• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1391 Software courses in Liverpool delivered Live Online

Microsoft Office - MS Word, Excel, Access & PowerPoint

By NextGen Learning

Course Overview This comprehensive Microsoft Office course provides an in-depth understanding of the core Office applications—Word, Excel, PowerPoint, and Access. Designed to develop essential digital skills, it equips learners with the ability to navigate each program with confidence, improving document creation, data management, presentations, and database handling. Covering both foundational and advanced features, the course is ideal for those looking to boost their efficiency in a variety of business and administrative contexts. By the end of the course, learners will have the capability to produce professional documents, organise data in spreadsheets, create impactful presentations, and manage information through databases. This structured training ensures clarity in using Microsoft Office tools to support workplace productivity and enhance employability across multiple sectors. Course Description This course explores the full functionality of Microsoft Word, Excel, PowerPoint, and Access—focusing on both classic and new features of the 2019 versions. Learners will begin with the essentials, such as creating and formatting documents, performing calculations in spreadsheets, and developing effective slide presentations. As the modules progress, learners will delve into more detailed features, including managing lists, inserting graphics, handling data queries, and designing user-friendly reports. The training also includes familiarisation with the interface and workflow improvements in each application, offering structured, sequential guidance. Ideal for office professionals, jobseekers, and administrative staff, the course enhances digital fluency and enables learners to carry out a wide range of clerical and operational tasks using the Microsoft Office suite. Course Modules Module 01: Microsoft Excel 2019 New Features Module 02: Getting Started with Microsoft Excel Module 03: Performing Calculations Module 04: Modifying a Worksheet Module 05: Formatting a Worksheet Module 06: Printing Workbooks Module 07: Managing Workbooks Module 08: Microsoft Word 2019 Module 09: Microsoft Word 2019 New Features Module 10: Getting Started with Word Module 11: Formatting Text and Paragraphs Module 12: Working More Efficiently Module 13: Managing Lists Module 14: Adding Tables Module 15: Inserting Graphic Objects Module 16: Controlling Page Appearance Module 17: Preparing to Publish a Document Module 18: Workbooks - Microsoft Word 2016 (Beginner) Module 19: Microsoft PowerPoint 2019 Module 20: Microsoft PowerPoint 2019 New Features Module 21: PowerPoint Interface Module 22: Presentation Basics Module 23: Formatting Module 24: Inserting Options Module 25: Working with Objects Module 26: Table Module 27: Charts Module 28: Review and Presentation Module 29: Microsoft Access 2019 Module 30: Microsoft Access 2019 New Features Module 31: Introduction to Access Module 32: Modify Data Module 33: Working with Queries Module 34: Access Forms Module 35: Working with Reports (See full curriculum) Who is this course for? Individuals seeking to improve their office software knowledge for employment. Professionals aiming to upgrade their digital skills in a business setting. Beginners with an interest in learning Microsoft Office applications. Jobseekers and administrative workers looking to strengthen their CVs. Career Path Administrative Assistant Data Entry Officer Office Manager Project Coordinator Personal Assistant Executive Support Roles Customer Service Representative Database Administrator (Entry-Level)

Microsoft Office - MS Word, Excel, Access & PowerPoint
Delivered OnlineFlexible Dates
£9.99

Adobe Illustrator Masterclass

By NextGen Learning

Course Overview The Adobe Illustrator Masterclass offers a comprehensive journey through the essential tools and features of this powerful design software. Learners will gain proficiency in using Illustrator for various creative projects, from graphic design to digital artwork. This course equips students with a clear understanding of key tools such as the Pen Tool, Selection Tools, and the Blend Tool, enabling them to create professional-level designs. Through the modules, learners will develop the ability to work with typography, drawing tools, and advanced colour manipulation, empowering them to elevate their creative skills. By the end of the course, students will be confident in applying their knowledge to industry-standard design tasks, whether for personal projects or professional use. Course Description This course delves into the full scope of Adobe Illustrator’s capabilities, providing learners with in-depth knowledge of both fundamental and advanced tools. Starting with a solid foundation in selection and drawing tools, the course moves on to cover more sophisticated techniques, such as using the Pen Tool, Typography Tools, and Gradient Tool. Learners will also explore the Symbolism Tools and Graph Tools to further enhance their design capabilities. Emphasis is placed on both efficiency and creativity, allowing learners to unlock the potential of Illustrator for creating sophisticated vector graphics, illustrations, and layout designs. Each module is designed to build a strong understanding of Illustrator’s functions and how they can be applied to real-world projects. Upon completion, learners will possess the technical expertise and creative confidence to execute complex design projects with Illustrator. Course Modules Module 01: Introduction Module 02: How To Use The Selection Tools Module 03: How To Use the Pen Tool and the Gang in Illustrator? Module 04: How To Use the Typography Tools in Illustrator Module 05: How To Use The Drawing Tools in Illustrator Pt 1 Module 06: How To Use The Drawing Tools in Illustrator Pt 2 Module 07: How to Use the Paintbrush Tools Module 08: How to Use the Pencil Tools Module 09: The Eraser Tools Module 10: The Rotate and Reflect Tools Module 11: The Liquify Tools Module 12: The Shape Builder and Live Paint Tools Module 13: The Perspective Grid Tool Module 14: How to Use the Gradient Tool Module 15: How To Use the Blend Tool Module 16: How To Use the Technical Tools Module 17: How To Use the Symbols and the Symbolism Tools Module 18: How To Use the Graph Tools Module 19: How To Use Slicing and the Slice Tools Module 20: How To Use the Color Tools and Drawing Modes Module 21: Summary (See full curriculum) Who is this course for? Individuals seeking to enhance their graphic design skills. Professionals aiming to improve their digital design portfolio. Beginners with an interest in graphic design or illustration. Anyone interested in mastering Adobe Illustrator for creative projects. Career Path Graphic Designer Illustrator Digital Artist Visual Designer Print Designer Web Designer Packaging Designer

Adobe Illustrator Masterclass
Delivered OnlineFlexible Dates
£9.99

VMware NSX Advanced Load Balancer: Install, Configure, Manage [V21.x]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Experienced system administrators and network administrators Overview By the end of the course, you should be able to meet the following objectives: Describe the NSX Advanced Load Balancer architecture Describe the NSX Advanced Load Balancer components and main functions Explain the NSX Advanced Load Balancer key features and benefits Deploy and configure the NSX Advanced Load Balancer infrastructure within private or public clouds using Write and No-Access Cloud Connectors Explain, deploy, and configure Service Engines Explain and configure local load balancing constructs such as virtual services, pools, health monitors, and related components Explain and configure advanced virtual services and related concepts such as Subject Name Indication, Enhanced Virtual Hosting, and authentication of virtual services Explain and modify application behavior through profiles, policies, and DataScripts Describe Central licensing management using VMware NSX Advanced Load Balancer Enterprise with Cloud services (formerly Avi Pulse) Explain how to configure Role-Based Access Control (RBAC) in NSX Advanced Load Balancer Configure advanced services such as global server load balancing Describe how to use NSX Advanced Load Balancer REST API interfaces and related automation capabilities Describe and configure NSX Advanced Load Balancer application and infrastructure monitoring Gather relevant information and perform basic troubleshooting of applications that use built-in NSX Advanced Load Balancer tooling Identify the key features of VMware NSX Network Detection and Response This five-day, fast-paced course provides comprehensive training to install, configure, and manage a VMware NSX Advanced Load Balancer (Avi Networks) solution. This course covers key NSX Advanced Load Balancer (Avi Networks) features and functionality offered in the NSX Advanced Load Balancer 21.x release. Features include the overall infrastructure, virtual services, application components, global server load balancing, various cloud connectors, application troubleshooting, and solution monitoring. Hands-on labs provide access to a software-defined data center environment to reinforce the skills and concepts presented in the course. Course Introduction Introduction and course logistics Course objectives Introduction to NSX Advanced Load Balancer Introduce NSX Advanced Load Balancer Discuss NSX Advanced Load Balancer use cases and benefits Explain NSX Advanced Load Balancer architecture and components Explain the management, control, data, and consumption planes and their respective functions Virtual Services Configuration Concepts Explain virtual service components Explain virtual service types Explain and configure basic virtual service components such as application profiles and network profiles Virtual Services Configuration Advanced Concepts Explain the virtual service advanced components such as Wildcard VIP, Server Name Identification (SNI), and Enhanced Virtual Hosting (EVH) Explain the concept of virtual service VIP Sharing Explain different authentication mechanisms used for a virtual service such as LDAP, SAML, JSON Web Token, and OAUTH Profiles and Policies Explain application profiles and types such as L4, DNS, Syslog, HTTP, and VMware Horizon VDI Explain and configure advanced application HTTP profile options Describe network profiles and types Explain and configure SSL profiles and certificates Explain and configure HTTP, network, and DNS policies Pools Configuration Concepts Explain pools configuration options Describe the available load balancing algorithms Explain multiple health monitor types Explain multiple Persistence profiles Explain and configure pool groups Modifying Application Behavior Design and apply application solutions by using application profiles Design and apply application solutions by using network, HTTP policies, and DataScripts Explain DataScript fundamentals Explain and use NSX Advanced Load Balancer analytics to understand application behavior Describe and configure client SSL certificate validation Describe and configure virtual service DDoS, Rate limiting, and Throttling capabilities Modify network profile properties such as TCP connection properties Design and apply application solutions by using Persistence profiles NSX Advanced Load Balancer Infrastructure Architecture Explain management, control, data, and consumption planes and functions Describe control plane clustering and high availability Describe controller sizing and process sharing Describe Service Engine CPU and NIC architecture Explain tenants Configure properties of Service Engine groups Explain Service Engine group high availability modes Describe and configure active-standby high availability mode Explain Service Engine placement in multiple availability zones for public clouds Describe and configure elastic HA high availability mode (Active-Active, N+M) Explain Service Engine failure detection and self-healing Describe Service Engine as a router Explain virtual service scale-out options such as Layer 2 (Native), Layer 3 (BGP), and DNS-based Describe how to upgrade NSX Advanced Load Balancer Introduction to Cloud Connector Explain cloud connectors Review cloud connector integration modes List cloud connector types Review the different Service Engine image types in different ecosystems Installing, Configuring, and Managing NSX Advanced Load Balancer in No-Orchestrator Cloud Explain No-Access cloud concepts Configure No-Access cloud integration on bare metal Explain and configure Linux Server Cloud Explain and configure VMware No Orchestrator Describe the advanced configuration options available in bare metal (Linux Server Cloud) Installing, Configuring, and Managing NSX Advanced Load Balancer in VMware Environment: Cloud Configuration Introduce VMware integration options Explain and configure VMware Write Access Cloud Connector Explain NSX Advanced Load Balancer integration options in a VMware NSX environment Explain and configure NSX Cloud Connector for Overlay and VLAN-backed segments AWS Cloud Configuration Describe NSX Advanced Load Balancer public cloud integrations Explain different AWS components Explain and demonstrate AWS public cloud integration Deploy VMware NSX Advanced Load Balancer Controller, SEs, and virtual services in AWS Cloud Review Multi-AZ Support for virtual services in AWS cloud GCP Cloud Configuration Explain different GCP components Explain and demonstrate GCP public cloud integration Deploy NSX Advanced Load Balancer Controller, SEs, and virtual services in GCP cloud Azure Cloud Configuration Describe NSX Advanced Load Balancer public cloud integrations Explain different Microsoft Azure components Explain and demonstrate Azure public cloud integration Deploy NSX Advanced Load Balancer Controller, SEs, and virtual services in Azure Cloud NSX Advanced Load Balancer Enterprise with Cloud Services (Avi Pulse) Describe NSX Advanced Load Balancer public cloud services Explain different features of NSX Advanced Load Balancer Cloud Services Register the controller with Cloud Services DNS Foundations Review, discuss, and explain DNS fundamentals Describe NSX Advanced Load Balancer DNS and IPAM providers Global Server Load Balancing (GSLB) Introduce Global Server load balancing concepts and benefits Explain and configure the NSX Advanced Load Balancer infrastructure Explain and configure the DNS Virtual Service components Explain and configure GSLB Service Engine Group Describe and configure GSLB sites Explain and configure basic GSLB services to include pools and health monitors Describe GSLB Server Load Balancing algorithms Explain and configure health monitors based on data plane and control plane Describe GSLB Health Monitor Proxy Explain GSLB Site-Cookie Persistence Explain the different GSLB replication methods Role-Based Access Control (RBAC) Introduce local authentication in NSX Advanced Load Balancer Introduce remote authentication in NSX Advanced Load Balancer Review the different types of remote authentication Explain granular RBAC using labels NSX Advanced Load Balancer: Troubleshooting Introduce infrastructure and application troubleshooting concepts Describe troubleshooting based on control plane and data plane Explain application analytics and logs Describe client logs analysis Explain headers troubleshooting and packet capture mechanism Describe how to use CLI for detailed data plane troubleshooting Explain Service Engine logs Explain health monitors troubleshooting Explain BGP session troubleshooting Describe control plane troubleshooting, clustering, and cloud connector issues Events and Alerts Describe NSX Advanced Load Balancer events Describe and configure NSX Advanced Load Balancer alerts Describe NSX Advanced Load Balancer monitoring capabilities with SNMP, Syslog, and Email Introduction to NSX Advanced Load Balancer Rest API Introduce the NSX Advanced Load Balancer REST API interface Describe REST API Object Schema Explain and interact with REST API interface with

VMware NSX Advanced Load Balancer: Install, Configure, Manage [V21.x]
Delivered OnlineFlexible Dates
Price on Enquiry

In the past, popular thought treated artificial intelligence (AI) as if it were the domain of science fiction or some far-flung future. In the last few years, however, AI has been given new life. The business world has especially given it renewed interest. However, AI is not just another technology or process for the business to consider - it is a truly disruptive force.

AI For Leaders
Delivered in Loughborough or UK Wide or OnlineFlexible Dates
£50

Cisco Implementing and Operating Cisco Security Core Technologies v1.0 (SCOR)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Security engineer Network engineer Network designer Network administrator Systems engineer Consulting systems engineer Technical solutions architect Network manager Cisco integrators and partners Overview After taking this course, you should be able to: Describe information security concepts and strategies within the network Describe common TCP/IP, network application, and endpoint attacks Describe how various network security technologies work together to guard against attacks Implement access control on Cisco ASA appliance and Cisco Firepower Next-Generation Firewall Describe and implement basic email content security features and functions provided by Cisco Email Security Appliance Describe and implement web content security features and functions provided by Cisco Web Security Appliance Describe Cisco Umbrella security capabilities, deployment models, policy management, and Investigate console Introduce VPNs and describe cryptography solutions and algorithms Describe Cisco secure site-to-site connectivity solutions and explain how to deploy Cisco Internetwork Operating System (Cisco IOS) Virtual Tunnel Interface (VTI)-based point-to-point IPsec VPNs, and point-to-point IPsec VPN on the Cisco ASA and Cisco Firepower Next-Generation Firewall (NGFW) Describe and deploy Cisco secure remote access connectivity solutions and describe how to configure 802.1X and Extensible Authentication Protocol (EAP) authentication Provide basic understanding of endpoint security and describe Advanced Malware Protection (AMP) for Endpoints architecture and basic features Examine various defenses on Cisco devices that protect the control and management plane Configure and verify Cisco IOS software Layer 2 and Layer 3 data plane controls Describe Cisco Stealthwatch Enterprise and Stealthwatch Cloud solutions Describe basics of cloud computing and common cloud attacks and how to secure cloud environment The Implementing and Operating Cisco Security Core Technologies (SCOR) v1.0 course helps you prepare for the Cisco© CCNP© Security and CCIE© Security certifications and for senior-level security roles. In this course, you will master the skills and technologies you need to implement core Cisco security solutions to provide advanced threat protection against cybersecurity attacks. You will learn security for networks, cloud and content, endpoint protection, secure network access, visibility, and enforcements. You will get extensive hands-on experience deploying Cisco Firepower© Next-Generation Firewall and Cisco Adaptive Security Appliance (ASA) Firewall; configuring access control policies, mail policies, and 802.1X Authentication; and more. You will get introductory practice on Cisco Stealthwatch© Enterprise and Cisco Stealthwatch Cloud threat detection features. This course, including the self-paced material, helps prepare you to take the exam, Implementing and Operating Cisco Security Core Technologies (350-701 SCOR), which leads to the new CCNP Security, CCIE Security, and the Cisco Certified Specialist - Security Core certifications. Describing Information Security Concepts* Information Security Overview Assets, Vulnerabilities, and Countermeasures Managing Risk Vulnerability Assessment Understanding Common Vulnerability Scoring System (CVSS) Describing Common TCP/IP Attacks* Legacy TCP/IP Vulnerabilities IP Vulnerabilities Internet Control Message Protocol (ICMP) Vulnerabilities TCP Vulnerabilities User Datagram Protocol (UDP) Vulnerabilities Attack Surface and Attack Vectors Reconnaissance Attacks Access Attacks Man-in-the-Middle Attacks Denial of Service and Distributed Denial of Service Attacks Reflection and Amplification Attacks Spoofing Attacks Dynamic Host Configuration Protocol (DHCP) Attacks Describing Common Network Application Attacks* Password Attacks Domain Name System (DNS)-Based Attacks DNS Tunneling Web-Based Attacks HTTP 302 Cushioning Command Injections SQL Injections Cross-Site Scripting and Request Forgery Email-Based Attacks Describing Common Endpoint Attacks* Buffer Overflow Malware Reconnaissance Attack Gaining Access and Control Gaining Access via Social Engineering Gaining Access via Web-Based Attacks Exploit Kits and Rootkits Privilege Escalation Post-Exploitation Phase Angler Exploit Kit Describing Network Security Technologies Defense-in-Depth Strategy Defending Across the Attack Continuum Network Segmentation and Virtualization Overview Stateful Firewall Overview Security Intelligence Overview Threat Information Standardization Network-Based Malware Protection Overview Intrusion Prevention System (IPS) Overview Next Generation Firewall Overview Email Content Security Overview Web Content Security Overview Threat Analytic Systems Overview DNS Security Overview Authentication, Authorization, and Accounting Overview Identity and Access Management Overview Virtual Private Network Technology Overview Network Security Device Form Factors Overview Deploying Cisco ASA Firewall Cisco ASA Deployment Types Cisco ASA Interface Security Levels Cisco ASA Objects and Object Groups Network Address Translation Cisco ASA Interface Access Control Lists (ACLs) Cisco ASA Global ACLs Cisco ASA Advanced Access Policies Cisco ASA High Availability Overview Deploying Cisco Firepower Next-Generation Firewall Cisco Firepower NGFW Deployments Cisco Firepower NGFW Packet Processing and Policies Cisco Firepower NGFW Objects Cisco Firepower NGFW Network Address Translation (NAT) Cisco Firepower NGFW Prefilter Policies Cisco Firepower NGFW Access Control Policies Cisco Firepower NGFW Security Intelligence Cisco Firepower NGFW Discovery Policies Cisco Firepower NGFW IPS Policies Cisco Firepower NGFW Malware and File Policies Deploying Email Content Security Cisco Email Content Security Overview Simple Mail Transfer Protocol (SMTP) Overview Email Pipeline Overview Public and Private Listeners Host Access Table Overview Recipient Access Table Overview Mail Policies Overview Protection Against Spam and Graymail Anti-virus and Anti-malware Protection Outbreak Filters Content Filters Data Loss Prevention Email Encryption Deploying Web Content Security Cisco Web Security Appliance (WSA) Overview Deployment Options Network Users Authentication Secure HTTP (HTTPS) Traffic Decryption Access Policies and Identification Profiles Acceptable Use Controls Settings Anti-Malware Protection Deploying Cisco Umbrella* Cisco Umbrella Architecture Deploying Cisco Umbrella Cisco Umbrella Roaming Client Managing Cisco Umbrella Cisco Umbrella Investigate Overview and Concepts Explaining VPN Technologies and Cryptography VPN Definition VPN Types Secure Communication and Cryptographic Services Keys in Cryptography Public Key Infrastructure Introducing Cisco Secure Site-to-Site VPN Solutions Site-to-Site VPN Topologies IPsec VPN Overview IPsec Static Crypto Maps IPsec Static Virtual Tunnel Interface Dynamic Multipoint VPN Cisco IOS FlexVPN Deploying Cisco IOS VTI-Based Point-to-Point IPsec VPNs Cisco IOS VTIs Static VTI Point-to-Point IPsec Internet Key Exchange (IKE) v2 VPN Configuration Deploying Point-to-Point IPsec VPNs on the Cisco ASA and Cisco Firepower NGFW Point-to-Point VPNs on the Cisco ASA and Cisco Firepower NGFW Cisco ASA Point-to-Point VPN Configuration Cisco Firepower NGFW Point-to-Point VPN Configuration Introducing Cisco Secure Remote Access VPN Solutions Remote Access VPN Components Remote Access VPN Technologies Secure Sockets Layer (SSL) Overview Deploying Remote Access SSL VPNs on the Cisco ASA and Cisco Firepower NGFW Remote Access Configuration Concepts Connection Profiles Group Policies Cisco ASA Remote Access VPN Configuration Cisco Firepower NGFW Remote Access VPN Configuration Explaining Cisco Secure Network Access Solutions Cisco Secure Network Access Cisco Secure Network Access Components AAA Role in Cisco Secure Network Access Solution Cisco Identity Services Engine Cisco TrustSec Describing 802.1X Authentication 802.1X and Extensible Authentication Protocol (EAP) EAP Methods Role of Remote Authentication Dial-in User Service (RADIUS) in 802.1X Communications RADIUS Change of Authorization Configuring 802.1X Authentication Cisco Catalyst© Switch 802.1X Configuration Cisco Wireless LAN Controller (WLC) 802.1X Configuration Cisco Identity Services Engine (ISE) 802.1X Configuration Supplicant 802.1x Configuration Cisco Central Web Authentication Describing Endpoint Security Technologies* Host-Based Personal Firewall Host-Based Anti-Virus Host-Based Intrusion Prevention System Application Whitelists and Blacklists Host-Based Malware Protection Sandboxing Overview File Integrity Checking Deploying Cisco Advanced Malware Protection (AMP) for Endpoints* Cisco AMP for Endpoints Architecture Cisco AMP for Endpoints Engines Retrospective Security with Cisco AMP Cisco AMP Device and File Trajectory Managing Cisco AMP for Endpoints Introducing Network Infrastructure Protection* Identifying Network Device Planes Control Plane Security Controls Management Plane Security Controls Network Telemetry Layer 2 Data Plane Security Controls Layer 3 Data Plane Security Controls Deploying Control Plane Security Controls* Infrastructure ACLs Control Plane Policing Control Plane Protection Routing Protocol Security Deploying Layer 2 Data Plane Security Controls* Overview of Layer 2 Data Plane Security Controls Virtual LAN (VLAN)-Based Attacks Mitigation Sp

Cisco Implementing and Operating Cisco Security Core Technologies v1.0 (SCOR)
Delivered OnlineFlexible Dates
Price on Enquiry

Professional Photography

By NextGen Learning

Course Overview The Professional Photography course provides a comprehensive journey into the world of photography, blending creative techniques with technical understanding. This course covers everything from mastering exposure and digital photography to exploring specialist scenarios such as portraits, landscapes, macro, and aerial photography. Learners will gain an in-depth understanding of camera anatomy, lighting, white balance, and post-production editing using industry-standard tools like Photoshop and Lightroom. Whether learners wish to enhance personal skills or pursue professional ambitions, this course equips them with the expertise to produce high-quality photographic work. By the end of the course, learners will be able to demonstrate proficiency across diverse photography styles, effectively manage photography equipment, and refine their editing capabilities. In addition, guidance on starting a photography business and selling work will support those looking to monetise their skills. This course offers valuable knowledge for both career development and personal enrichment in the creative industry. Course Description This course delves deeply into the art and science of photography, providing learners with a structured pathway to master both foundational principles and advanced techniques. Beginning with an introduction to camera settings, exposure, and digital photography, it progresses through specialised topics including focus and depth of field, lighting control, and the use of various photographic equipment. Learners will engage with diverse photography scenarios such as street photography, events, wildlife, and product shoots, developing a versatile skill set suitable for a range of professional contexts. The curriculum also explores post-processing with software such as Photoshop CC, Lightroom Classic CC, and mobile editing tools like Snapseed and Photoshop Express. Furthermore, modules on business development and stock photography sales offer valuable insights into potential income streams. Delivered in an engaging and accessible format, this course ensures that learners acquire both creative and technical expertise, setting a strong foundation for future opportunities in photography. Course Modules Module 01: Introduction Module 02: Exposure Module 03: Digital Photography Masterclass Module 04: Focus and Depth of Field Module 05: Camera Anatomy Module 06: White Balance and Colour Module 07: Lighting Module 08: Mobile Photography Module 09: Equipment – Cameras Module 10: Equipment – Lenses Module 11: Equipment – Accessories Module 12: Photo Scenario – Portrait Module 13: Photo Scenario – Long Exposure Module 14: Photo Scenario – Landscape Module 15: Photo Scenario – Product Module 16: Photo Scenario – Low Light Module 17: Photo Scenario – Sports & Action Module 18: Photo Scenario – Macro Module 19: Photo Scenario – Street & Architecture Module 20: Photo Scenario – Events Module 21: Photo Scenario – Aerial Module 22: Photo Scenario – Night Module 23: Introduction to Photo Editing Module 24: Photoshop CC Module 25: Lightroom Classic CC Module 26: Lightroom CC Module 27: Mac Photos Module 28: Google Photos Module 29: Photoshop Express Module 30: Snapseed Module 31: Sharing Your Photos Module 32: Starting a Photo Business Module 33: Selling Stock Photos Module 34: Printing Module 35: Wildlife Module 36: Conclusion (See full curriculum) Who is this course for? Individuals seeking to develop creative and technical photography skills. Professionals aiming to expand their visual media expertise. Beginners with an interest in photography and digital editing. Entrepreneurs wishing to build a photography business. Hobbyists looking to refine their photographic techniques. Career Path Professional Photographer Freelance Photojournalist Event and Wedding Photographer Wildlife Photographer Digital Content Creator Stock Photography Contributor Photography Business Owner Visual Media Consultant

Professional Photography
Delivered OnlineFlexible Dates
£9.99

Using Magicplan with Heat Engineer

3.7(8)

By Heat Engineer

We will show you how Heat Engineer Software uses Magicplan drawings in 2D and 3D to complete a detailed room by room heat loss in minutes.

Using Magicplan with Heat Engineer
Delivered OnlineFlexible Dates
FREE

Becoming Anxiety Free with NLP

By Proactive NLP Ltd

Become free from Anxiety and say goodbye to managing your anxiety and start living a happy and content life. This masterclass will show you can change how your mind works to eliminate the negative and debilitating emotional impact of anxiety, once and for all!

Becoming Anxiety Free with NLP
Delivered OnlineFlexible Dates
£65

C To Master Skill: Learn C Programming Technique

By simplivlearning

Step by Step explanation of each topics in C Language with lots of programs.

C To Master Skill: Learn C Programming Technique
Delivered OnlineFlexible Dates
£10

SGI Webinar - THOUGHT LEADERSHIP WEBINAR

By Centre for Competitiveness

Learn how to drive innovation in your organisation and foster a creative, adaptive and sustainable work environment.

SGI Webinar - THOUGHT LEADERSHIP WEBINAR
Delivered OnlineFlexible Dates
FREE