Duration 5 Days 30 CPD hours This course is intended for Experienced system administrators, system engineers, and system integrators Overview By the end of the course, you should be able to meet the following objectives: Configure and manage vSphere networking and storage for a large and sophisticated enterprise Use VMware vSphere Client⢠to manage certificates Use Identity Federation to configure VMware vCenter Server to use external identity sources Use VMware vSphere Trust Authority⢠to secure the infrastructure for encrypted VMs Use host profiles to manage VMware ESXi⢠host compliance Create and manage a content library for deploying virtual machines Manage VM resource usage with resource pools Monitor and analyze key performance indicators for compute, storage, and networking resources for ESXi hosts Optimize the performance in the vSphere environment, including vCenter Server This five-day course teaches you advanced skills for configuring and maintaining a highly available and scalable virtual infrastructure. Through a mix of lecture and hands-on labs, you configure and optimize the VMware vSphere© 7 features that build a foundation for a truly scalable infrastructure, and you discuss when and where these features have the greatest effect. Attend this course to deepen your understanding of vSphere and learn how its advanced features and controls can benefit your organization. As an exclusive benefit, those who participate in this course will receive additional premium recorded lecture material on vSphere security. Course Introduction Introductions and course logistics Course objectives Network Scalability Configure and manage vSphere distributed switches Describe how VMware vSphere© Network I/O Control enhances performance Explain distributed switch features such as port mirroring and NetFlow Storage Scalability Explain why VMware vSphere© VMFS is a high-performance, scalable file system Explain VMware vSphere© Storage APIs - Array Integration, VMware vSphere© API for Storage Awareness?, and vSphere APIs for I/O filtering Configure and assign virtual machine storage policies Create VMware vSAN? storage policies Recognize components of the VMware vSphere© Virtual Volumes? architecture Configure VMware vSphere© Storage DRS? and VMware vSphere© Storage I/O Control Host and Management Scalability Use the vSphere Client to manage vSphere certificates Describe identity federation and recognize its use cases Configure identity federation to allow vCenter Server to use external identity provider Describe the benefits and use cases of vSphere Trust Authority Configure vSphere Trust Authority Use host profiles to manage ESXi configuration compliance Create a local content library and subscribe to a published content library Deploy VMs from a content library Create and manage resource pools in a cluster Describe how scalable shares work CPU Optimization Explain the CPU scheduler operation and other features that affect CPU performance Explain NUMA and vNUMA support Use esxtop to monitor key CPU performance metrics Memory Optimization Explain ballooning, memory compression, transparent page sharing, and host-swapping techniques for memory reclamation when memory is overcommitted Use esxtop to monitor key memory performance metrics Storage Optimization Describe storage queue types and other factors that affect storage performance Discuss vSphere support for NVMe and iSER technologies Use esxtop to monitor key storage performance metrics Network Optimization Explain performance features of network adapters Explain the performance features of vSphere networking Use esxtop to monitor key network performance metrics vCenter Server Performance Optimization Describe the factors that influence vCenter Server performance Use VMware vCenter© Server Appliance? tools to monitor resource use Supplemental Content Appendix A: vSphere Auto Deploy Explain the purpose of VMware vSphere© ESXi ? Image Builder CLI Explain the purpose of VMware vSphere© Auto Deploy? Describe how an autodeployed ESXi host boots Configure a vSphere Auto Deploy environment Appendix B: vSphere Security Configure ESXi Host Access and Authentication Recognize strategies for securing vSphere components, such as vCenter Server, ESXi hosts, and virtual machines Describe vSphere support for security standards and protocols Describe virtual machine security features Describe the components of a VM encryption architecture Create, manage, and migrate encrypted VMs Encrypt core dumps List VM encryption events and alarms
Duration 4 Days 24 CPD hours This course is intended for System installersSystem integratorsSystem administratorsNetwork administratorsSolutions designers Overview After completing this course, you should be able to:Explain transactional service activation and how it relates to business requirementsExplain the benefits and uses of Cisco NSOExplain how Cisco NSO communicates with network devicesUnderstand the NETCONF protocol and be able to read and write simple YANG modelsInstall NSO and describe how NSO uses NETCONF and the Device Manager componentUnderstand the difference between devices that are fully NETCONF capable and those that are less or not NETCONF capableExplain the YANG service model structureDescribe how YANG is used with NSO, create and deploy a service, and explain NSO FASTMAPDesign and manage services with YANG modelsPerform NSO configuration and basic troubleshooting, and describe the following NSO features: integration options, alarms and reporting, scalability and performance options, and available function packsUse logs to troubleshoot the Cisco NSO deployment and check NSO communication with network devicesExplain the mapping logic of service parameters to device models and consequently to device configurationsDescribe the use of different integration options and APIsExplain the use of Reactive FASTMAP for manipulating and implementing advanced Network Functions Virtualization (NFV) componentsDescribe the use of feature components and function packsDefine and explain the European Telecommunications Standards Institute (ETSI) Open Source NFV Management and Orchestration (MANO) principles and solutionWork with the alarm console, and understand the NSO alarm structure and how it conforms to modern network operations procedures The Cisco NSO Essentials for Programmers and Network Architects (NSO201) course introduces you to Cisco© Network Services Orchestrator (NSO). You will learn to install Cisco NSO and use it to manage devices and create services based on YANG templates with XPath. This course provides a brief overview of NSO as a network automation solution, as well as an introduction to NETCONF, YANG, and XPath. You will learn about service packages, network element drivers, and Application Programming Interfaces (APIs). The course also covers service creation, device and configuration management, NSO maintenance, NSO options and integrations, and basic NSO troubleshooting. Introduction to Cisco NSO Meeting Challenges with Orchestration Challenges of Network Management Challenges of Network Orchestration NSO Features and Benefits That Meet Challenges Standardized Approach What Is NSO? Logical Architecture Components What Does NSO Do? Orchestration Use Cases How Does NSO Work? Introduction to NETCONF and YANG Packages Mapping Logic Network Element Drivers (NEDs) Resources and Training Resources Training Get Started with Cisco NSO Installing Cisco NSO Setup Overview Cisco NSO Local Installation Installing NEDs Using NetSim NETCONF Overview Challenges of Network Management Introduction to NETCONF NETCONF Operation Device Manager Device Manager Overview Device Configuration Management Device Connection Management Templates and Groups Other Device Management Tools Service Manager Essentials YANG Overview Introduction to YANG Other Representations of YANG Data Types XPath Overview Basic YANG Statements Can You Spot the Error? Using Services Package Architecture Creating a Service Package Sample Service Configuration Service Template YANG Service Model Deploying a Service Model-to-Model Mapping Mapping Introduction Mapping Logic FASTMAP Template Processing Service Design and Cisco NSO Programmability Service Design Service Design Overview Top-Down Approach Bottom-Up Approach Device Configuration Service Model Service Management Service Management Tasks Service Lifecycle Management Guidelines NSO Programmability Introduction NSO Programmability Overview Python Service Skeleton Creating a Service YANG Model Creating a Service Template Template Processing with Python Cisco NSO Flexibility System Configuration and Troubleshooting System Configuration System Troubleshooting Integration Integration Options NETCONF Server Web Integration SNMP Agent Alarm Management and Reporting Alarm Management Reporting Scalability and Performance High Availability High-Availability Cluster Communications Clustering Layered Service Architecture Addressing Performance Limitations Components and Function Packs Function Packs NFV Orchestration Reactive FASTMAP
Duration 5 Days 30 CPD hours This course is intended for In order to be successful in this class, incoming attendees are required to have current, hands-on experience in developing basic web applications, and be versed in HTML5, CSS3 and JavaScript. This is an intermediate level web development class, designed for experienced web developers, new to Angular, that need to further extend their skills in modern web development. Overview At the end of this five-day course, students will have an application up and running that incorporates components, directives, custom pipes, reactive forms, routes, services, unit testing, and the REST API. They will add authentication, implement the Material library, and learn how to maintain state with NgRX. They will then take a deeper dive including making their own custom directives, lazy loading modules, and E2E testing. They will learn how to enhance their application with animations and create their own Angular library. Working within in an engaging, hands-on learning environment, guided by our expert team, attendees will learn explore: What Angular is and why should you use it How Angular reduces the amount of code that you must write to add rich functionality to both existing and new web pages What TypeScript is, why it is useful, and how to use it with Angular How to facilitate development and deployment using Angular CLI How to work with the various aspects of the Angular architecture to implement clean, responsive web interfaces How Routers can support navigation within a Single Page Application What the best practices are for using Angular so that it works unobtrusively and performs well How to use Angular with HTTP to support JSON, REST, and other services Working with the Ahead of Time compiler including its impact of developers and the development process How to defend against DOM-based XSS How to manage routing decisions based on pre-defined criteria such as a successful authentication How to meet huge data requirements by processing asynchronous data streams with RxJS Simplify server-side rendering How to facilitate unit testing Enhance an Angular user interface with animations and other advanced features Optimize Angular applications with various tools and techniques Maintain state within an Angular application What Angular 9 brings to the table and its relationship to Angular 8 Mastering Angular is a five-day, hands-on course that thoroughly explores the latest Angular features and advances, demonstrating how to solve the traditional challenges of JavaScript web application development. Throughout the course students will build custom components using application routes, form validation, and unit-testing. The course starts with an introduction of Angular CLI and TypeScript, and then delves into component-driven development with Angular components, covering data-binding, directives, services, routing, HTTP, the RxJS library, forms unit testing, and REST. Students will also learn how to add authentication, use the Material library, learn the NgRX design pattern to implement the NgRX store, make custom directives, enhance their application with animations, write an E2E test, and increase their application's efficiency by lazy loading modules and creating their own Angular library Angular Overview Overview of Angular Architecture Getting Started with Angular Getting Started with TypeScript Bootstrapping with Angular CLI Angular Project Structure Working with Angular Components and Events Third Party Libraries Dynamic Views Pipes Angular Forms Forms and the Forms API Single Page Applications and Routes Single Page Applications Services and Dependency Injection Modules Using RESTful Services Overview of REST Angular and REST Angular Best Practices Angular Style Guide What is New in Angular 9 Reactive Programming in Angular Working with RxJS Security and Authentication DomSanitizer JSON Web Tokens Route Guards Enhancing the Angular App Angular Animations Angular Material Angular Elements Deep Dive into Angular Testing and Angular Deep Dive into Components and Directives Deep Dive into Services and Dependency Injection Optimizing for the Enterprise Lazy Loading Optimizing with Universal Creating Your Own Angular Library Maintain State with NgRX NgRX Store Lesson: ES6+ Sass and SCSS for Angular and Material
Duration 2 Days 12 CPD hours This course is intended for Data Protection Officers Data Protection Managers Auditors Legal Compliance Officers Security Manager Information Managers Anyone involved with data protection processes and programs Overview It will show the world that students know privacy laws and regulations and how to apply them, and that students know how to secure your place in the information economy. When students earn a CIPP credential, it means they've gained a foundational understanding of broad global concepts of privacy and data protection law and practice, including: jurisdictional laws, regulations and enforcement models; essential privacy concepts and principals; legal requirements for handling and transferring data and more. The Certified Information Privacy Professional/United States (CIPP/US) program, developed by the International Association of Privacy Professionals (IAPP) - the world?s largest comprehensive global information privacy community and resource, was the first professional certification ever to be offered in information privacy. The CIPP/US credential demonstrates a strong foundation in U.S. privacy laws and regulations and understanding of the legal requirements for the responsible transfer of sensitive personal data to/from the U.S., the EU and other jurisdictions.This course will provide you with a foundational understanding of broad global concepts of privacy and data protection law and practice, including: jurisdictional laws, regulations and enforcement models; essential privacy concepts and principals; legal requirements for handling and transferring data and more. Introduction to privacy Modern history of privacy Introduction to personal information Overview of data protection roles Summary of modern privacy frameworks Structure of U.S. law Structure and sources of U.S. law and relevant terms Governmental bodies having privacy and information security authority General Data Protection Regulation overview (GDPR) High-level overview of the GDPR Significance of the GDPR to U.S. organizations Roles and responsibilities outlined in the law California Consumer Privacy Act of 2018 (CCPA) High-level overview of the newly passed California Consumer Privacy Act of 2018 Scope Consumer rights Business obligations Enforcement Enforcement of U.S. privacy and security laws Distinguishing between criminal and civil liability Comparing federal and state authority Theories of legal liability Enforcement powers and responsibilities of government bodies, such as the FTC and state attorneys general Information management from a U.S. perspective Developing a privacy program Role of privacy professionals and accountability Employee training User preferences Managing vendors Data classification Federal versus state authority Differences between federal and state authority Preemption Healthcare Privacy laws in healthcare Major components of HIPAA Development of HITECH Privacy protections mandated by other significant healthcare laws Financial privacy Goals of financial privacy laws Key concepts of FCRA, FACTA and GLBA Red Flags Rule, Dodd-Frank and consumer protection laws Education Privacy rights and protections under FERPA Recent amendments provided by PPRA and NCLBA Telecommunications and marketing Rules and regulations of telecommunications entities Laws that govern marketing Addressing privacy in the digital advertising Law enforcement and privacy Privacy laws on intercepting communication Telecommunications industry and law enforcement Laws ensuring rights to financial privacy National security and privacy Rules and regulations on intercepting communication Evolution of the law Collaboration of government agencies and private companies to improve cybersecurity Civil litigation and privacy Privacy issues related to litigation Electronic discovery, redaction and protective orders U.S. discovery rules versus foreign laws Legal overview of workplace privacy Federal and state laws regulating and protecting employee privacy Federal laws prohibiting discrimination Privacy before, during and after employment Lifecycle of employee privacy Background screening Employee monitoring Investigating misconduct and termination Antidiscrimination laws ?Bring your own device? policies State data security laws State laws impacting data security Social Security number use regulation Laws governing data destruction Data breach notification laws Scope of state data breach notification law Nine elements of state data breach notification laws Major differences in state laws
Join our Immigration Masterclass which explores Part 9 of the Immigration Rules, Ancestry Visas and Visit Visas. View our Masterclass training course dates below, available remotely via Microsoft Teams. Immerse yourself in a deep exploration of UK immigration in our one-day “Immigration Masterclass.” Whether you’re starting your journey, a legal professional, or eager to assist others, this course is tailored for success. Covering crucial topics like Part 9 of the Immigration Rules, grounds for refusal, UK Ancestry Visa, and Visit Visas, this masterclass blends theory with real-world case studies. Gain practical skills and emerge ready to navigate UK immigration with confidence and precision. Join us for an intensive journey into the intricacies of UK immigration in a condensed, yet comprehensive masterclass. Course joining links, materials and instructions are sent out 24hours before the course starts. Immigration Advice Service has been providing professional immigration services for over 10 years in the public, private and corporate sectors. Our fully qualified and OISC regulated trainer will guide you through the process and ensure you are competent in the area of Unaccompanied Minors. Who Should Attend: Designed for immigration Legal Practitioners, Lawyers, Solicitors, Immigration Advisors. Course Topics: Part 9 of the Immigration Rules (Grounds For Refusal) Introduction Structure of the Rules Section 1 to Section 5 of the Rules Appendix FM and Suitability Requirements Criminality o Persistent Offenders Deception Re-Entry Ban UK Ancestry Visa Introduction Who Qualifies Commonwealth Countries Legal Requirements Adequate Maintenance Test Extension Application Dependent Application Unique settlement applications o Remedy if application is refused. List of Evidence / Documents Sample Cover Letter Case Study Visit Visa Introduction Categories of Visitor Visa Legal Requirements What can and can’t the visitor do in the UK Extension of stay as a visitor Cancelation and Curtailment Remedy if application is refused. Sample refusal letters List of Documents/Evidence Sample Cover Letter Case Study
Our Innovator Founder Training Course is an essential program designed to provide you with valuable insights into the new Innovator Founder visa. This visa route, which replaced the Innovator visa, offers individuals the opportunity to establish a business in the UK based on their innovative, viable, and scalable business idea. View the Innovator Founder Training course dates below, delivered via Microsoft Teams. Innovator Founder Our Innovator Founder Training Course is an essential program designed to provide you with valuable insights into the new Innovator Founder visa. This visa route, which replaced the Innovator visa, offers individuals the opportunity to establish a business in the UK based on their innovative, viable, and scalable business idea. During the course, we will guide you through the key changes introduced by the Innovator Founder route, including the removal of the minimum funds requirement and the ability to engage in secondary employment. We will also explore the importance of regular contact point meetings with the endorsing body to assess progress and provide ongoing support. This course will cover the endorsement requirement, emphasizing the need for a comprehensive endorsement letter from an approved Endorsing Body or Legacy Endorsing Body. You will gain a deep understanding of the criteria that the endorsing body considers when assessing your fit as an Innovator Founder, ensuring you meet the necessary standards for endorsement. Our course will provide valuable guidance on the period and conditions of leave granted under the Innovator Founder route, as well as the settlement requirements and eligibility criteria. This is not to be missed by lawyers, solicitors, immigration advisors, entrepreneurs and business owners. Course joining links, materials and instructions are sent out 24hours before the course starts. Why choose IAS' Immigration Training Courses? Immigration Advice Service has been providing professional immigration services for over 10 years in the public, private and corporate sectors. Our fully qualified and OISC regulated trainer will guide you through the content in our comprehensive training course. See why others like to study with IAS: Delivered Online Expert Course Trainer Free Course Materials Certificate of Attendance Join over 92% of satisfied customers who found their training with IAS useful and beneficial. You will also be provided with training materials to keep after completing the course. How is this course structured? The “Innovator Founder” training workshop will involve the following: Introduction to the Innovator Founder visa Endorsement requirements Business plan requirements Innovative, viable, and scalable business requirements Same business requirements English Language and Financial Requirement Period and conditions of grants Settlement requirements Dependants of an Innovator Founder
This course equips immigration practitioners and advocates with the knowledge and skills to assist domestic violence survivors in obtaining Indefinite Leave to Remain (ILR) in the UK. Course Overview: Achieving Indefinite Leave to Remain in Domestic Violence Cases” is a comprehensive training program designed for immigration practitioners and advocates. It provides the necessary knowledge and skills to support domestic violence survivors in obtaining Indefinite Leave to Remain (ILR) in the UK. Participants will explore eligibility criteria, evidence gathering, exceptional circumstances, and application processes to empower survivors on their journey to safety and security. Throughout the course, participants will gain a deep understanding of the eligibility requirements for ILR, enabling them to effectively advise and support their clients. They will learn how to guide survivors in collecting and presenting compelling evidence that strengthens their cases, while also understanding alternative routes and exceptional circumstances for those who do not meet standard eligibility criteria. The course provides practical strategies for enhancing the chances of a successful outcome. Participants will also learn the step-by-step procedures for making a domestic violence concession application, equipping them with the skills to compile persuasive application packages. By the end of the training, participants will be equipped with the knowledge, practical skills, and strategies necessary to assist domestic violence survivors in achieving ILR. Course joining links, materials and instructions are sent out 24hours before the course starts. Why Choose IAS’ Immigration Training Courses? Immigration Advice Service has been providing professional immigration services for over 10 years in the public, private and corporate sectors. Our fully qualified and OISC regulated trainer will guide you through the content in our comprehensive training course. See why others like to study with IAS: Delivered Online Expert Course Trainer Free Course Materials Certificate of Attendance Join over 92% of satisfied customers who found their training with IAS useful and beneficial. You will also be provided with training materials to keep after completing the course. How is this course structured? The “Domestic Violence (Immigration based)” training workshop will involve the following: 1. Understanding Eligibility: Who Qualifies for Indefinite Leave to Remain Overview of the criteria and requirements for domestic violence survivors seeking Indefinite Leave to Remain Exploring the key factors that determine eligibility 2. Advising Clients about Evidence Guidance on effectively advising clients on gathering and presenting compelling evidence to support their cases Understanding the types of evidence that can strengthen an application and highlight the impact of domestic violence 3. Considering Exceptional Circumstances when Clients Do Not Qualify under the Rules Exploring alternative routes and exceptional circumstances that may still enable survivors to secure Leave to Remain Discussing strategies for presenting exceptional circumstances to enhance the chances of a successful outcome 4. Making a Domestic Violence Concession Application
Duration 5 Days 30 CPD hours This course is intended for This class is intended for DBAs and IT Professionals who are responsible for administration and maintenance of PostgreSQL, and want to increase proficiency and learn best practices. Targeted at: DBAs and Architects, and appropriate for Analysts, Support Engineers, and other IT professionals Overview Please refer to overview This is an immersive 5-day class that offers hands-on labs and combines the core topics from Foundations of Postgres Administration and Advanced PostgreSQL Administration into a one-week class, with significant savings over list price. Upon course completion, you will be prepared to manage mission critical PostgreSQL installations, and perform core administration tasks with confidence and skill. Course Outline 1 - POSTGRES SYSTEM ARCHITECTURE 2 - INSTALLATION AND GETTING STARTED 3 - CONFIGURATION, CREATING, MANAGING DATABASES 4 - USER TOOLS ? USING PSQL 5 - GUI TOOLS - USING PGADMIN 4 6 - SECURITY BASICS 7 - SQL PRIME BACKUP AND RECOVERY 8 - ROUTINE MAINTENANCE 9 - POSTGRES DATA DICTIONARY 10 - MOVING DATA 11 - SQL TUNING 12 - PERFORMANCE TUNING 13 - STREAMING REPLICATION 14 - TABLE PARTITIONING 15 - EXTENSION MODULES 16 - MONITORING 17 - UPGRADING BEST PRACTICES
Our courses have been designed by experienced teachers to make getting TEFL qualified as convenient as possible. These online courses are entirely self-paced, meaning you can fit study around your life in a way that works best for you. Throughout the course, you will have the support of your own personal tutor who is with you from beginning to end to mark your work, provide helpful feedback, and answer all your questions. 120-hour Premier Online TEFL Course: 50-hour Online TEFL Course Learn about classroom management, teaching styles and advanced TEFL methodology. Includes units on business English, young learners, and teaching English one-to-one. Study with a personal tutor and meet fellow students on our course forums. 30-hour Online Grammar Course Do not know your irregular verbs from auxiliary verbs? This course will improve your basic grammar and give you the grounding you will need to communicate complicated language rules to a student audience. 20-hour Online Video Course Seeing an English teacher in action is a potent learning tool and really brings the theory to life. Feel free to steal the ideas in these video courses to use in your first lessons. We do not mind! Two 10-hour specialist mini-modules. Two mini-modules designed for specific TEFL jobs, which will help your CV stand out. One 10-hour unit is about teaching online, and the other 10-hour unit will help you teach large classes. Included in the 120-hour Premier Online TEFL Course: Lifetime access to the TEFL Job Centre The TEFL Virtual Educators course doesn’t just train you to teach; it helps you find and be offered great TEFL jobs around the world. From exclusive access to our job vacancies to a lifetime of free TEFL career advice, we’re here to help you kick-start your new career. Internationally recognised TEFL certificate – hard copy & PDF A widely-recognised certificate posted straight to your door which shows your achievements on our course, something you can show to TEFL employers to secure you a job. Personal online TEFL tutor Work through your course with the help of an experienced and qualified TEFL tutor. Throughout the course, you’ll have the same tutor, so you have one point of contact for advice and assistance. Online TEFL Class breakdown Lesson Planning Teaching English Vocabulary Teaching Pronunciation Understanding English Grammar Teaching Receptive Skills: Listening and Reading Teaching Productive Skills: Speaking and Writing Teaching English Grammar Principles of Teaching English as a Foreign Language Materials and Aids for Teaching English/Classroom Management Strategies Using Resources Effectively when Teaching English as a Foreign Language Case Study, CV and Cover Letter, Job Sites and Resources You will explore the latest theories in topics such as second language acquisition and social discourse and have the chance to apply these to your own classroom practice and curriculum development. You will also learn to conduct your own research, compile and analyse qualitative and quantitative data and develop your critical-evaluative skills. These skills will be used on your own research project at the end of the course, as well as in your future career. Core modules: Second Language Acquisition You will focus on the major themes that have emerged from literature on second language learning over the last three decades. You will examine some of the research on the second-language acquisition process, look critically at reports of second-language research, and examine some of the theories which endeavour to interpret research evidence. You will be encouraged to use your own language learning and teaching experience to assess the relative merits of such materials. Discourse in Society You will examine the relationship between language and society and the construction of discourse in various domains. You will explore sociological and sociolinguistic models and theories, such as speech communities, communities of practice and ethnolinguistic vitality, with a particular focus on social variation and stratification across various linguistic levels (phonology, lexicon, syntax). You will explore discourse's notion (or notions) in both its linguistic and wider meaning and its construction in and through society and language use. You will study methods for collecting and transcribing data and discover various linguistic and discourse analysis approaches. These methods and approaches will then be put into context and used in the analysis of the relevant social spheres and domains, such as educational or institutional discourse. Research Methods in Applied Linguistics This module will provide you with an introduction to research methods in preparation for the MA dissertation. It will familiarise you with the basic processes of conducting research, including general methodological approaches as well as research ethics. You will analyse and discuss both qualitative and quantitative data in order to develop your critical-evaluative skills. Materials and Course Design You will explore the factors involved in the design of language courses and teaching materials, reflecting on one possible course design process. You will start with an analysis of the context in which the course will take place, the needs of the learners, and current theories of language and language learning. You will move on to consider how course content can be selected and ordered in a principled way, how assessment relates to course design, and how and when courses should be evaluated. Finally, you will consider the evaluation, adaptation, and creation of course materials. Classroom Theory and Practice You will examine current research on modern classroom operations, exploring key concepts and issues through relevant professional and academic literature. A more practical element will be realised through filmed observation of teachers in practice. You will also be encouraged to reflect on your teaching and learning experience and analyse and discuss your beliefs and attitudes towards learning and teaching. Major Project This module will support you in the preparation and submission of a master’s dissertation, allowing you to explore in-depth a particular topic that reflects your academic interest. Assessment You will show your understanding of theoretical issues and their practical application through a combination of portfolios, classroom observation tasks and critical essays. After completing your final module, you will also research and prepare a 15,000-word dissertation.
Expand your VBA knowledge further and learn some of the more advanced coding features. Course overview Duration: 2 days (13 hours) This course is aimed at experienced VBA users or those who have attended our Part 1 course and have started to use the language. Part 2 expands on the huge array of commands and elements of the data model that can be used and looks at building more complex VBA models Objectives By the end of the course you will be able to: Use comparison operators and system functions Use Arrays Work with ranges Work with the worksheets and workbooks collections and objects Use application objects Use the FileSystemObject Create function procedures Import and save text files Connect to other applications Content Comparison operators Using Comparison operators and functions The LIKE function Wildcards Using SELECT Case System functions The VAL function Case functions Trim functions Text functions Date functions Excel worksheet functions Using Excel functions in VBA Arrays Creating arrays Using arrays Ubound and Lbound Single and multi dimensional arrays Static vs dynamic arrays Working with ranges Creating range objects Passing data between range objects and arrays Using Transpose The Excel object model The object browser Working with collections Collections Creating object variables Setting object variables The For Each . . . Next Loo Sheet collections The worksheets collection The worksheet object The sheets collection Using object Grouping worksheets Using Typename The Workbook collection The workbooks collection Setting workbook variables Application objects Excel default information Display/alerts Screen updating Status bar On Time Using Wait Systems dialog boxes Showing dialog boxes Using dialog boxes Working with files Searching for files and folders The DIR function The FileSystemObject Function procedures Creating functions Adding arguments Calling functions Working with text files Searching for files and folders The DIR function The FileSystemObject Using the FILE and FOLDER collections Sharing data with other applications Early vs Late Binding Setting references to other applications Creating application variables Setting application variables