• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

448 Running courses in London delivered Live Online

OISC Level 1 Training Course

By Immigration Advice Service

Our OISC Level 1 training course is designed as a two-day, entry-level course, offering participants an introduction into Immigration Advice. In this course, we aim to cover the syllabus at level one, as according to OISC standards. View the OISC Level 1 course dates below, delivered on Microsoft Teams. Course Overview:   Our OISC Level 1 Training Course, your gateway to comprehensive knowledge in Immigration, EU, and Asylum law. Our course is specifically designed to equip participants with the fundamental understanding needed to excel in the level one assessments, with a strong focus on fulfilling the core requirements set by the OISC (Office of the Immigration Services Commissioner). Designed as a comprehensive two-day entry-level course, it serves as an excellent introduction to Immigration Advice. Our aim is to cover the level one syllabus prescribed by the OISC, ensuring that you meet the standards set by the regulatory body. By enrolling in our OISC Level 1 training course, you’ll gain the essential knowledge, skills, and confidence required to navigate the complex world of immigration law effectively. Whether you’re looking to launch a career in immigration advice or seeking to enhance your existing expertise, this course will lay a solid foundation for your professional journey. Don’t forget to check out ourExam Technique Training (Level 1) which is designed to help prepare learners for their accreditation exam. Are you interested in setting up your own OISC law firm? Join our Setting Up An OISC Firm course, where you’ll learn the requirements, processes and key information about running a firm as well as receive handy resources and materials. Course joining links, materials and instructions are sent out 24hours before the course starts. What is included in the OISC Level 1 Syllabus? Based on the latest syllabus, published by the Office of the Immigration Services Commissioner, the OISC Level 1 Training Course covers the following: Analysis of the structures, terminology, ethical practices and frameworks of immigration law Asylum and protection law European Economic Area (EEA) free movement law British Naturalisation and British Citizenship registration Business immigration law Appeals process and structures of the Asylum and Immigration Tribunal Join over 92% of satisfied customers who found their training with IAS useful and beneficial. You will also be provided with training materials to keep after completing the course. How is the OISC Level 1 exam structured? The OISC Level 1 exam is structured into two parts: The first part comprises 20 multiple-choice questions. You have 1 hour and 15 minutes to complete this section of your OISC exam. There is only one correct answer for each question. The second part presents different scenario-based questions to be answered within 1 hour and 15 minutes. You should provide answers which are legible and written clearly in plain English. Detailed instructions on how to complete each section of your OISC Level 1 exam will be provided during the course, to ensure that each candidate is adequately prepared to pass the test.

OISC Level 1 Training Course
Delivered OnlineFlexible Dates
£250

Architecting with Google Kubernetes Engine

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This class is intended for the following participants: Cloud architects, administrators, and SysOps/DevOps personnel Individuals using Google Cloud Platform to create new solutions or to integrate existing systems, application environments, and infrastructure with the Google Cloud Platform. Overview This course teaches participants the following skills: Understand how software containers work Understand the architecture of Kubernetes Understand the architecture of Google Cloud Platform Understand how pod networking works in Kubernetes Engine Create and manage Kubernetes Engine clusters using the GCP Console and gcloud/ kubectl commands Launch, roll back and expose jobs in Kubernetes Manage access control using Kubernetes RBAC and Google Cloud IAM Managing pod security policies and network policies Using Secrets and ConfigMaps to isolate security credentials and configuration artifacts Understand GCP choices for managed storage services Monitor applications running in Kubernetes Engine This class introduces participants to deploying and managing containerized applications on Google Kubernetes Engine (GKE) and the other services provided by Google Cloud Platform. Through a combination of presentations, demos, and hands-on labs, participants explore and deploy solution elements, including infrastructure components such as pods, containers, deployments, and services; as well as networks and application services. This course also covers deploying practical solutions including security and access management, resource management, and resource monitoring. Introduction to Google Cloud Platform Use the Google Cloud Platform Console Use Cloud Shell Define cloud computing Identify GCPs compute services Understand regions and zones Understand the cloud resource hierarchy Administer your GCP resources Containers and Kubernetes in GCP Create a container using Cloud Build Store a container in Container Registry Understand the relationship between Kubernetes and Google Kubernetes Engine (GKE) Understand how to choose among GCP compute platforms Kubernetes Architecture Understand the architecture of Kubernetes: pods, namespaces Understand the control-plane components of Kubernetes Create container images using Google Cloud Build Store container images in Google Container Registry Create a Kubernetes Engine cluster Kubernetes Operations Work with the kubectl command Inspect the cluster and Pods View a Pods console output Sign in to a Pod interactively Deployments, Jobs, and Scaling Create and use Deployments Create and run Jobs and CronJobs Scale clusters manually and automatically Configure Node and Pod affinity Get software into your cluster with Helm charts and Kubernetes Marketplace GKE Networking Create Services to expose applications that are running within Pods Use load balancers to expose Services to external clients Create Ingress resources for HTTP(S) load balancing Leverage container-native load balancing to improve Pod load balancing Define Kubernetes network policies to allow and block traffic to pods Persistent Data and Storage Use Secrets to isolate security credentials Use ConfigMaps to isolate configuration artifacts Push out and roll back updates to Secrets and ConfigMaps Configure Persistent Storage Volumes for Kubernetes Pods Use StatefulSets to ensure that claims on persistent storage volumes persist across restarts Access Control and Security in Kubernetes and Kubernetes Engine Understand Kubernetes authentication and authorization Define Kubernetes RBAC roles and role bindings for accessing resources in namespaces Define Kubernetes RBAC cluster roles and cluster role bindings for accessing cluster-scoped resources Define Kubernetes pod security policies Understand the structure of GCP IAM Define IAM roles and policies for Kubernetes Engine cluster administration Logging and Monitoring Use Stackdriver to monitor and manage availability and performance Locate and inspect Kubernetes logs Create probes for wellness checks on live applications Using GCP Managed Storage Services from Kubernetes Applications Understand pros and cons for using a managed storage service versus self-managed containerized storage Enable applications running in GKE to access GCP storage services Understand use cases for Cloud Storage, Cloud SQL, Cloud Spanner, Cloud Bigtable, Cloud Firestore, and Bigquery from within a Kubernetes application

Architecting with Google Kubernetes Engine
Delivered OnlineFlexible Dates
Price on Enquiry

F5 Networks Configuring BIG-IQ

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course is intended for system and network administrators or operators responsible for the installation, setup, configuration, and administration of the BIG-IQ system or management of BIG-IP devices and F5 products running on those devices. This course uses lectures and hands-on exercises to give participants real-time experience in configuring and using the BIG-IQ© product. Students are introduced to BIG-IQ, its interface, and its various functionality. We first look at administering and operating the BIG-IQ system itself, then detail how it is used to remotely manage BIG-IP devices running BIG-IP Local Traffic Manager (LTM). We then look configuring a BIG-IQ Data Collection Device (DCD) system and see how it is used for the remote storage and examination of BIG-IP log events and statistics. Module 1: BIG-IQ Overview BIG-IQ Centralized Management BIG-IQ Components BIG-IQ Core Functionality REST API BIG-IQ Data Collection Device (DCD) BIG-IP Cloud Edition (CE) Setting up the BIG-IQ System Module 2: Administering the BIG-IQ System Controlling Access to the BIG-IQ Creating, Authenticating, Configuring Users Backups Local Host Settings Configuring DNS, NTP, and SMTP Monitoring BIG-IQ, DCD, and BIG-IP Events with Alerts Monitoring BIG-IQ with iHealth Post Installation Issues; Licensing, Changing Management IP, Master Key, Restoring Backups Module 3: Managing BIG-IP LTM Devices BIG-IP LTM Device Discovery BIG-IP Device Backup Deploying to BIG-IP Devices Deployment and Deployment Logs Configuration Snapshots Managing BIG-IP Certificates Managing BIG-IP Licenses Monitoring BIG-IP Devices with iHealth Management of QKView Reports from Managed BIG-IP Devices Module 4: Setting Up the BIG-IQ Data Collection Device Custom Roles Types and Groups Setting up User Accounts with custom roles and privileges Managing BIG-IP DSC Discovery and management of BIG-IP Device Clusters (DSC) with BIG-IQ Administering BIG-IQ High Availability Configuration and management of BIG-IQ systems in a High Availability pair

F5 Networks Configuring BIG-IQ
Delivered OnlineFlexible Dates
Price on Enquiry

Design & Make Your Own Granny Square Sweater - Online Course Starting 22nd April 2024

By Merrian Holland

Learn how to design and customize a perfect fitting sweater using DK or 4ply/fingering weight yarn. From layout and shape to color placement and professional finishing, this 12-week course will guide you through every step with personalized assistance from expert crochet tutor, Merrian. You'll also be part of a small community of crochet students, all making the sweater together over the 12 weeks.

Design & Make Your Own Granny Square Sweater - Online Course Starting 22nd April 2024
Delivered OnlineJoin Waitlist
£199.99

AEROLATINO CERTIFICATION

By Aerolatino

JOIN THE LATEST LATIN AMERICA DANCE WORKOUT!

AEROLATINO CERTIFICATION
Delivered OnlineFlexible Dates
£75

How to use Heat Engineer Software V2 (Selectable dates)

3.7(8)

By Heat Engineer

For new users and the curious. Hello, For new users and the curious. IMPORTANT: Firstly, once you are signed up, send us your requests on what you would like to see within the demonstration and learn on the course. We will then cater for your needs and answer them during the session. This is designed to be an introduction into how to start a room by room survey using the Heat Engineer app, then sending this survey to the online dashboard. We will then go through the different steps to complete this heat loss report. Optional pages will also be worked through and shown. Examples of how to select the flow temperature and the heat source (heat pumps and boilers) will be presented once the heat loss result is completed.

How to use Heat Engineer Software V2 (Selectable dates)
Delivered OnlineJoin Waitlist
£47.93

Reiki Power Hour Coaching Session

By Margaret Cook - Learn More About Reiki

A 60 minute power hour coaching session online to help answer any questions that you may have about Reiki. Whether you are new to Reiki or have been practising it for many years, there will always be questions that we would like answering. Or sometimes just having the opportunity to talk things through with another experienced Reiki teacher, healer or reiki practitioner.

Reiki Power Hour Coaching Session
Delivered OnlineFlexible Dates
£97

WB396 IBM Managing Decisions in IBM Operational Decision Manager V8.7.1

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for business analysts. Overview After completing this course, you should be able to:Describe the benefits of implementing an Operational Decision Manager solution, and the collaboration that is required between the business and development teamsIdentify the main user roles that are involved in designing and developing an Operational Decision Manager solution, and the tasks that are associated with each roleExplain modeling concepts and the UML notation that is relevant to modeling for business rules and eventsDefine and implement object models for business rulesSet up the rule authoring environment in Designer by working with decision services and synchronizing across development and business environmentsCustomize the vocabulary that is used in rulesDiscover and analyze business rules for implementationUse the Operational Decision Manager rule editors to author business rules and decision tablesRun tests and simulations in the Decision Center Enterprise console to validate decision logic and rule changesExplain governance issues and work with Operational Decision Manager features that support decision governance This course introduces business analysts to IBM Operational Decision Manager V8.7.1. You learn the concepts and skills that are necessary to capture, author, validate, and manage business rules with Operational Decision Manager. Course Outline Course introduction Introducing IBM Operational Decision Manager V8.7.1 Exercise: Operational Decision Manager in action Modeling for business rules Exercise: Building the model on paper Exercise: Implementing the model Understanding decision services Exercise: Setting up a decision service Working with the BOM Exercise: Working with the BOM Introducing Decision Center Exercise: Exploring the Decision Center Business console Exercise: Exploring the Decision Center Enterprise console Introducing rule authoring Exercise: Understanding the case study Discovering and analyzing rules Exercise: Discovering rules Exercise: Analyzing rules Working with conditions in rules Exercise: Working with conditions in rules Working with definitions in rules Exercise: Working with definitions in rules Writing complete rules Exercise: Writing complete rules Authoring decision tables and trees Exercise: Authoring decision tables and trees Exercise: Authoring rules: Putting it all together Running tests and simulations in the Enterprise console Exercise: Running tests and simulations in the Enterprise console Introducing decision governance Exercise: Working with the decision governance framework Course summary

WB396 IBM Managing Decisions in IBM Operational Decision Manager V8.7.1
Delivered OnlineFlexible Dates
Price on Enquiry

Python Introduction

By Nexus Human

Duration 3.5 Days 21 CPD hours This course is intended for This course is aimed at students new to the language who may or may not have experience with other programming languages. Overview Learn how Python works and what it's good for. Understand Python's place in the world of programming languages Learn to work with and manipulate strings in Python. Learn to perform math operations with Python. Learn to work with Python sequences: lists, arrays, dictionaries, and sets. Learn to collect user input and output results. Learn flow control processing in Python. Learn to write to and read from files using Python. Learn to write functions in Python. Learn to handle exceptions in Python. Learn to work with dates and times in Python. In this Python training course by Webucator, Inc, students learn to program in Python. Python Basics Running Python Hello, World! Literals Python Comments Data Types Variables Writing a Python Module print() Function Named Arguments Collecting User Input Getting Help Functions and Modules Defining Functions Variable Scope Global Variables Function Parameters Returning Values Importing Modules Math Arithmetic Operators Modulus and Floor Division Assignment Operators Built-in Math Functions The math Module The random Module Seeding Python Strings Quotation Marks and Special Characters String Indexing Slicing Strings Concatenation and Repetition Common String Methods String Formatting Built-in String Functions Iterables: Sequences, Dictionaries, and Sets Definitions Sequences Unpacking Sequences Dictionaries The len() Function Sets *args and **kwargs Flow Control Conditional Statements The is and is not Operators Python's Ternary Operator Loops in Python The enumerate() Function Generators List Comprehensions File Processing Opening Files The os and os.path Modules Exception Handling Wildcard except Clauses Getting Information on Exceptions The else Clause The finally Clause Using Exceptions for Flow Control Exception Hierarchy Dates and Times Understanding Time The time Module The datetime Module Running Python Scripts from the Command Line The sys Module sys.argv

Python Introduction
Delivered OnlineFlexible Dates
Price on Enquiry

VMware Kubernetes Fundamentals and Cluster Operations

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Anyone who is preparing to build and run Kubernetes clusters Overview By the end of the course, you should be able to meet the following objectives: Build, test, and publish Docker container images Become familiar with YAML files that define Kubernetes objects Understand Kubernetes core user-facing concepts, including pods, services, and deployments Use kubectl, the Kubernetes CLI, and become familiar with its commands and options Understand the architecture of Kubernetes (Control plane and its components, worker nodes, and kubelet) Learn how to troubleshoot issues with deployments on Kubernetes Apply resource requests, limits, and probes to deployments Manage dynamic application configuration using ConfigMaps and Secrets Deploy other workloads, including DaemonSets, Jobs, and CronJobs Learn about user-facing security using SecurityContext, RBAC, and NetworkPolicies This four-day course is the first step in learning about Containers and Kubernetes Fundamentals and Cluster Operations. Through a series of lectures and lab exercises, the fundamental concepts of containers and Kubernetes are presented and put to practice by containerizing and deploying a two-tier application into Kubernetes. Course Introduction Introductions and objectives Containers What and Why containers Building images Running containers Registry and image management Kubernetes Overview Kubernetes project Plugin interfaces Building Kubernetes Kubectl CLI Beyond Kubernetes Basics Kubernetes objects YAML Pods, replicas, and deployments Services Deployment management Rolling updates Controlling deployments Pod and container configurations Kubernetes Networking Networking within a pod Pod-to-Pod Networking Services to Pods ClusterIP, NodePort, and LoadBalancer Ingress controllers Service Discovery via DNS Stateful Applications in Kubernetes Stateless versus Stateful Volumes Persistent volumes claims StorageClasses StatefulSets Additional Kubernetes Considerations Dynamic configuration ConfigMaps Secrets Jobs, CronJobs Security Network policy Applying a NetworkPolicy SecurityContext runAsUser/Group Service accounts Role-based access control Logging and Monitoring Logging for various objects Sidecar logging Node logging Audit logging Monitoring architecture Monitoring solutions Octant VMware vRealize Operations Manager Cluster Operations Onboarding new applications Backups Upgrading Drain and cordon commands Impact of an upgrade to running applications Troubleshooting commands VMware Tanzu portfolio overview

VMware Kubernetes Fundamentals and Cluster Operations
Delivered OnlineFlexible Dates
Price on Enquiry