• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

283 MySQL courses in Edinburgh delivered Online

Computer Programmer QLS Endorsed Courses

By Imperial Academy

Computer Programming: Where Inspiration Meets Logic And Dreams Become Lines Of Code

Computer Programmer QLS Endorsed Courses
Delivered Online On Demand
£599

Effective LinkedIn Ads Online Course

By Course Cloud

Course Overview Master MySQL by learning all the web development skills for creating complex, high-quality web databases.   The Effective LinkedIn Ads Online Course course covers the complete fundamentals of MySQL for relational database management, e-commerce and logging applications. It is designed to equip learners with in-demand industry skills, taking them through the basics such as installation, for those who are new to the field.    This practical training course will explore all the core features of MySQL, as well as best practices for cross platform development, taught by an experienced professional in the field. If you are looking to establish a career in programming or computer science, then this in-depth training will ensure you gain a competitive edge in the job market. This best selling Effective LinkedIn Ads Online Course has been developed by industry professionals and has already been completed by hundreds of satisfied students. This in-depth Effective LinkedIn Ads Online Course is suitable for anyone who wants to build their professional skill set and improve their expert knowledge. The Effective LinkedIn Ads Online Course is CPD-accredited, so you can be confident you're completing a quality training course will boost your CV and enhance your career potential. The Effective LinkedIn Ads Online Course is made up of several information-packed modules which break down each topic into bite-sized chunks to ensure you understand and retain everything you learn. After successfully completing the Effective LinkedIn Ads Online Course, you will be awarded a certificate of completion as proof of your new skills. If you are looking to pursue a new career and want to build your professional skills to excel in your chosen field, the certificate of completion from the Effective LinkedIn Ads Online Course will help you stand out from the crowd. You can also validate your certification on our website. We know that you are busy and that time is precious, so we have designed the Effective LinkedIn Ads Online Course to be completed at your own pace, whether that's part-time or full-time. Get full course access upon registration and access the course materials from anywhere in the world, at any time, from any internet-enabled device.  Our experienced tutors are here to support you through the entire learning process and answer any queries you may have via email.

Effective LinkedIn Ads Online Course
Delivered Online On Demand
£319

Hands-on Linux - Self-Hosted WordPress for Linux Beginners

By Packt

Master the art of self-hosting WordPress on Linux with our comprehensive video course, designed to empower technical professionals to fully control their web presence.

Hands-on Linux - Self-Hosted WordPress for Linux Beginners
Delivered Online On Demand8 hours 32 minutes
£74.99

SQL Server Course for Beginners with 100+ examples

By Packt

Welcome to this beginner's level course on Microsoft SQL Servers. Understand the concepts of SQL and learn to create a new database and table to perform various operations on it, with live running queries as examples. Work on hands-on exercises and understand database concepts in a real-world scenario.

SQL Server Course for Beginners with 100+ examples
Delivered Online On Demand1 hour 58 minutes
£41.99

The Complete Practical Docker Guide

By Packt

Understand how Docker works and learn its core features with this hands-on course. This is 90% practice without any useless demos! Learn how to create different containers such as Node.js, Python, WordPress, MongoDB, MySQL, Redis, Elasticsearch, and much more.

The Complete Practical Docker Guide
Delivered Online On Demand18 hours 29 minutes
£37.99

Master Big Data Ingestion and Analytics with Flume, Sqoop, Hive and Spark

By Packt

A complete course on Sqoop, Flume, and Hive: Ideal for achieving CCA175 and Hortonworks Spark Certification

Master Big Data Ingestion and Analytics with Flume, Sqoop, Hive and Spark
Delivered Online On Demand5 hours 38 minutes
£70.99

Business and Data Analysis with SQL

By iStudy UK

Business and Data Analysis with SQL is a comprehensive training in the theoretical and practical study of Data analysis and SQ language. This module is open to the people who want to elevate their business growth. Secure your position as an asset to the organization by learning SQL. Make your professional skill more productive by learning data analysis and SQL communication. The course exposes to you the details on computational and data investigational methods. It also highlights the basics of extracting data from the database storage. On completion of this online course, you will have an extensive understanding of how the database works and ways to function them properly, and thus be able to make critical decisions like a professional. What you'll learn At the end of this course, you will have the ability to run your own data projects, work with databases and manage large datasets and provide meaningful business intelligence reports to your team. Requirements Be familiar with reports and data-based projects. Who this course is for: This course is aimed at business professionals who work with data of all sizes. You will learn the fundamentals of business intelligence and basic data warehouse development. Introduction Business and Data Analysis with SQL FREE 00:06:00 Database and Datawarehouse Design Introduction to Databases- A History 00:04:00 SQL Statement Categories 00:02:00 Capture data requirements 00:09:00 Physical Vs Logical Data Representations 00:03:00 Normalise data 00:07:00 Fact Tables 00:04:00 Aggregate data 00:07:00 Entity Relationship Diagrams (ERD's) 00:07:00 Extract, Transform and Load (ETL) 00:13:00 Structured Query Language (SQL) - Fundamentals MySQL Server Setup 00:05:00 MySQL Server Start and stop Service 00:02:00 Connect to database 00:07:00 Comments in SQL 00:05:00 Select data from a table 00:16:00 Table Indexes 00:08:00 Table and Column Aliases 00:05:00 Inner Join Tables 00:02:00 Left and Right Outer Table Joins 00:04:00 Union (all) Results 00:04:00 Project Management Project Management (Agile Methodology) 00:11:00 Kanban boards 00:09:00 Prioritise Requirements using MoSCoW 00:04:00 Sales Project Sales Project - Introduction 00:05:00 Create and Drop Database 00:05:00 Query Workflow 00:09:00 Sales Project - Part 1 - Data Capture 00:15:00 Sales Project - Part 2 - Data Analysis 00:08:00 Sales Project - Part 3 - Data Summary 00:12:00 Sales Project - Part 4 - Send to production 00:09:00 MySQL Query Explain Plan 00:07:00 Common Table Expressions (WITH) 00:14:00 Data Control Language (DCL) User Administration 00:13:00 MySQL Programs MySQL Set Windows Environment Variable 00:05:00 MySQL Command Line 00:17:00 Visualising Data Export results to Excel 00:06:00 Setup MySQL ODBC (Open Database Connector) 00:11:00 Creating a report in Microsoft Excel 00:21:00 Course Certification

Business and Data Analysis with SQL
Delivered Online On Demand5 hours 1 minutes
£25

DP-070T00 Migrate Open Source Data Workloads to Azure

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for The primary audience for this course is database developers who plan to migrate their MySQL or Postgres DB workloads to Azure SQL DB. The secondary audience for this course is MySQL/Postgres administrators to raise awareness of the features and benefits of Azure SQL DB. Overview At the end of this course, the students will have learned: Migrate on-premises MySQL to Azure SQL DB for MySQL Migrate on-premises PostgreSQL to Azure SQL DB for PostgreSQL This course will enable the students to understand Azure SQL Database, and educate the students on what is required to migrate MySQL and PostgreSQL workloads to Azure SQL Database. Migrate to Azure SQL DB for MySQL & PostgreSQL OSS databases overview Common OSS database workloads Customer challenges in migration Migrate on-premises MySQL to Azure SQL DB for MySQL Configure and Manage Azure SQL DB for MySQL Migrate on-premises MySQL to SQL DB for MySQL Application Migration Post-migration considerations Migrate on-premises PostgreSQL to Azure SQL DB for PostgreSQL Configure and Manage Azure SQL DB for PostgreSQL Migrate on-premises MySQL to SQL DB for PostgreSQL Application Migration Post-migration considerations

DP-070T00 Migrate Open Source Data Workloads to Azure
Delivered OnlineFlexible Dates
Price on Enquiry

EC-Council Computer Hacking Forensic Investigator (CHFI) v10.0

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The CHFI course will benefit: Police and other laws enforcement personnel Defense and Military personnel e-Business Security professionals Systems administrators Legal professionals Banking, Insurance and other professionals Government agencies Overview At the end of this course, you will possess the skills needed to: Understand the fundamentals of computer forensics Understand the computer forensic investigation process Describe in detail different types of hard disks and file systems Understand data acquisition and duplication Counteract anti-forensic techniques Leverage forensic skills in Windows, Linux, and Mac Investigate web attacks Understand dark web forensics Deploy forensic techniques for databases, cloud, and networks Investigate email crimes including malware Perform forensics in mobile and IoT environments Every crime leaves a digital footprint, and you need the skills to track those footprints. In this course, students will learn to unravel these pieces of evidence, decode them and report them. From decoding a hack to taking legal action against the perpetrators, they will become an active respondent in times of cyber-breaches. Computer Forensics in Today?s World 1.1. Understand the Fundamentals of Computer Forensics 1.2. Understand Cybercrimes and their Investigation Procedures 1.3. Understand Digital Evidence 1.4. Understand Forensic Readiness, Incident Response and the Role of SOC (Security Operations Center) in Computer Forensics 1.5. Identify the Roles and Responsibilities of a Forensic Investigator 1.6. Understand the Challenges Faced in Investigating Cybercrimes 1.7. Understand Legal Compliance in Computer Forensics Computer Forensics Investigation Process 2.1. Understand the Forensic Investigation Process and its Importance 2.2. Understand the Pre-investigation Phase 2.3. Understand First Response 2.4. Understand the Investigation Phase 2.5. Understand the Post-investigation Phase Understanding Hard Disks and File Systems 3.1. Describe Different Types of Disk Drives and their Characteristics 3.2. Explain the Logical Structure of a Disk 3.3. Understand Booting Process of Windows, Linux and Mac Operating Systems 3.4. Understand Various File Systems of Windows, Linux and Mac Operating Systems 3.5. Examine File System Using Autopsy and The Sleuth Kit Tools 3.6 Understand Storage Systems 3.7. Understand Encoding Standards and Hex Editors 3.8. Analyze Popular File Formats Using Hex Editor Data Acquisition and Duplication 4.1. Understand Data Acquisition Fundamentals 4.2. Understand Data Acquisition Methodology 4.3. Prepare an Image File for Examination Defeating Anti-forensics Techniques 5.1. Understand Anti-forensics Techniques 5.2. Discuss Data Deletion and Recycle Bin Forensics 5.3. Illustrate File Carving Techniques and Ways to Recover Evidence from Deleted Partitions 5.4. Explore Password Cracking/Bypassing Techniques 5.5. Detect Steganography, Hidden Data in File System Structures, Trail Obfuscation, and File Extension Mismatch 5.6. Understand Techniques of Artifact Wiping, Overwritten Data/Metadata Detection, and Encryption 5.7. Detect Program Packers and Footprint Minimizing Techniques 5.8. Understand Anti-forensics Countermeasures Windows Forensics 6.1. Collect Volatile and Non-volatile Information 6.2. Perform Windows Memory and Registry Analysis 6.3. Examine the Cache, Cookie and History Recorded in Web Browsers 6.4. Examine Windows Files and Metadata 6.5. Understand ShellBags, LNK Files, and Jump Lists 6.6. Understand Text-based Logs and Windows Event Logs Linux and Mac Forensics 7.1. Understand Volatile and Non-volatile Data in Linux 7.2. Analyze Filesystem Images Using The Sleuth Kit 7.3. Demonstrate Memory Forensics Using Volatility & PhotoRec 7.4. Understand Mac Forensics Network Forensics 8.1. Understand Network Forensics 8.2. Explain Logging Fundamentals and Network Forensic Readiness 8.3. Summarize Event Correlation Concepts 8.4. Identify Indicators of Compromise (IoCs) from Network Logs 8.5. Investigate Network Traffic 8.6. Perform Incident Detection and Examination with SIEM Tools 8.7. Monitor and Detect Wireless Network Attacks Investigating Web Attacks 9.1. Understand Web Application Forensics 9.2. Understand Internet Information Services (IIS) Logs 9.3. Understand Apache Web Server Logs 9.4. Understand the Functionality of Intrusion Detection System (IDS) 9.5. Understand the Functionality of Web Application Firewall (WAF) 9.6. Investigate Web Attacks on Windows-based Servers 9.7. Detect and Investigate Various Attacks on Web Applications Dark Web Forensics 10.1. Understand the Dark Web 10.2. Determine How to Identify the Traces of Tor Browser during Investigation 10.3. Perform Tor Browser Forensics Database Forensics 11.1. Understand Database Forensics and its Importance 11.2. Determine Data Storage and Database Evidence Repositories in MSSQL Server 11.3. Collect Evidence Files on MSSQL Server 11.4. Perform MSSQL Forensics 11.5. Understand Internal Architecture of MySQL and Structure of Data Directory 11.6. Understand Information Schema and List MySQL Utilities for Performing Forensic Analysis 11.7. Perform MySQL Forensics on WordPress Web Application Database Cloud Forensics 12.1. Understand the Basic Cloud Computing Concepts 12.2. Understand Cloud Forensics 12.3. Understand the Fundamentals of Amazon Web Services (AWS) 12.4. Determine How to Investigate Security Incidents in AWS 12.5. Understand the Fundamentals of Microsoft Azure 12.6. Determine How to Investigate Security Incidents in Azure 12.7. Understand Forensic Methodologies for Containers and Microservices Investigating Email Crimes 13.1. Understand Email Basics 13.2. Understand Email Crime Investigation and its Steps 13.3. U.S. Laws Against Email Crime Malware Forensics 14.1. Define Malware and Identify the Common Techniques Attackers Use to Spread Malware 14.2. Understand Malware Forensics Fundamentals and Recognize Types of Malware Analysis 14.3. Understand and Perform Static Analysis of Malware 14.4. Analyze Suspicious Word and PDF Documents 14.5. Understand Dynamic Malware Analysis Fundamentals and Approaches 14.6. Analyze Malware Behavior on System Properties in Real-time 14.7. Analyze Malware Behavior on Network in Real-time 14.8. Describe Fileless Malware Attacks and How they Happen 14.9. Perform Fileless Malware Analysis - Emotet Mobile Forensics 15.1. Understand the Importance of Mobile Device Forensics 15.2. Illustrate Architectural Layers and Boot Processes of Android and iOS Devices 15.3. Explain the Steps Involved in Mobile Forensics Process 15.4. Investigate Cellular Network Data 15.5. Understand SIM File System and its Data Acquisition Method 15.6. Illustrate Phone Locks and Discuss Rooting of Android and Jailbreaking of iOS Devices 15.7. Perform Logical Acquisition on Android and iOS Devices 15.8. Perform Physical Acquisition on Android and iOS Devices 15.9. Discuss Mobile Forensics Challenges and Prepare Investigation Report IoT Forensics 16.1. Understand IoT and IoT Security Problems 16.2. Recognize Different Types of IoT Threats 16.3. Understand IoT Forensics 16.4. Perform Forensics on IoT Devices

EC-Council Computer Hacking Forensic Investigator (CHFI) v10.0
Delivered OnlineFlexible Dates
£3,495

Data Analysis for Data Analyst

By NextGen Learning

Have you ever wondered how data speaks its complex language? Are you curious to unlock the code and understand its intricate dialects? Welcome to our course - Data Analysis for Data Analyst - a comprehensive theoretical exploration of data and its manifold intricacies. In this Data Analysis for Data Analyst course bundle, we will journey together through a diverse range of theories and concepts, from the fundamentals of data analysis to business data interpretations, MySQL database management, GDPR UK regulations, and Excel data analysis. All without touching a single tool! This expedition will empower you to comprehend data's multifaceted universe and the essential role it plays in various sectors. With us, data is not just numbers or facts but a powerful storyteller, a strategic guide, and a rulemaker. We offer you the keys to understanding this universal language, revealing how it shapes businesses, influences decisions, and regulates processes. Join us on this enlightening path as we explore the vast, intricate world of data. Are you ready to become fluent in the language of data? The seven CPD Accredited courses are: Course 01: Basic Data Analysis Course 02: Business Data Analysis Course 03: Learn MySQL from Scratch for Data Science and Analytics Course 04: Diploma in Data Analytics with Tableau Course 05: GDPR UK Training Course 06: Google Data Studio: Data Analytics Course 07: Excel Data Analysis Learning Outcomes Grasp the foundations of data analysis Understand the application of data in a business context Gain deep knowledge about MySQL for data analysis Acquire a working knowledge of GDPR in the UK Enhance your data interpretation skills through Excel Embrace a holistic understanding of the data landscape. Diploma in Data Analysis Fundamentals: Learn to unravel the layers of data and extract meaningful insights. Business Data Analysis: Decode the relationship between data and business strategies. Learn MySQL from Scratch for Data Science and Analytics: Delve deep into the database management system MySQL, its structure, and usage in data analytics. GDPR UK Training: Understand data protection regulations in the UK context. Excel Data Analysis: Uncover how Excel is more than just a spreadsheet application for data analysis. Theoretical Approach: Our course provides a theoretical exploration of data analytics, allowing you to understand data beyond its application. Comprehensive Bundle: This well-rounded course offers a unified approach to understanding data in diverse fields. So, are you ready to unlock the language of data? Embark on this journey today! CPD 50 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Aspiring data analysts keen on understanding data theories. Professionals looking to delve deeper into data analysis. Business enthusiasts wanting to understand the influence of data on decision making. IT professionals seeking knowledge about data protection in the UK. Career path Data Analyst - £30K to £45K/year Business Analyst - £35K to £55K/year Data Science Specialist - £50K to £70K/year GDPR Compliance Officer - £35K to £55K/year Excel Analyst - £28K to £42K/year Database Administrator (MySQL focus) - £40K to £60K/year. Certificates Certificate Of Completion Digital certificate - Included Certificate Of Completion Hard copy certificate - Included You will get a complimentary Hard Copy Certificate.

Data Analysis for Data Analyst
Delivered Online On Demand23 hours
£41
1...45678...29