowledge of the cyber resilience strategy, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience design, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience transition, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience operation, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience continual improvement, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of the purpose and benefits of segregation of duties and dual controls Course Introduction Course Learning Objectives Course Agenda Activities Course Book Structure RESILIA Certification Introduction to Cyber Resilience What is Cyber Resilience? Defining Cyber Resilience Balancing in Cyber Resilience Characteristics of Cyber Resilience Risk Management Understanding Risk Management: Discussion Defining Risk Management Addressing Risks and Opportunities Managing Cyber Resilience Why and What of Management Systems? Management Systems Common Management Standards and Frameworks Cyber Resilience Strategy What is Strategy? Cyber Resilience Strategy and Activities Security Controls at Cyber Resilience Strategy Interaction Between ITSM Processes and Cyber Resilience Cyber Resilience Design Why Cyber Resilience Design? Cyber Resilience Design Activities Security Controls at Cyber Resilience Design Aligning ITSM Processes with Cyber Resilience Processes Cyber Resilience Transition Why Cyber Resilience Transition? Basics of Cyber Resilience Transition Cyber Resilience Transition: Controls Interaction Between ITSM Processes and Cyber Resilience Cyber Resilience Operation The Purpose of Cyber Resilience Operation Security Controls in Cyber Resilience Operation Interaction Between IT Processes and Cyber Resilience Interaction Between ITSM Functions and Cyber Resilience Cyber Resilience Continual Improvement Continual or Continuous Improvement Maturity Models Continual Improvement Controls The Seven-Step Improvement Process The ITIL CSI Approach Cyber Resilience Roles & Responsibilities Segregating Duties Dual Controls

RESILIA Foundation: In-House Training
Delivered in London or UK Wide or OnlineFlexible Dates
£1995

Biohazard Safety: Managing Blood and Body Fluid Spillages Instructor

By Guardian Angels Training

Gain expertise in biohazard safety with our "Biohazard Safety: Managing Blood and Body Fluid Spillages Instructor Training" course. Ideal for healthcare professionals, lab staff, and emergency responders.

Biohazard Safety: Managing Blood and Body Fluid Spillages Instructor
Delivered In-Person in InternationallyFlexible Dates
£1175

Advanced Kibana

5.0(3)

By Systems & Network Training

Advanced Kibana training course description This training course is aimed at users who already have some experience with Kibana, who are looking to further their knowledge. What will you learn Lens Timelion Maps Custom Visualisations with Vega Canvas Filters and Controls Drilldown and Dashboards KQSL and ElasticQueries Scripted and RunTime Fields Alerts and Alarms Advanced Kibana training course details Who will benefit: Users who already have some experience with Kibana, who are looking to further their knowledge. Prerequisites: None Duration 1 day Advanced Kibana training course contents Topics Lens Visualisation types (tables,bars,charts) Category breakdown Adding multiple metrics Using formulas in metrics Labels Adding reference layer Limitations Visualise Library Timeseries, Metrics Different types of aggregations Maps GeoMapping Heat Maps Using ES index as data source Visualisation, tool tips Custom Visualisations with Vega Introduction to vega scripting Canvas Widgets and Texts Elasticsearch SQL Canvas Expressions Filters and Controls Dropdown filters Ad-hoc filters Searchbar filters Drilldown Dashboards Linking one dashboard to another KQSL and ElasticQueries Bool Query AND/OR Phrase Part match vs keyword search Wildcard search Scripted and RunTime Fields Creating ad-hoc calculated fields using scripts Performance issues Alerts and Alarms Query Based Formatting output Connector types(email,index,teams etc)

Advanced Kibana
Delivered in Internationally or OnlineFlexible Dates
£1497

Learning Centre Support Specialist

5.0(3)

By Lapd Solutions Ltd

Learning Centre Support Specialist, Learning Support Assistant,

Learning Centre Support Specialist
Delivered in Birmingham + 1 more or UK Wide or OnlineFlexible Dates
£1250 to £1500

Wireshark 101 for engineers

5.0(3)

By Systems & Network Training

Wireshark 101 training course description Wireshark is a free network protocol analyser. This hands-on course focuses on troubleshooting networks using the Wireshark protocol analyser. The course concentrates on the product and students will gain from the most from this course only if they already have a sound knowledge of the TCP/IP protocols What will you learn Download and install Wireshark. Capture and analyse packets with Wireshark. Configure capture and display filters. Customise Wireshark. Troubleshoot networks using Wireshark. Wireshark 101 training course details Who will benefit: Technical staff looking after networks. Prerequisites: TCP/IP Foundation for engineers Duration 2 days Wireshark 101 training course contents What is Wireshark? Protocol analysers, Wireshark features, versions, troubleshooting techniques with Wireshark. Installing Wireshark Downloading Wireshark, UNIX issues, Microsoft issues, the role of winpcap, promiscuous mode, installing Wireshark. Wireshark documentation and help. Hands on Downloading and installing Wireshark. Capturing traffic Starting and stopping basic packet captures, the packet list pane, packet details pane, packet bytes pane, interfaces, using Wireshark in a switched architecture. Hands on Capturing packets with Wireshark. Troubleshooting networks with Wireshark Common packet flows. Hands on Analysing a variety of problems with Wireshark. Capture filters Capture filter expressions, capture filter examples (host, port, network, protocol), primitives, combining primitives, payload matching. Hands on Configuring capture filters. Working with captured packets Live packet capture, saving to a file, capture file formats, reading capture files from other analysers, merging capture files, finding packets, going to a specific packet, display filters, display filter expressions. Hands on Saving captured data, configuring display filters. Analysis and statistics with Wireshark Enabling/disabling protocols, user specified decodes, following TCP streams, protocol statistics, conversation lists, endpoint lists, I/O graphs, protocol specific statistics. Hands on Using the analysis and statistics menus. Command line tools Tshark, capinfos, editcap, mergecap, text2pcap, idl2eth. Hands on Using tshark. Advanced issues 802.11 issues, management frames, monitor mode, packet reassembling, name resolution, customising Wireshark. Hands on Customising name resolution.

Wireshark 101 for engineers
Delivered in Internationally or OnlineFlexible Dates
£1497

Better Business Cases Practitioner: In-House Training

By IIL Europe Ltd

Better Business Cases™ Practitioner: In-House Training: In-House Training Better Business Cases™ is based on the Five Case Model - which is the UK government's best practice approach to structuring spending proposals and making effective business decisions. Using this best-practice approach will allow organizations to reduce unnecessary spending and improve the decision-making process which gives you a greater chance of securing necessary funding and support for initiatives. The goal of the practitioner course is to develop a candidate's ability to deliver a comprehensive business case, through encouraging expanded knowledge to guide the practical application of theoretical foundations. Upon the completion of this Practitioner course, a candidate will be able to start applying the model to a real business case development project. What You Will Learn At the end of this program, you will be able to: Develop the lifecycle of a business case and to establish the relationships between the five cases Apply the steps in the business case development framework, in order to support the production of a business case, using the Five Case Model, for a given scenario Overview of Better Business Cases Alignment with the strategic planning process Importance of the Business Case using the Five Case Model Overview of the Five Case Model Purpose of the key stages in the development of a spending proposal Purpose of a Business Justification Case Business Case Development Process Purpose of project / programme assurance and assurance reviews Responsibility for producing the Business Case Determining the Strategic Context and Undertaking the Strategic Assessment Scoping the Scheme and Preparing the Strategic Outline Case Planning the Scheme and Preparing the Outline Business Case Procuring the Solution and Preparing the Full Business Case Implementation and monitoring Evaluation and feedback Making the Case for Change Agree on the strategic context Determine spending objectives, existing arrangements, and business needs Determine potential business scope and key service requirements Determine benefits, risks, constraint, and dependencies Exploring the Preferred Way Forward Agree on critical success factors Determine long list options and SWOT analysis Recommend a preferred way forward Determining Potential Value for Money Revisit the short list Prepare the economic appraisal for short-listed options Undertake benefits appraisal Undertake risk appraisal Select preferred option and undertake sensitivity analysis Preparing for the Potential Deal Determine the procurement strategy Determine service streams and required outputs Outline potential risk apportionment Outline potential payment mechanisms Ascertain contractual issues and accountancy treatment Ascertaining Affordability and Funding Requirement Prepare the financial model Prepare the financial appraisals Planning for Successful Delivery Plan programme / project management Plan change and contract management Plan benefits realization Plan risk management Plan programme / project assurance and post project evaluation Procuring the Value for Money Solution Revisit the case for change Revisit the OBC options Detail procurement process and evaluation of best and final offers (BAFOs) Contracting for the Deal Set out the negotiated deal and contractual arrangements Set out the financial implications of the deal Ensuring Successful Delivery Finalize project management arrangements and plans Finalize change management arrangements and plans Finalize benefits realization arrangements and plans Finalize risk management arrangements and plans Finalize contract management arrangements and plans Finalize post-project evaluation arrangements and plans

Better Business Cases Practitioner: In-House Training
Delivered in London or UK Wide or OnlineFlexible Dates
£1995