• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

284 Logic courses in Liverpool delivered Live Online

PostgreSQL for Database Developers (TTDB7024)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for The ideal audience for this course includes database enthusiasts, IT professionals, and developers who are eager to expand their knowledge and skill set in database management and optimization. Roles that would greatly benefit from attending this course include: Database Developers: Those who design, implement, and maintain databases as part of their primary responsibilities and want to improve their expertise in schema design, query optimization, and advanced database features. Backend Developers: Professionals who work on server-side application logic and require a strong understanding of database management to integrate data storage and retrieval processes into their applications. Overview Upon completing this course, database developers will be able to: Design and implement efficient database schemas by employing normalization techniques, appropriate indexing strategies, and partitioning methods to optimize data storage and retrieval processes. Develop advanced SQL queries, including joining multiple tables, utilizing subqueries, and aggregating data, to extract valuable insights and facilitate decision-making processes. Implement stored procedures, functions, and triggers to automate common database tasks, enforce data integrity, and improve overall application performance. Apply database performance tuning techniques, such as query optimization, index management, and transaction control, to ensure optimal resource usage and enhanced system responsiveness. Integrate databases with various programming languages and platforms, enabling seamless data access and manipulation for web, mobile, and desktop applications. PostgreSQL is a powerful, open-source object-relational database management system that emphasizes extensibility, data integrity, and high performance. Its versatility and robust feature set make it an ideal choice for developers working on projects of all sizes, from small-scale applications to enterprise-level systems. By learning PostgreSQL, developers can tap into its advanced capabilities, such as full-text search, spatial data support, and customizable data types, allowing them to create efficient and scalable solutions tailored to their unique needs. PostgreSQL for Database Developers is a three-day hands-on course that explores the fundamentals of database management, covering everything from installation and management to advanced SQL functions. Designed for beginners and enthusiasts alike, this course will equip you with the knowledge and skills required to effectively harness the power of PostgreSQL in today's data-driven landscape. Throughout the course you?ll be immersed in a variety of essential topics, such as understanding data types, creating and managing indexes, working with array values, and optimizing queries for improved performance. You?ll gain valuable hands-on experience with real-world exercises, including the use of the psql client, writing triggers and stored procedures with PL/pgSQL, and exploring advanced SQL functions like Common Table Expressions (CTE), Window Functions, and Recursive Queries. You?ll exit this course with a solid foundation in PostgreSQL, enabling you to confidently navigate and manage your databases with ease and efficiency. Installing & Managing PostgreSQL PostgreSQL installation process Optimal configuration settings User and role management Database backup and restoration Overview of PostgreSQL Database PostgreSQL architecture overview Understanding database objects Efficient data storage Transaction management basics Using the psql client Introduction to psql Essential psql commands Executing queries effectively Managing databases with psql Understanding PostgreSQL data types Numeric data types explored Character and binary types Date, time, and boolean values Array and other types Understanding sequences Sequence creation and usage Customizing sequence behavior Implementing auto-increment columns Sequence manipulation and control Creating & managing indexes PostgreSQL index fundamentals Designing partial indexes Utilizing expression-based indexes Index management techniques Using COPY to load data COPY command overview Importing and exporting data Handling CSV and binary formats Performance considerations Working with Array Values Array value basics Array manipulation functions Querying arrays efficiently Multidimensional array handling Advanced SQL Functions Mastering Common Table Expressions Utilizing Window Functions Regular Expressions in SQL Crafting Recursive Queries Writing triggers & stored procedures with PL/pgSQL PL/pgSQL variables usage Implementing loop operations PERFORM and EXECUTE statements Developing PostgreSQL triggers Using the PostgreSQL query optimizer Query analysis and optimization EXPLAIN command insights PostgreSQL query operators Identifying performance bottlenecks Improving query performance Query performance tuning Index optimization strategies Efficient database partitioning Connection and resource management Wrap Up & Additional Resources Further learning opportunities Staying up-to-date with PostgreSQL Community engagement and support Additional course details: Nexus Humans PostgreSQL for Database Developers (TTDB7024) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the PostgreSQL for Database Developers (TTDB7024) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

PostgreSQL for Database Developers (TTDB7024)
Delivered OnlineFlexible Dates
Price on Enquiry

20th May Una McKeown #Agent121. Looking for: ADULT FICTION, NON-FICTION

5.0(2)

By I Am In Print

LOOKING FOR: MG, YA, ADULT FICTION, NON-FICTION Una is a Rights Agent at Susanna Lea Associates and am starting to build a client list. She grew up in London and graduated from the University of Cambridge with a BA in English in 2021. At university, Una was particularly interested in contemporary West African and South Asian literature. She started as an agent's assistant at SLA London in 2022 and now handles some translation rights and provides support with editorial work and submissions. Una's favourite reads always set her at ease right away and draws her in with impressive and accessible storytelling, memorable characters or an original hook. Una enjoys writing which expands her worldview, makes her laugh out loud or keeps her on her toes with its twists and turns. She welcomes submissions from debut authors and would be keen to read across a wide range of genres and styles. She is looking for literary, upmarket and book club fiction, and is always drawn to stories that explores the challenges and complexities of love and relationships in all its forms —within families, between friends or in romantic relationships. Una loves the way in which familial relationships are dissected in The Wren, The Wren by Anne Enright and the impact of the local community in Small Worlds by Caleb Azumah Nelson. She is always drawn to novels with a strong sense of community, whether they are unified by geography, culture, or in other unexpected ways. Una has always loved reading international and translated fiction and welcomes submissions from authors writing contemporary fiction that engages with cultures and traditions from around the world, such as in voices of the deities in Freshwater by Akwaeke Emezi or the subversive tales of Sayaka Murata. She is not looking for children’s or YA titles, science fiction or high-concept fantasy, but is open to submissions from authors writing in the speculative fiction space, and books with fantastical or otherworldly elements, be that magical realism or supernatural horror, such as Mona Awad's campus novel with a twist, Bunny. Una would also love to read more writing that engages with the natural world and reminds us of the limitations of human understanding. In non-fiction, Una enjoys books that furthers her understanding of wider societal issues — nature and the environment, culture, and little-known history. Her recent non-fiction favourites are Eve by Cat Bohannon, Doppelgänger by Naomi Klein and Unearthed by Claire Ratinon. Una would like you to submit a covering letter, 1 page synopsis and the first three chapters or 5,000 words of your manuscript in a single word document. (In addition to the paid sessions, Una is kindly offering one free session for low income/under-represented writers. Please email agent121@iaminprint.co.uk to apply, outlining your case for this option which is offered at the discretion of I Am In Print).  By booking you understand you need to conduct an internet connection test with I Am In Print prior to the event. You also agree to email your material in one document to reach I Am In Print by the stated submission deadline and note that I Am In Print take no responsibility for the advice received during your agent meeting. The submission deadline is: Tuesday 13th May 2025

20th May Una McKeown #Agent121. Looking for: ADULT FICTION, NON-FICTION
Delivered Online + more
£72

55320 Programming with HTML, CSS, and JavaScript

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for students new to computer programming or experienced programmers who are new to client-side web development. Overview After completing this course, you will be able to: Describe the technologies involved in web development. Create HTML pages with links and images. Explain the benefits of CSS. Style HTML pages with CSS. Explain the concepts of objects, methods, and properties. Work with JavaScript variables. Create their own custom functions in JavaScript. Write flow control logic in JavaScript. Write JavaScript code that listens for and handles events, such as mouse clicks and page loads. Create forms with HTML and validate them with JavaScript. Use regular expressions in JavaScript for advanced form validation. This course is intended for IT professionals interested in becoming client-side web developers. who need to get a jump start on all three technologies. The course includes more than 30 exercises, providing a rapid hands-on introduction to the three major client-side languages: HTML, CSS, and JavaScript. Students should be prepared to cover a lot of ground quickly.This material updates and replaces course Microsoft course 20480 which was previously published under the title Programming in HTML5 with JavaScript and CSS3. Module 1: A Quick Overview of Web Development HTML is Part of a Team Client-side Programming Server-side Programming Web Development Technologies Module 2: Introduction to HTML Exercise: A Simple HTML Document Getting Started with a Simple HTML Document HTML Elements, Attributes, and Comments The HTML Skeleton Viewing the Page Source Special Characters HTML Elements and Special Characters History of HTML The lang Attribute Module 3: Paragraphs, Headings, and Text Paragraphs Heading Levels Breaks and Horizontal Rules Exercise: Paragraphs, Headings, and Text The div Tag Creating an HTML Page Quoted Text Preformatted Text Inline Semantic Elements Exercise: Adding Inline Elements Module 4: HTML Links Links Introduction Text Links Absolute vs. Relative Paths Targeting New Tabs Email Links Exercise: Adding Links Lorem Ipsum The title Attribute Linking to a Specific Location on the Page Targeting a Specific Location on the Page Module 5: HTML Images Inserting Images Image Links Adding Images to the Document Exercise: Adding Images to the Page Providing Alternative Images Module 6: HTML Lists Unordered Lists Ordered Lists Definition Lists Exercise: Creating Lists Module 7: Crash Course in CSS Benefits of Cascading Style Sheets CSS Rules Selectors Combinators Precedence of Selectors How Browsers Style Pages CSS Resets CSS Normalizers External Stylesheets, Embedded Stylesheets, and Inline Styles Exercise: Creating an External Stylesheet Exercise: Creating an Embedded Stylesheet Exercise: Adding Inline Styles div and span Exercise: Styling div and span Media Types Units of Measurement Inheritance Module 8: CSS Fonts font-family @font-face font-size font-style font-variant font-weight line-height font shorthand Exercise: Styling Fonts Module 9: Color and Opacity About Color and Opacity Color and Opacity Values Color Opacity Exercise: Adding Color and Opacity to Text Module 10: CSS Text letter-spacing text-align text-decoration text-indent text-shadow text-transform white-space word-break word-spacing Exercise: Text Properties Module 11: JavaScript Basics JavaScript vs. EcmaScript The HTML DOM JavaScript Syntax Accessing Elements Where Is JavaScript Code Written? JavaScript Objects, Methods, and Properties Exercise: Alerts, Writing, and Changing Background Color Module 12: Variables, Arrays, and Operators JavaScript Variables A Loosely Typed Language Google Chrome DevTools Storing User-Entered Data Exercise: Using Variables Constants Arrays Exercise: Working with Arrays Associative Arrays Playing with Array Methods JavaScript Operators The Modulus Operator Playing with Operators The Default Operator Exercise: Working with Operators Module 13: JavaScript Functions Global Objects and Functions Exercise: Working with Global Functions User-defined Functions Exercise: Writing a JavaScript Function Returning Values from Functions Module 14: Built-In JavaScript Objects Strings Math Date Helper Functions Exercise: Returning the Day of the Week as a String Module 15: Conditionals and Loops Conditionals Short-circuiting Switch / Case Ternary Operator Truthy and Falsy Exercise: Conditional Processing Loops while and do?while Loops for Loops break and continue Exercise: Working with Loops Array: forEach() Module 16: Event Handlers and Listeners On-event Handlers Exercise: Using On-event Handlers The addEventListener() Method Anonymous Functions Capturing Key Events Exercise: Adding Event Listeners Benefits of Event Listeners Timers Typing Test Module 17: The HTML Document Object Model CSS Selectors The innerHTML Property Nodes, NodeLists, and HTMLCollections Accessing Element Nodes Exercise: Accessing Elements Dot Notation and Square Bracket Notation Accessing Elements Hierarchically Exercise: Working with Hierarchical Elements Accessing Attributes Creating New Nodes Focusing on a Field Shopping List Application Exercise: Logging Exercise: Adding EventListeners Exercise: Adding Items to the List Exercise: Dynamically Adding Remove Buttons to the List Items Exercise: Removing List Items Exercise: Preventing Duplicates and Zero-length Product Names Manipulating Tables Module 18: HTML Forms How HTML Forms Work The form Element Form Elements Buttons Exercise: Creating a Registration Form Checkboxes Radio Buttons Exercise: Adding Checkboxes and Radio Buttons Fieldsets Select Menus Textareas Exercise: Adding a Select Menu and a Textarea HTML Forms and CSS Module 19: JavaScript Form Validation Server-side Form Validation HTML Form Validation Accessing Form Data Form Validation with JavaScript Exercise: Checking the Validity of the Email and URL Fields Checking Validity on Input and Submit Events Adding Error Messages Validating Textareas Validating Checkboxes Validating Radio Buttons Validating Select Menus Exercise: Validating the Ice Cream Order Form Giving the User a Chance Module 20: Regular Expressions Getting Started Regular Expression Syntax Backreferences Form Validation with Regular Expressions Cleaning Up Form Entries Exercise: Cleaning Up Form Entries A Slightly More Complex Example

55320 Programming with HTML, CSS, and JavaScript
Delivered OnlineFlexible Dates
Price on Enquiry

Awareness of First Aid for Mental Health

By Madeleys First Aid Plus

RQF level 1 Awareness of First Aid for Mental Health Each year approximately 1 in 4 people in the UK will experience a mental health condition and at least 1 in 6 employees experience common mental health problems in the workplace. Research has shown that work is the biggest cause of stress which can stop people performing at their best. Mental health conditions are often hidden due to stigma and fear of discrimination and research has shown that a culture of fear and silence around mental health is costly to employers. The HSE guidance 'First aid needs assessment’ refers to mental health in the workplace. This 4-hour qualification provides learners with the knowledge to recognise a range of mental health conditions, how to start a supportive conversation and when and how to signpost a person to seek appropriate professional help. Learners will know how to recognise and manage stress. Learners will not diagnose or treat mental health conditions as this can only be carried out by healthcare professionals but will gain the knowledge to identify when a person may have a condition and know where they can go to get help. Suitability - Who should attend? Here are some examples of who may benefit from attending the RQF Level 1 Award in Awareness of First Aid for Mental Health: Employees and workers: This course is relevant for individuals in any industry who may encounter colleagues or clients experiencing mental health difficulties. It can be particularly valuable for human resources personnel, line managers, supervisors, or team leaders responsible for the well-being of employees. Teachers and educators: Professionals working in schools, colleges, or other educational institutions can benefit from this training to better understand and support the mental health needs of students. Healthcare and social care workers: Individuals working in healthcare or social care settings, such as nurses, care assistants, support workers, or counsellors, can enhance their understanding of mental health issues and improve their ability to provide appropriate support. Community and voluntary workers: People involved in community or voluntary organizations, including youth workers, social workers, volunteers, or community leaders, can gain valuable insights into mental health awareness and support. Personal relationships and caregivers: The Level 1 training can also be beneficial for individuals who have personal relationships with someone experiencing mental health challenges. This may include family members, friends, or caregivers who want to enhance their understanding and offer appropriate assistance. It is important to note that the Level 1 Award in Awareness of First Aid for Mental Health RQF is an introductory course and does not qualify participants to provide formal mental health interventions or therapy. However, it serves as a foundation for further training and can contribute to creating a more mentally healthy and supportive environment in various settings. Outcome / Qualification etc. Upon successful completion of the RQF Level 1 Awareness of First Aid for Mental Health course, participants can expect to achieve the following outcomes: Increased Awareness and Understanding: Participants will develop a basic awareness and understanding of mental health and mental health issues. They will gain knowledge about common mental health conditions, their signs and symptoms, and the importance of mental health in overall well-being. Recognition of Mental Health Signs: Participants will learn to recognize common signs of mental health issues in themselves and others. They will gain an understanding of the importance of early identification and intervention in promoting mental health and seeking appropriate support. Reduced Stigma and Improved Attitudes: The course aims to challenge stigmas and stereotypes associated with mental health. Participants will develop a more empathetic and supportive attitude towards individuals experiencing mental health challenges, promoting a positive and inclusive environment. Enhanced Communication Skills: Participants will learn basic communication skills for engaging with individuals experiencing mental health issues. They will gain an understanding of the importance of active listening, empathy, and non-judgmental communication in providing initial support. Signposting and Seeking Help: Participants will be equipped with knowledge about available resources, services, and support networks for mental health. They will learn about signposting individuals to appropriate professional help and self-help resources. Self-Care and Well-being Strategies: The course may provide participants with practical strategies for maintaining their own mental well-being. They may learn basic self-care techniques and stress management strategies to support their own mental health. Certificate of Completion: Upon successful completion of the course, participants will receive a certificate indicating their achievement of the RQF Level 1 Awareness of First Aid for Mental Health qualification. It's important to note that the Level 1 course provides a basic introduction to mental health awareness and first aid. It is not intended to provide participants with the qualifications or skills to diagnose or treat mental health conditions. Instead, it aims to promote mental health literacy, reduce stigma, and provide individuals with the knowledge to offer initial support and signposting to individuals in need. The Level 1 course can serve as a foundation for further learning and progression in the field of mental health. Individuals may choose to pursue higher-level courses or qualifications to develop more advanced skills and knowledge in mental health first aid or other related areas. Training Course Content MODULE 1 INTRODUCTION Session content Trainer/assessor introduction Learner introductions Course information • Administration • Learning outcomes and assessment criteria • Reasonable adjustments • Certification • Complaints and appeals • Assessment information Session duration 15 minutes MODULE 2 WHAT IS FIRST AID FOR MENTAL HEALTH? Session content Definitions Role and responsibilities of a First Aider The impact of mental health issues Mental health stigma Statistics Session duration 25 minutes MODULE 3 IDENTIFYING MENTAL HEALTH CONDITIONS Session content Mental health continuum Mental health risk factors Early warning signs Session duration 25 minutes MODULE 4 PROVIDING ADVICE AND STARTING A CONVERSATION Session content How to start a difficult conversation Non-judgemental listening skills When to contact the emergency services The First Aider’s own health and emotions Session duration 40 minutes MODULE 5 STRESS Session content What is stress? Causes of stress Effects of stress Coping strategies Session duration 25 minutes MODULE 6 MENTAL HEALTH CONDITIONS Session content Depression Anxiety Psychosis Eating disorders Suicide Self-harm Session duration 70 minutes MODULE 7 ASSESSMENT AND COURSE CLOSURE Session content Written assessment paper Course administration Course closure Session duration 40 minute Course delivery details Classroom-Based A minimum of 4 hours spread over at least one day. Ideally, the course should be run in one day, but must be completed within 2 weeks of starting the course, with each training session a minimum of two hours. Online/Virtual classroom The qualification has 2 assigned guided learning hours (GLH) and 5 hours total qualification time (TQT). GLH indicates the number of contact hours that the learner will have with the trainer/assessor. TQT includes GLH but considers unsupervised learning and is an estimate of how long the average learner will take to achieve the qualification. Why choose Madeleys First Aid Plus Founded in 2021 after Louise left 30 years in the NHS as an Advanced practitioner in A&E/ITU, had spent 1.5 years in Covid ITU Won FSB Best start-up business in the West Midlands in May 2023 Now trained 100's of delegates in Physical and Mental Health First Aid Expenses Travel costs and lunch required, there are many cafes and sandwich bars here in Much Wenlock to buy your lunch, you may eat it in the training room. All training material, books, qualification certificates are included in the price. Continuing Studies After completing the RQF Level 1 Awareness of First Aid for Mental Health course, individuals can consider various progression options to further their knowledge and skills in mental health support. Here are some potential pathways: RQF Level 2 Award in First Aid for Mental Health: This qualification builds upon the knowledge gained in the Level 1 course and provides a more comprehensive understanding of mental health issues and how to provide appropriate support. It covers topics such as recognizing mental health conditions, promoting well-being, and providing initial support to those in crisis. RQF Level 3 Award in Supervising First Aid for Mental Health: For individuals who aspire to take on leadership or supervisory roles in mental health support, the Level 3 qualification is a logical progression. It provides in-depth knowledge and skills to supervise and manage a team of individuals providing first aid for mental health. Continued Professional Development (CPD): Engaging in ongoing CPD activities is essential for staying updated with the latest developments in mental health support. Individuals can attend workshops, seminars, or conferences related to mental health, trauma, or specific areas of interest within the field. Applied Practice: Applying the knowledge gained from the Level 1 course in real-world settings is crucial for developing practical skills. Individuals can seek opportunities to work or volunteer in environments where mental health support is needed, such as community organizations, schools, or helplines. Mental Health Support Training Programs: There are various specialized training programs available that focus on specific aspects of mental health support, such as suicide prevention, trauma-informed care, or supporting individuals with specific mental health conditions. These programs can provide individuals with additional expertise and deepen their understanding of specific areas within mental health support. Higher Education: Individuals who wish to pursue a more in-depth study of mental health can consider higher education programs in psychology, counseling, social work, or related fields. These programs provide comprehensive knowledge and training in mental health support and may lead to professional certifications or degrees. It's important for individuals to research and explore progression options that align with their specific career goals, interests, and local requirements. Different countries or regions may have varying certification or training requirements for mental health support roles, so it's advisable to check with relevant regulatory bodies or professional associations for specific guidance.

Awareness of First Aid for Mental Health
Delivered in Much Wenlock or Online + more
£60

Project management 'masterclasses' (In-House)

By The In House Training Company

Masterclasses? Refreshers? Introductions? It depends what you're looking for and where you want to pitch them, but here are six tried-and-tested highly focused sessions that organisations can take individually or as a series, to help develop their teams' project management capabilities one topic at a time. Objectives for each individual session are set out below, as part of the session outlines. Taken together, as a series, however, these modules are an ideal opportunity to develop your team's levels of project management capability maturity, whether that's by introducing them to the basic principles, refreshing them on best practice, or giving them the opportunity to really drill down into a specific area of challenge in your particular operating environment. Session outlines 1 Stakeholder management Session objectives This session will help participants: Understand why stakeholders matter to projects Be able to identify and engage stakeholders Be able to categorise stakeholders by their significance 1 Key principles What does 'stakeholder' mean - in theory? What does this mean in practice? Why stakeholders matter Consequences of missing stakeholders The stakeholder management process:IdentifyAssessPlanEngage 2 Identifying stakeholders Rapid listing CPIG analysis PESTLE analysis Drawing on the knowledge and experience of others Other ways to identify stakeholders 3 Assessing stakeholders Which stakeholders are significant? Stakeholder radar Power-interest maps Power-attitude maps 4 Planning The adoption curve Dealing with obstacles Who should engage which stakeholder? How should the project's organisation be structured? How will communication happen? 5 Engaging Seven principles of stakeholder engagement 2 Requirements and prioritisation Session objectives This session will help participants: Understand how clarity of requirements contributes to project success Use different techniques for prioritising requirements Agree requirements with stakeholders Manage changes to requirements 1 Understanding and managing stakeholder needs and expectations What are 'requirements'? What is 'requirements management'? Sources of requirements - and the role of stakeholders Are stakeholders sufficiently expert to specify their needs? Do they understand the detail of what they want, or do they need help to tease that out? What do stakeholders want to achieve? Working within constraints Prioritising requirements - three techniques 2 MoSCoW prioritisation 'Must have', should have', 'could have, 'won't have this time' When to use MoSCoW 3 The Kano Model Customer satisfaction - 'attractive' and 'must-be' qualities When to use Kano 4 Value-based prioritisation Understanding risk v value Using risk v value to prioritise features and schedules 5 Agreeing requirements Perfect v 'good enough' Establishing acceptance criteria Requirements traceability Agreeing project scope 6 Changing requirements Why requirements change Why change control matters Impact on projects A formal change control process Paying for change - managing change for different types of project 3 Estimating Session objectives This session will help participants: Understand the different purposes estimates satisfy Be able to use different estimating techniques Understand how to achieve different levels of accuracy 1 Key principles What's an estimate? Informed guesswork What needs to be estimated? Costs, resources, effort, duration Tolerances Precision v accuracy 2 Estimating through the lifecycle Start Plan Do 3 Early estimates Comparative ('analogous') estimating Parametric estimating Using multiple estimating techniques 4 Bottom-up estimating Bottom-up ('analytical') estimating Pros Cons 5 Three-point estimating Three-point ('PERT': Programme Evaluation and Review Technique) estimating Uncertainty and the range of estimates Calculating a weighted average Three-point with bottom-up 4 Scheduling Session objectives This session will help participants: Understand how to create a viable schedule Be able to use different forms of schedule Understand the concept of the critical path 1 Key principles The planning horizon Rolling wave planning Release planning 2 Viable scheduling Creating a viable schedule Define the scope Sequence the work Identify the risks and build in mitigations Identify the resources Estimate the effort and durations Check resource availability Refine until a workable schedule is produced 3 Critical path analysis The critical path Network diagrams Sequence logic Practical application:Network diagram with estimated durationsThe 'forward pass'The 'backward pass'Calculating total floatIdentifying the critical pathCalculating free float Gantt charts 5 Risk and issue management Session objectives This session will help participants: Understand the difference between risks and issues Be able to identify and assess risks Understand ways of mitigating risks Manage issues 1 Key principles Understanding risk Threats and opportunities The risk management processPreparation - proactive risk managementThe process - identify, assess, plan, implementStakeholder communication Roles and responsibilities Risk management strategy The risk register Risk appetite 2 Risk identification Brainstorming Interviews Assumption analysis Checklists 3 Risk assessment and prioritisation Probability, impact and proximity Triggers Qualitative risk assessment Qualitative impact assessment Qualitative probability assessment Probability / impact grid Bubble charts Risk tolerance 4 Planning countermeasures To mitigate or not to mitigate? Categories of risk response Avoid and exploit Reduce and enhance Transfer Share Accept Contingency Secondary risks 5 Issue management What is an issue? Tolerances Issues and tolerances The PRINCE2 view of issues Ownership of issues An issue management process Issue register 6 Budgeting and cost control Session objectives This session will help participants: Understand what to include in a budget - and why Choose - and use - the appropriate estimating technique Align the budget with the schedule Understand how to monitor spend and control costs Trouble-shoot effectively to get projects back within budget Session format Flexible. The session can be tailored to the participants' average level of project management maturity - a 60-minute session (delivered virtually) is an effective introduction. A 90-minute session allows for more in-depth treatment. A half-day session (face-to-face or virtual) gives time for a more challenging workshop, particularly to discuss specific cost control issues with any of the participants' current projects. 1 Where is the money coming from? Can we pay from revenue? Do we need to borrow? How long will the project take to pay back? The lifecycle of the budget Through-life costs Stakeholder involvement 2 Estimating costs Reminder: the relationship between estimates Reminder: possible estimating techniques What do we need to estimate?PeopleEquipmentMaterialsFacilities and operating costsWork package estimateEstimated project costs Estimating agile projects 3 Aligning budget and schedule Scheduling and financial periods Spreading the budget 4 Reserves and agreeing the budget Contingency reserve Management reserve Agreeing the budget 5 Cost control Planned spend over time Actual spend over time Work completed over time Evaluating different scenarios: delivery v spend 6 Trouble-shooting Why are we where we are? What has caused the project to spend at the rate it is? Why is it delivering at the rate it is? What are the root causes? What can we do about it?

Project management 'masterclasses' (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry

Communicate with Confidence

5.0(1)

By Cocomms - Coherent Communications

Effective communication in the workplace is part and parcel of our daily lives, but not everyone is a natural.  Do you find it tough standing up in front of people? Does the thought of engaging with audiences in any setting fill you with anxiety? Is doing a remote video message to colleagues on Zoom or Teams a tough call? Do you do it regularly but need some professional guidance on whether it’s working? At CoComms we can improve every aspect of your performance and offer a range of tips and techniques to help manage these environments and keep your audience engaged and interested. Public Speaking and Presentation Training In a professional setting it’s vital to come across as dynamic, trustworthy, credible and real. You want people to trust you and in turn get behind your vision or plan or proposal. If you can achieve this you can improve your confidence, your engagement and your prospects. Our training is designed to hone your presentation skills so whether you are pitching for work, taking colleagues through change or speaking to a new audience, you can do it with a clarity and confidence that makes your messages clear and insightful. The training includes: Perfecting your slides Working to produce a clean, easy to navigate slide deck that give logic and flow to your presentation. Developing your storytelling We use our journalistic techniques to show you how to build a story to keep your audience engaged with a well-structured and entertaining presentation. Calls to Action Make sure it is clear what you want to achieve and what you want from your audience. Rehearse and Review We film and then playback a range of practical presentation exercises so we can review your performance and work to make any improvements. Conference and Panel Training The audience at a conference may be a captive one, but that doesn’t mean they are always listening and engaging with what you have to say. We can make sure your keynote speech or panel contribution is memorable, appreciated by your audience and beneficial to your business. Our training looks at preparing for and delivering a speech from start to finish and includes: Defining your big ideas What is it you want to say and what do you want your audience to remember? Develop your narrative and script How can you get across your message using storytelling. Choosing the right language How vibrant and energised language can make the difference in your speech. The tips and tricks to make sure your speech is memorable How vocabulary and delivery techniques ensure your words are heard. Controlling the message How to deal with unhelpful questions and return to the main aspects of your story. Stakeholder Communication Training Engaging effectively with stakeholders with clarity and confidence can make all the difference to your relationships. A successful “town hall” meeting can win over your sceptics, convince those who are unsure and build a common goal between your business and stakeholders. Our stakeholder communication training prepares you for these vital meetings and includes: Focusing the meeting We look at how to control the meeting so the important business is covered and how to prepare for any questions or comments you may receive. Keep control of the conversation We teach you conversational techniques to focus on the main points without being too assertive or dismissive. Rehearse and Review We use video and practical role-play exercises to assess your performance and look for ways to improve. Breaking down the information We look at how to present facts and figures without overwhelming (or boring!) your audience. Our techniques will help you narrate the message in a clear and comprehensive way. Making an impact Using our journalistic experience we will work with you to develop your presentation skills to make the biggest impact and demonstrate credibility and authority. Video Calls for Business The world has changed. Now is the time to ensure your business is changing too. Many in-person meetings, conferences, networking events and clients hosting are, for now, a thing of the past. These face-to-face interactions have been replaced by video calls, webinars and online events. So, how do you develop contacts, maintain relationships and manage your team in this new virtual world? How do you look and sound confident, be heard, and build trust and credibility through a computer screen? At CoComms, we are online communications experts and our years of experience in broadcasting mean we understand how to engage a virtual audience. Interactive and practical training We work with you through a variety of scenarios to analyse your performance on video calls. Feedback on your performance We offer supportive, positive feedback and share our tried and tested techniques so you can improve. Make Video Calls work for you Through our training you will become more confident, more productive and more dynamic on video calls. Contact us If you have a query regarding any of our services or would like to book a consultation for free initial advice and guidance please get in touch

Communicate with Confidence
Delivered in Birmingham or UK Wide or OnlineFlexible Dates
Price on Enquiry

Certified Cloud Security Professional (CCSP)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The CCSP is ideal for IT and information security leaders responsible for applying best practices to cloud security architecture, design, operations and service orchestration. Overview Upon completing this course, the participants will gain valuable knowledge and skills including the ability to: - Successfully pass the CCSP exam. - Understand the fundamentals of the cloud computing architecture framework. - Understand security challenges associated with different types of cloud services. - Identify and evaluate security risks for their organization?s cloud environments. - Select and implement appropriate controls to ensure secure implementation of cloud services. - Thoroughly understand the 6 essential core domains of the CCSP common body of knowledge: 1. Architectural Concepts & Design Requirements 2. Cloud Data Security 3. Cloud Platform & Infrastructure Security 4. Cloud Application Security 5. Operations 6. Legal & Compliance The goal of the course is to prepare professionals for the challenging CCSP exam by covering the objectives of the exam based on the six domains as defined in the (ISC)2 CCSP common body of knowledge. 1 - Architectural Concepts and Design Requirements Cloud Computing Concepts Cloud Reference Architecture Cloud Computing Security Concepts Design Principles of Secure Cloud Computing Trusted Cloud Services 2 - Cloud Data Security CSA (Cloud Security Alliance) Cloud Data Lifecycle Cloud Data Storage Architectures Data Security Strategies Data Discovery and Classification Technologies Protecting Privacy and PII (Personally Identifiable Information) Data Rights Management Data Retention, Deletion, and Archiving Policies Auditability, Traceability, and Accountability of Data Events 3 - Cloud Platform and Infrastructure Security Cloud Infrastructure Components Cloud Infrastructure Risks Designing and Planning Security Controls Disaster Recovery and Business Continuity Management 4 - Cloud Application Security The Need for Security Awareness and Training in application Security Cloud Software Assurance and Validation Verified Secure Software SDLC (Software Development Life Cycle) Process Secure SDLC Specifics of Cloud Application Architecture Secure IAM (Identity and Access Management) Solutions 5 - Operations Planning Process for the Data Center Design Installation and Configuration of Physical Infrastructure for Cloud Environment Running Physical Infrastructure for Cloud Environment Managing Physical Infrastructure for Cloud Environment Installation and Configuration of Logical Infrastructure for Cloud Environment Running Logical Infrastructure for Cloud Environment Managing Logical Infrastructure for Cloud Environment Compliance with Regulations and Controls Risk Assessment for Logical and Physical Infrastructure Collection, Acquisition, and Preservation of Digital Evidence Managing Communication with Stakeholders 6 - Legal and Compliance Legal Requirements and Unique Risks within the Cloud Environment Relevant Privacy and PII Laws and Regulations Audit Process, Methodologies, and Required Adaptions for a Cloud Environment Implications of Cloud to Enterprise Risk Management Outsourcing and Cloud Contract Design Vendor Management

Certified Cloud Security Professional (CCSP)
Delivered OnlineFlexible Dates
£4,549

Complete COBOL programming

5.0(3)

By Systems & Network Training

COBOL training course description A hands on training course providing an introduction to COBOL. What will you learn Write COBOL programs Debug COBOL programs Examine existing code and determine its function. COBOL training course details Who will benefit: Programmers working with COBOL. Prerequisites: None although experience in another high level language would be useful. A 10 day version of this course would be more applicable for those new to programming. Duration 5 days COBOL training course contents Introduction to COBOL Compilation, linkage editor. Compile errors, compiler options. Divisions, syntax and format, COBOL character set, program structure. COBOL statement structure COBOL words, format of statements. Divisions Identification entries, Environment entries, Data division: FD, record descriptions, hierarchy and level numbers, description-string entry. File and Working-Storage Sections Literals, figurative constants, redefines clause, data representation, Usage clause, synchronization, sign clause. Procedure Division File status codes; Open, Read, Write, Close, Stop, Goback; Accept, display; Move, Justified, data name qualification, reference modification. Perform statement Out-of-line, With test ... Until, ... Times, in-line statement; Go to statement. Program design Design techniques, design considerations, procedure names, program structure. Printing Printed output, Write, advancing option, editing characters; Initialize. Condition testing Conditional statements: IF, class, sign and relation conditions, condition-name conditionals, Set, compound conditions, logical operators. Evaluate, Continue. Arithmetic Rounded option, On Size Error option, Add, Subtract, Multiply, Divide, Compute. Non-sequential files File access modes, Select. Indexed and relative files. Open, Close, creating / reading sequential access files, Write, Read, Invalid key clause, reading, writing / updating Random access files, Rewrite, Delete, Start. Declarative routines Clauses. Subroutines Call, Using clause - calling program/called program, Linkage Section, returning control. Table handling Subscripted tables: One/two/three dimensional tables, Perform, variable length tables. Indexed tables: Set, using an index; Search. Copy code: Copy, Suppress, Replacing. Data Manipulation Inspect, String, Unstring. COBOL/370 LE/370 and Intrinsic Functions.

Complete COBOL programming
Delivered in Internationally or OnlineFlexible Dates
£4,997

Advanced Junos Security

5.0(3)

By Systems & Network Training

Advanced Junos Security training course description This course provides students with intermediate routing knowledge and configuration examples. The course includes an overview of protocol-independent routing features, load balancing and filter-based forwarding, OSPF, BGP, IP tunneling, and high availability (HA) features. Junos Intermediate Routing (JIR) is an intermediate-level course. What will you learn Demonstrate the understanding of integrated user firewall. Implement next generation Layer 2 security features. Implement virtual routing instances in a security setting. Utilize Junos tools for troubleshooting Junos security implementations. Implement IPS policy. Advanced Junos Security training course details Who will benefit: Individuals responsible for implementing, monitoring, and troubleshooting Junos security components. Prerequisites: Intro to the Junos Operating System Duration 5 days Advanced Junos Security training course contents Junos Layer 2 Packet Handling and Security Features Transparent Mode Security Secure Wire Layer 2 Next Generation Ethernet Switching MACsec Lab 2 Implementing Layer 2 Security Virtualization Virtualization Overview Routing Instances Logical Systems Lab 3 Implementing Junos Virtual Routing AppSecure Theory AppSecure Overview AppID Overview AppID Techniques Application System Cache Custom Application Signatures AppSecure Implementation AppTrack AppFW AppQoS APBR SSL Proxy Lab 4 Implementing AppSecure Working with Log Director Log Director Overview Log Director Components Installing and setting up Log Director Clustering with the Log Concentrator VM Administrating Log Director Lab 5 Deploying Log Director Sky ATP Theory Sky ATP Overview Monitoring Sky ATP Analysis and Detection of Malware Sky ATP Implementation Configuring Sky ATP Installing Sky ATP Analysis and detection of Malware Infected Host Case Study Lab 6 Instructor Led Sky ATP Demo Implementing UTM UTM Overview AntiSpam AntiVirus Content and Web Filtering Lab 7 Implementing UTM Introduction to IPS IPS Overview Network Asset Protection Intrusion Attack Methods Intrusion Prevention Systems IPS Inspection Walkthrough IPS Policy and Configuration SRX IPS Requirements IPS Operation Modes Basic IPS Policy Review IPS Rulebase Operations Lab 8 Implementing Basic IPS Policy SDSN SDSN Overview, Components & Configuration Policy Enforcer Troubleshooting SDSN Use Cases Lab 9 Implementing SDSN Enforcement, Monitoring, and Reporting User Role Firewall and Integrated User Firewall Overview User Role Firewall Implementation Monitoring User Role Firewall Integrated User Firewall Implementation Monitoring Integrated User Firewall Lab 10 Configure User Role Firewall and Integrated User Firewall Troubleshooting Junos Security Troubleshooting Methodology Troubleshooting Tools Identifying IPsec Issues Lab 11 Performing Security Troubleshooting Techniques Appendix A: SRX Series Hardware and Interfaces Branch SRX Platform Overview High End SRX Platform Overview SRX Traffic Flow and Distribution SRX Interfaces

Advanced Junos Security
Delivered in Internationally or OnlineFlexible Dates
£4,997

VMware Horizon: Deploy and Manage [V8.8]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Tier 1 Operators, administrators, and architects for VMware Horizon Overview By the end of the course, you should be able to meet the following objectives: Recognize the features and benefits of VMware Horizon Define a use case for your virtual desktop and application infrastructure Use vSphere to create VMs to be used as desktops for VMware Horizon Create and optimize Windows VMs to create VMware Horizon desktops Install and Configure Horizon Agent on a VMware Horizon desktop Configure, manage, and entitle desktop pools of full VMs Configure and manage the VMware Horizon Client systems and connect the client to a VMware Horizon desktop Configure, manage, and entitle pools of instant-clone desktops Create and use Remote Desktop Services (RDS) desktops and application pools Monitor the VMware Horizon environment using the VMware Horizon Console Dashboard and Horizon Help Desk Tool Identify VMware Horizon Connection Server installation, architecture, and requirements Describe the authentication and certificate options for the VMware Horizon environment Recognize the integration process and benefits of Workspace ONE Access™ and Horizon 8 Compare the remote display protocols that are available in VMware Horizon Describe the 3D rendering options available in Horizon 8 Discuss scalability options available in Horizon 8 Describe different security options for the Horizon environment This five-day course gives you the hands-on skills to deliver virtual desktops and applications through a single virtual desktop infrastructure platform. You build on your skills in configuring and managing VMware Horizon© 8 through a combination of lecture and hands-on labs. You learn how to configure and deploy pools of virtual machines and how to provide a customized desktop environment to end-users. Additionally, you learn how to install and configure a virtual desktop infrastructure platform. You learn how to install and configure VMware Horizon© Connection Server?, VMware Unified Access Gateway?, how to configure a load balancer for use with Horizon, and how to establish Cloud Pod Architecture. Course Introduction Introductions and course logistics Course objectives Introduction to VMware Horizon Recognize the features and benefits of Horizon Describe the conceptual and logical architecture of Horizon Introduction to Use Case Convert customer requirements to use-case attributes Define a use case for your virtual desktop and application infrastructure vSphere for VMware Horizon Explain basic virtualization concepts Use VMware vSphere© Client? to access your VMware vCenter System and VMware ESXi? hosts Create a Windows virtual machine using vSphere Create Windows Desktops Outline the steps to install Horizon Agent on Windows virtual machines Install Horizon Agent on a Windows virtual Machine Optimize and prepare Windows virtual machines to set up Horizon desktop VMs Create Linux Desktops Create a Linux VM for Horizon Install Horizon Agent on a Linux virtual machine Optimize and prepare Linux virtual machines to set up Horizon desktop VMs Creating and Managing Desktop Pools Identify the steps to set up a template for desktop pool deployment List the steps to add desktops to the VMware Horizon© Connection Server? inventory Compare dedicated-assignment and floating-assignment pools Outline the steps to create an automated pool Define user entitlement Explain the hierarchy of global, pool-level, and user-level policies VMware Horizon Client Options Describe the different clients and their benefits Access the Horizon desktop using various Horizon clients and HTML Configure integrated printing, USB redirection, and the shared folders option Configure session collaboration and media optimization for Microsoft Teams Creating and Managing Instant-Clone Desktop Pools List the advantages of instant clones Explain the provisioning technology used for instant clone desktop pools Set up an automated pool of instant clones Push updated images to instant clone desktop pools Creating RDS Desktop and Application Pools Explain the difference between an RDS desktop pool and an automated pool Compare and contrast an RDS session host pool, a farm, and an application pool Create an RDS desktop pool and an application pool Access RDS desktops and application from Horizon Client Use the instant clone technology to automate the build-out of Remote Desktop Session Host farms Configure load-balancing for RDSHs on a farm Monitoring VMware Horizon Monitor the status of the Horizon components using the Horizon Administrator console dashboard Monitor desktop sessions using the HelpDesk tool Monitor the performance of the remote desktop using the Horizon Performance Tracker Horizon Connection Server Recognize the VMware Horizon reference architecture Identify the Horizon Connection Server supported features Identify the recommended system requirements for Horizon Connection Server Configure the Horizon event database Outline the steps for the initial configuration of Horizon Connection Server Discuss the AD LDS database as a critical {an important component?} component of the Horizon Connection Server installation Horizon Protocols Compare the remote display protocols that are available in VMware Horizon Describe the BLAST Display Protocol Codecs Summarize the BLAST Codec options List the ideal applications for each BLAST codec Describe the BLAST and PCoIP ADMX GPO common configurations Graphics in Horizon Describe the 3D rendering options available in Horizon 8 Compare vSGA and vDGA List the steps to configure graphics cards for use in a Horizon environment Securing Connections: Network Compare tunnels and direct connections for client access to desktops Discuss the benefits of using Unified Access Gateway List the Unified Access Gateway firewall rules Configure TLS certificates in Horizon Securing Connections: Authentication Compare the authentication options that Horizon Connection Server supports Restrict access to the Horizon remote desktops using restricted entitlements Describe the smart card authentication methods that Horizon Connection Server supports Explain the purpose of permissions, roles, and privileges in VMware Horizon Create custom roles Horizon Scalability Describe the purpose of a replica connection server Explain how multiple Horizon Connection Server instances in a pod maintain synchronization List the steps to configure graphics cards for use in a Horizon environment Configure a load balancer for use in a Horizon environment Explain Horizon Cloud Pod Architecture LDAP replication. Explain Horizon Cloud Pod Architecture scalability options Horizon Cloud and Universal Broker Recognize the features and benefits of Horizon Cloud Service Use Universal broker to connect to a Horizon Cloud instance Configure and pair the Horizon Cloud Connector appliance with Horizon Connection Server Workspace ONE Access and Virtual Application Management Recognize the features and benefits of Workspace ONE Access Explain identity management in Workspace ONE Access Explain access management in Workspace ONE Access Describe the requirements to install and configure True SSO in a Horizon environment Describe the Workspace ONE Access directory integration Deploy virtual applications with Workspace services Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Horizon: Deploy and Manage [V8.8] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Horizon: Deploy and Manage [V8.8] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware Horizon: Deploy and Manage [V8.8]
Delivered OnlineFlexible Dates
£4,250