• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

5467 Software courses delivered Online

CertNexus Certified Cyber Secure Coder (CSC-210)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is designed for software developers, testers, and architects who design and develop software in various programming languages and platforms, including desktop, web, cloud, and mobile, and who want to improve their ability to deliver software that is of high quality, particularly regarding security and privacy. This course is also designed for students who are seeking the CertNexus Cyber Secure Coder (CSC) Exam CSC-210 certification Overview In this course, you will employ best practices in software development to develop secure software.You will: Identify the need for security in your software projects. Eliminate vulnerabilities within software. Use a Security by Design approach to design a secure architecture for your software. Implement common protections to protect users and data. Apply various testing methods to find and correct security defects in your software. Maintain deployed software to ensure ongoing security... The stakes for software security are very high, and yet many development teams deal with software security only after the code has been developed and the software is being prepared for delivery. As with any aspect of software quality, to ensure successful implementation, security and privacy issues should be managed throughout the entire software development lifecycle. This course presents an approach for dealing with security and privacy throughout the entire software development lifecycle. You will learn about vulnerabilities that undermine security, and how to identify and remediate them in your own projects. You will learn general strategies for dealing with security defects and misconfiguration, how to design software to deal with the human element in security, and how to incorporate security into all phases of development. Identifying the Need for Security in Your Software Projects Identify Security Requirements and Expectations Identify Factors That Undermine Software Security Find Vulnerabilities in Your Software Gather Intelligence on Vulnerabilities and Exploits Handling Vulnerabilities Handle Vulnerabilities Due to Software Defects and Misconfiguration Handle Vulnerabilities Due to Human Factors Handle Vulnerabilities Due to Process Shortcomings Designing for Security Apply General Principles for Secure Design Design Software to Counter Specific Threats Developing Secure Code Follow Best Practices for Secure Coding Prevent Platform Vulnerabilities Prevent Privacy Vulnerabilities Implementing Common Protections Limit Access Using Login and User Roles Protect Data in Transit and At Rest Implement Error Handling and Logging Protect Sensitive Data and Functions Protect Database Access Testing Software Security Perform Security Testing Analyze Code to find Security Problems Use Automated Testing Tools to Find Security Problems Maintaining Security in Deployed Software Monitor and Log Applications to Support Security Maintain Security after Deployment

CertNexus Certified Cyber Secure Coder (CSC-210)
Delivered Online
£2,085

55133 PowerShell for System Center Configuration Manager Administrators

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is intended for IT professionals who need to manage the day-to-day environment of an SCCM 2012 SP1 or newer environment. Knowledge of the workings of a standalone primary SCCM site and basic PowerShell experience is recommended. Overview Create additional site system roles on existing or new servers. Modify high level site settings. Create and modify Discovery Methods, Boundaries and Boundary Groups. Create Collections using any of the membership rules available. Delegate authority through Roles and Scopes. Install the Configuration Manager client, modify client settings and restrict access to site systems. Deploy software to clients. Deploy software updates to clients. Configure compliance settings targeted against collections. Modify settings that govern monitoring functions such as Alerts and Status Settings. Work with Task Sequences for Operating System Deployment. Write basic PowerShell scripts using cmdlets learned and scripting constructs to accomplish configuration tasks. This course provides students with the knowledge and skills needed to use PowerShell for System Center Configuration Manager (SCCM) administration. In this course, students learn how to access the PowerShell cmdlets included with SCCM 2012 R2 and use them to perform configuration tasks for a primary site. Individual cmdlets will be used in working with objects such as Boundaries, Boundary Groups, Collections, Software Deployment, Patching, Compliance Settings, OSD Task Sequences, and many others. Basic scripting will also be covered so that students can learn how to put PowerShell to use when working with large sets of objects. Prerequisites Basic Windows and Active Directory knowledge. Conceptual knowledge of Configuration Manager objects and how they interact. Basic experience performing configuration tasks in ECM using the graphical console. Experience working from a command prompt. Basic knowledge of the fundamentals of Windows PowerShell. 1 - REVIEW OF SYSTEM CENTER CONFIGURATION MANAGER CONCEPTS Architecture of an System Center 2012 Configuration Manager Installation Managing Assets Content Delivery and Management Security, Monitoring, and Remote Management 2 - MANAGING RESOURCES Implementing Discovery Organizing Resources with Collections Working with Boundaries 3 - WORKING WITH CLIENTS Installing the Configuration Manager Client Managing Client Settings Managing Client Operations Monitoring Client Status 4 - DISTRIBUTING SOFTWARE Configure the Software Distribution Components Working with Distribution Points Creating Content for Distribution Deploying Software Applications 5 - UPDATING SYSTEMS WITH WSUS AND SCCM Integrating Configuration Manager and WSUS Managing Updates through Software Update Groups Creating and Deploying Update Packages Working with Automatic Deployment Rules 6 - HOW POWERSHELL CAN MANAGE COMPLIANCE SETTINGS Creating Compliance Settings Objects Deploying and Monitor the Baseline 7 - CONFIGURING OPERATING SYSTEM DEPLOYMENT OBJECTS Preparing the OSD Environment Working with Task Sequences 8 - WORKING AT THE SITE LEVEL Modify the Site Adding Site System Roles Adding a Secondary Site 9 - SECURITY AND MONITORING Configuring Role Based Administration Implementing Endpoint Protection Configuring Monitoring Options 10 - USING POWERSHELL SCRIPTING TO AUTOMATE SCCM TASKS Review of Scripting Constructs Introduction to the Configuration Manager WMI Classes

55133 PowerShell for System Center Configuration Manager Administrators
Delivered Online
£1,785

SQL Intermediate Course, 3 Days

4.6(12)

By PCWorkshops

This Practical SQL course, is designed make you fully conversant with queries, DML and DDL statements. Hands-on, Practical SQL course. You will get the PCWorkshops SQL Course Certificate. Max 4 people per course, to keep it personalised.

SQL Intermediate Course, 3 Days
Delivered Online + more
£600

55399 Implementing and Managing Microsoft Intune

By Nexus Human

Duration 3 Days 18 CPD hours This three-day instructor-led course is aimed at modern device management professionals looking to manage their enterprise devices using Microsoft Intune. This course will cover Enrolment, Application Management, Endpoint Security and Windows Autopilot as well as Azure Active Directory Conditional Access and Identity Protection. The delegates will learn how to enroll devices, deploy applications and manage them to maximize user productivity and device security. 1: Introduction to Microsoft Intune Mobile Device Management Microsoft Intune Azure Active Directory AAD Identity Protection AAD Conditional Access 2: Microsoft Intune Device Management Enrolling Devices Device Compliance Device Profiles Device Updates 3: Microsoft Intune Application Management Application Management Deploying Applications Application Configuration Managing Applications Policy Sets and Guided Scenarios 4: Microsoft Intune Endpoint Security Security Baselines and tasks Antivirus Disk Encryption Firewall Atack Surface reduction Endpoint detection and response Account Protection 5: Deploying Windows with Windows Autopilot Windows Autopilot overview Preparing for Windows Autopilot deployment Deploying Windows 11 using Windows Autopilot 6: Microsoft Intune Additional and Premium Features Remote Help Tunnel for Mobile Application Management Endpoint Privilege Management Advanced Endpoint Analytics Additional course details: Nexus Humans 55399 Implementing and Managing Microsoft Intune training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the 55399 Implementing and Managing Microsoft Intune course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

55399 Implementing and Managing Microsoft Intune
Delivered Online + more
£1,785

DP-080T00 Querying Data with Microsoft Transact-SQL

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course can be valuable for anyone who needs to write basic SQL or Transact-SQL queries. This includes anyone working with data as a data analyst, a data engineer, a data scientist, a database administrator or a database developer. It can also be useful for others peripherally involved with data, or wanting to learn more about working with data such as solution architects, students and technology managers. This course will teach the basics of Microsoft's dialect of the standard SQL language: Transact-SQL. Topics include both querying and modifying data in relational databases that are hosted in Microsoft SQL Server-based database systems, including: Microsoft SQL Server, Azure SQL Database and, Azure Synapse Analytics. 1 - Introduction to Transact-SQL Work with schemas Explore the structure of SQL statements Examine the SELECT statement Work with data types Handle NULLs 2 - Sort and filter results in T-SQL Sort your results Limit the sorted results Page results Remove duplicates Filter data with predicates 3 - Combine multiple tables with JOINs in T-SQL Understand joins concepts and syntax Use inner joins Use outer joins Use cross joins Use self joins 4 - Write Subqueries in T-SQL Understand subqueries Use scalar or multi-valued subqueries Use self-contained or correlated subqueries 5 - Use built-in functions and GROUP BY in Transact-SQL Categorize built-in functions Use scalar functions Use ranking and rowset functions Use aggregate functions Summarize data with GROUP BY Filter groups with HAVING 6 - Modify data with T-SQL Insert data Generate automatic values Update data Delete data Merge data based on multiple tables Additional course details: Nexus Humans DP-080T00 Querying Data with Microsoft Transact-SQL training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the DP-080T00 Querying Data with Microsoft Transact-SQL course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

DP-080T00 Querying Data with Microsoft Transact-SQL
Delivered Online
£1,190

Python EVENINGS Course, Online Instructor-led

4.6(12)

By PCWorkshops

Basic Python syntax and principles of Object Orientated Programming. Most attendees are in-work IT Professional. Private individuals are also very welcome. Evening courses also running. Our Style: Hands-on, Practical Location: Online, Instructor-led Download: anaconda.com Duration: 6 weeks, 1 evening per week, 6pm - 8pm Times: arrange a time for your time zone

Python EVENINGS Course, Online Instructor-led
Delivered Online
£100

SQL Course Advanced, 2 Days

4.6(12)

By PCWorkshops

Practical SQL Advanced Intensive Course , exploring the advanced and less commonly used SQL Statements and techniques. We also learn Data Definition Language and Data Manipulation Language statements. as well as course automation of queries using T-SQL. Hands-on, Practical SQL Advanced Course. PCWorkshops SQL Advanced Course Certificate. Max 4 people per course; we keep it personalised.

SQL Course Advanced, 2 Days
Delivered Online + more
£450

Learn SQL Basics, 1-day Course, Online Instructor-Led

4.6(12)

By PCWorkshops

SQL Queries Course, 1-Day. Basic SQL syntax. This course is good for any database, covering standard SQL. Most attendees are in-work IT Professional. Private individuals are also very welcome.

Learn SQL Basics, 1-day Course, Online Instructor-Led
Delivered Online + more
£185

Oracle SQL Fundamentals, 3 Days

4.6(12)

By PCWorkshops

At this Oracle SQL Fundamentals course, we cover SQL queries, group by's , aggregates, joins, date-functions, String Functions, Random Functions, Math Functions, Insert, update and delete, Creating and changing tables, sub-queries in detail, views, stored procedures, custom functions, and table variables. Course level is beginners to intermediate.

Oracle SQL Fundamentals, 3 Days
Delivered Online + more
£750

Python Unittest Course

4.6(12)

By PCWorkshops

Python Unittest Course Summary. Testing plays a major role in software development. This course will explain Python Unit Testing using the unittest built-in module. We'll cover issues before going to the production itself and the basics of testing in Python. Location: Instructor-led, Online. Our Style: Hands-on, Practical Course. Group Size: Max 4 people per group. Qualification: PCWorkshops Unittest Certification Duration: 1-Day, 10am-5pm Unittest topics UnitTest Framework - Home UnitTest Framework - Overview UnitTest - Framework UnitTest - API UnitTest - Assertion UnitTest - Test Discovery UnitTest - Skip Test UnitTest - Exceptions Test UnitTest - Time Test UnitTest - Unittest2 UnitTest - Signal Handling UnitTest - Doctest UnitTest - Doctest API UnitTest - Py.test Module Nose Testing - Framework Nose Testing - Tools Included with Python Unittest Course Python Unittest Certificate on completion Python Unittest Videos Python Unittest Notes Python Unittest Examples Practical Python Unittest exercises

Python Unittest Course
Delivered Online + more
£120

Educators matching "Software"

Show all 2636
The Software Sustainability Institute

the software sustainability institute

About the Software Sustainability Institute Better software better research The Software Sustainability Institute motto. Cultivating research software to support world-class research Software is fundamental to research: 7 out of 10 researchers report their work would be impossible without it. From short, thrown-together temporary scripts to solving a specific problem, through an abundance of complex spreadsheets analysing collected data, to the hundreds of software engineers and millions of lines of code behind international efforts such as the Large Hadron Collider and the Square Kilometre Array, there are few areas of research where software does not have a fundamental role. Since 2010, the Software Sustainability Institute has facilitated the advancement of software in research by cultivating better, more sustainable, research software to enable world-class research (“Better software, better research”). In 2018, we were awarded funding from all seven research councils. Our mission is to become the world-leading hub for research software practice. The Institute is based at the Universities of Edinburgh, Manchester, Oxford and Southampton, and draws on a team of experts with a breadth of experience in software development, training, project and programme management, research facilitation, publicity and community engagement. The importance of sustainability Sustainability means that the software you use today will be available - and continue to be improved and supported - in the future. Expert knowledge Securing a future for research software requires more than just quality code, which is why, over the years, we have striven to help researchers build and use better software through better practices, and advocate for culture change within their communities and institutions. Building on our experience and expert understanding of the state of research software in the UK, our work focuses around four objectives: nurturing the growth of communities of practice to foster the sharing of expertise across the entire research community, conducting research to provide insight into the use of software in research, continuing enabling widespread adoption of research software practices, and offering training and guidance to help build a capable researcher community and increase the recognition of software in research.