• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

5476 Software courses delivered Online

Amazon VPC Mastery for AWS Certifications

By Packt

Learning AWS VPC would be your stepping stone into an AWS career. A good understanding of VPC and its components is a MUST going into any AWS certification. Get started with Amazon VPC and prepare for certification with the help of this comprehensive course. There are no prerequisite requirements for this course.

Amazon VPC Mastery for AWS Certifications
Delivered Online On Demand5 hours 11 minutes
£41.99

DevSecOps Foundation (DSOF)?

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The target audience for the DevSecOps Foundation course are professionals including: Anyone involved or interested in learning about DevSecOps strategies and automation Anyone involved in Continuous Delivery toolchain architectures Compliance Team Business managers Delivery Staff DevOps Engineers IT Managers IT Security Professionals, Practitioners, and Managers Maintenance and support staff Managed Service Providers Project & Product Managers Quality Assurance Teams Release Managers Scrum Masters Site Reliability Engineers Software Engineers Testers Overview You will learn: The purpose, benefits, concepts, and vocabulary of DevSecOps How DevOps security practices differ from other security approaches Business-driven security strategies and Best Practices Understanding and applying data and security sciences Integrating corporate stakeholders into DevSecOps Practices Enhancing communication between Dev, Sec, and Ops teams How DevSecOps roles fit with a DevOps culture and organization In this course, students will gain a solid understanding of how DevSecOps provides business value, enhancing your business opportunities, and improving corporate value. The core DevSecOps principles taught can support an organizational transformation, increase productivity, reduce risk, and optimize resource usage. This course explains how DevOps security practices differ from other approaches then delivers the education needed to apply changes to your organization. Participants learn the purpose, benefits, concepts, vocabulary and applications of DevSecOps. Most importantly, students learn how DevSecOps roles fit with a DevOps culture and organization. At the course?s end, participants will understand ?security as code? to make security and compliance value consumable as a service. This course prepares you for the DevSecOps Foundation (DSOF) certification. Realizing DevSecOps Outcomes Origins of DevOps Evolution of DevSecOps CALMS The Three Ways Defining the Cyberthreat Landscape What is the Cyber Threat Landscape? What is the threat? What do we protect from? What do we protect, and why? How do I talk to security? Building a Responsive DevSecOps Model Demonstrate Model Technical, business and human outcomes What?s being measured? Gating and thresholding Integrating DevSecOps Stakeholders The DevSecOps State of Mind The DevSecOps Stakeholders What?s at stake for who? Participating in the DevSecOps model Establishing DevSecOps Best Practices Start where you are Integrating people, process and technology and governance DevSecOps operating model Communication practices and boundaries Focusing on outcomes Best Practices to get Started The Three Ways Identifying target states Value stream-centric thinking DevOps Pipelines and Continuous Compliance The goal of a DevOps pipeline Why continuous compliance is important Archetypes and reference architectures Coordinating DevOps Pipeline construction DevSecOps tool categories, types and examples Learning Using Outcomes Security Training Options Training as Policy Experiential Learning Cross-Skilling The DevSecOps Collective Body of Knowledge Preparing for the DevSecOps Foundation certification exam Additional course details: Nexus Humans DevSecOps Foundation (DevOps Institute) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the DevSecOps Foundation (DevOps Institute) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

DevSecOps Foundation (DSOF)?
Delivered OnlineFlexible Dates
£1,495

PowerShell for Automating Administration

By Packt

A knowledge of Windows PowerShell is a must for IT professionals and this course is a one-stop-shop for gaining this necessary and in-demand skill. This course is designed to take system administrators to an advanced level in PowerShell scripting. You will find ways to automate your daily work using the advantages of PowerShell scripting.

PowerShell for Automating Administration
Delivered Online On Demand4 hours 30 minutes
£82.99

Essential 5G

5.0(3)

By Systems & Network Training

Essential 5G training course description This course is designed to give delegates an explanation of the technologies and interworking requirements of the next generation of cellular communications. It is not a definitive set of descriptions but a possibility of the final deployment. we will investigate the 10 pillars for 5G which will include various Radio Access Technologies that are required to interwork smoothly. We will look at the 4G Pro features and other RATs. What will you learn List the ten pillars of 5G deployment. Describe the 5G Internet. Explain virtualization and RAT virtulization. Describe Software Defined Networks (SDN). Explain carrier aggregation. Describe the mobile cloud. Explain an overall picture of 5G architecture. Essential 5G training course details Who will benefit: Anyone looking for an understanding of the technologies and interworking requirements of the next generation of cellular communications. Prerequisites: None. Duration 3 days Essential 5G training course contents Drivers for 5G 5G Road Map, 10 Pillars of 5G, evolving RATs, oSON, MTCm, mm-wave, backhaul, EE, new spectrum, spectrum sharing, RAN virtualisation. 4G LTE Advanced MIMO technology in release 8, Downlink & uplink MIMO R8, MIMO technology in LTE advanced, Downlink 8-layer SU-MIMO, Downlink MU-MIMO, Uplink MU-MIMO, Uplink transmit diversity, Coordinated multi-point operation (CoMP), Independent eNB & remote base station configurations, Downlink CoMP. ICIC & eICIC ICIC, Homogeneous to heterogeneous network evolution, Introduction to eICIC, Macro-pico scenario, Macro-femto scenario, Time orthogonal frequencies. Almost Blank Subframe (ABS). Carrier aggregation Component carriers (CC), CC aggregation deployments, Intra-band contiguous solutions, Intra-band non-contiguous solutions, Inter-band non-contiguous solutions, CA bandwidth classes, Aggregated transmission bandwidth configurations (ATBC), Possible carrier aggregation configs. eIMTA TDD UL-DL reconfig. for traffic adaptation, Reconfig. mechanisms, Interference mitigation schemes, Dynamic & flexible resource allocation. 5G architectures 5G in Europe, horizon 2020 framework, 5G infrastructure PPP, METIS project, 5G in North America, academy research, company R&D, 5G specifications. The 5G internet High-level view of Cloud Services, The Internet of Things & context awareness, Network reconfiguration & virtualization support, server proliferation, how VMs fix underutilised server problem, enter the hypervisor, why are VM such a big deal? SDN, evolution of the data centre network, high availability, low latency, scalability, security, cost model explodes, service-oriented API. OpenFlow switches, OpenFlow controllers, how SDN works. The big picture, pulling it all together, why the network had to change, how SDN & NFV tie together. Evolutionary approach to the internet, architectures for distributed mobility management, MEDIEVAL & MEDIVO projects, a clean slate approach, mobility first architecture. VNet, INM, NetInf, ForMux, MEEM. Generic Path (GP) & anchorless mobility (AM), Quality of Service support, network resource provisioning, resourcing inside a network. IntServ, RSVP, DiffServ, CoS. Emerging approach for resource over- provisioning, example use case architecture for scalable resource control scenarios in the 5G internet. Integrating SDN/NFV for efficient resource over-reservation control, control information repository, service admission control policies, network resource provisioning, control enforcement functions, network configurations & operations. Small cells for 5G Average spectral efficiency evolution, WiFi & Femto cells, Capacity limits. Achievable gains with densifications, multi-antenna techniques, small cells. Mobile data demand, approach & methodology, subscriber density and traffic demand projections to 2020. Demand versus capacity, global mobile data traffic increase modelling, country level backhaul traffic projections, Small cell challenges, backhaul, spectrum, automation. Cooperation for next gen wireless networks Diversity & relaying strategies, cooperation & network coding, ARQ & MAC protocols, NCCARQ & PRCSMA packet exchange, Physical layer impact on MAC protocol analysis, NCCARQ overview, PHY layer impact, Case study on NCCARQ. Mobile clouds Mobile cloud, Mobile cloud enablers, mobile user domain, wireless technologies, WWAN WLAN and WPAN range, Bluetooth, IEEE.802.15.4 & software stacks, infrared, near field communications (NFC). Network coding, store & forward vs compute & forward, linear network coding, random linear coding. Security for 5G communications Potential 5G communication systems architectures, Security issues & challenges. Mobile malware attacks targeting the UE, 5G mobile botnets, access networks, attacks on 4G networks, C-RNTI & packet sequence number based UE location tracking, false buffer status reports attacks, message insertion attacks, HeNB attacks, physical attacks, credential attacks, configuration and protocol attacks, attacks on MON, user data & identity attacks, mobile operator's core network, DDoS attacks targeting MON, signalling amplification, HSS saturation, external IP networks.

Essential 5G
Delivered in Internationally or OnlineFlexible Dates
£2,367

Remote Policy Evaluation Methods May 2025

By Institute for Fiscal Studies

The course covers research design principles and all main quantitative evaluation methods: randomised experiments, instrumental variables, sharp and fuzzy regression discontinuity designs, regression methods, matching methods and longitudinal methods (before-after, difference-in-differences and synthetic controls).

Remote Policy Evaluation Methods May 2025
Delivered Online
£450 to £1,662

Kotlin for Android: Beginner to Advanced

By Course Cloud

Course Overview Kotlin is one of the most widely used Android app development programming languages, used by the world's most powerful companies, including Google, Facebook and Microsoft. The Kotlin for Android: Beginner to Advanced course will teach you the A-Z of Kotlin applications and how to program them. Starting from the very basics, it will guide you step-by-step through the installation procedures for Windows, Mac, and Linux, as well as the process for building an Android app using Kotlin programming language. This practical training course is ideal for aspiring Android developers, software engineers and anyone looking to learn how to program Kotlin applications through the guidance of an expert. Fast track your career today and add value to your resume with an industry-recognised certificate. This best selling Kotlin for Android: Beginner to Advanced has been developed by industry professionals and has already been completed by hundreds of satisfied students. This in-depth Kotlin for Android: Beginner to Advanced is suitable for anyone who wants to build their professional skill set and improve their expert knowledge. The Kotlin for Android: Beginner to Advanced is CPD-accredited, so you can be confident you're completing a quality training course will boost your CV and enhance your career potential. The Kotlin for Android: Beginner to Advanced is made up of several information-packed modules which break down each topic into bite-sized chunks to ensure you understand and retain everything you learn. After successfully completing the Kotlin for Android: Beginner to Advanced, you will be awarded a certificate of completion as proof of your new skills. If you are looking to pursue a new career and want to build your professional skills to excel in your chosen field, the certificate of completion from the Kotlin for Android: Beginner to Advanced will help you stand out from the crowd. You can also validate your certification on our website. We know that you are busy and that time is precious, so we have designed the Kotlin for Android: Beginner to Advanced to be completed at your own pace, whether that's part-time or full-time. Get full course access upon registration and access the course materials from anywhere in the world, at any time, from any internet-enabled device.  Our experienced tutors are here to support you through the entire learning process and answer any queries you may have via email.

Kotlin for Android: Beginner to Advanced
Delivered Online On Demand
£319

IT Course

By KEMP CENTER

Develop and improve your IT knowledge and skills and advance your career A comprehensive IT course with both theoretical explanation and practical exercises to teach you, improve your IT skills, and advance your career. The course is delivered by an IT expert trainer with many years of experience in the field of information technology. Successfully complete the practical tasks and tests through the course and the final exam to consolidate your knowledge and skills. We created a professionally designed, advanced IT course to answer all your needs. We created an IT guide for all newcomers in the field and suitable for those already involved in IT service at the same time. It will make you proficient in the most important aspects of IT so you can enjoy limitless career prospects worldwide. The course will be delivered through a multimedia platform Kemp Center and will eventually bring you a valuable certificate of completion. It gives you the opportunity to study at any time in the comfort of your own home and at your own pace from any device that has an internet connection. It is designed for everyone interested in the IT field. The course begins with an introduction to information technology; and then explores computer hardware and software; operating systems, how they interact with computer hardware, and how to start up, install and uninstall the most widely used operating systems today – Windows and Linux. You will also learn about the Internet and networking, database systems and data analytics, the importance of troubleshooting and customer support, information assurance, and security. This course will enrich you with both, theoretical knowledge and practical skills that will help you start your IT career from 0, or to improve further your career getting more advanced IT roles. Join the communication course and get the benefits: Learning from a professional instructor24/7 access from any devicePractical exercisesTests, quizzes and recapsCertificate of completionExtra materials and downloadable bonuses100% satisfaction guarantee Your Singing Instructor: Toni Matthijs IT Expert The Information technology course will be delivered by Toni Matthijs -an IT expert, the best one in the field with many years of experience and an active role in information technology. Our IT expert will introduce you to the world of Information technology very carefully and detailed and will teach you how to properly organize and store data using various telecommunication systems. You will learn about computer hardware and software, about today’s most widely used operating systems: Windows and Linux, about Internet and networking, database systems and data analytics, troubleshooting and customer service, information assurance, and security. Your expert trainer will assist you and guide you through several knowledge repetitions, practical tasks, and tests to make sure you remember all the important information and consolidate your gained knowledge even better. In the end, you will be capable to use everything you learned in practice like an IT master. Overview of the course: Detailed video presentation Practical knowledge about business administration Practical knowledge of information technology, from installing software to managing databases. The course touches on selected topics in IT fundamentals among others: computer hardware and software, operating systems, installing, updating and uninstalling computer software, networking, databases and data analytics, troubleshooting and customer support, information assurance and security. Real examples of IT environment Assembling a computer from scratch, installing operating system on computer, installing, updating and uninstalling software on Windows and Linux, networking, creating database, stages of analytics process, using troubleshooting skills to solve a problem, developing an effective strategy for information assurance and security. Training videos In the course, you will find many training videos and video tutorials that will provide you with deeper knowledge about IT field and with practical IT skills that you can implement in your everyday IT tasks. 1. Hardware This section will introduce you the computer inside. Actually, you will learn all the components or different pieces inside a computer that together present the computer hardware. You will discover the function of each component and how all hardware components work together to make a computer function. By the end of this module, you will be able to build a computer from scratch! 2. Operating system In this section you will become familiar with operating systems, particularly those that are most widely used today and learn how an operating system interacts with computer hardware. 3. Networking This unit will introduce you to computer networking in practical and theoretical way. 4. Software This section focuses on computer software. By the end of this module, you will be able to install, update and remove software on both Windows and Linux operating systems. 5. Data analysis This section gives an overview of the concepts related to data analysis. 6. Troubleshooting and customer support In this section of the course, you’ll learn about the importance of troubleshooting and customer support. By the end of this module, you will utilize soft skills and write documentation to communicate with others. 7. Security and information assurance The last section of the course is a survey of the fundamental elements of computer security and information assurance. Knowledge repetitions and tests Repetitions of acquired knowledge and tests This course begins with a comprehensive introduction to the world of information technology. Through the course, you will have 9 repetitions and 9 tests that will allow you to check the acquired knowledge and better remember the topics discussed in the course. Final test Passing the final test means that you have enough knowledge and skills in the field of information technology and that you became a certified IT, expert. Practical tasks Practical tasks about: Counting in binary Assemble a computer from scratch Choose and install an operating system on a computer IP addressing and sub-netting Installing software on Windows Creating database, importing and exporting information for use in another application Using data to drive successful outcomes Troubleshooting Developing an effective information assurance strategy Bonus materials for the course: Advice on how to develop an effective strategy for information assurance and security A practical guide on how to install, update and uninstall operation systems, software, and other applications on the computer List of practical advice on how to improve your IT skill Practical guide on how to assemble a computer from scratch and how to work with computers successfully A letter from your expert instructor: The world of IT management is growing at a rapid pace and having the right skills and experience can help you develop and further improve your qualifications that will lead you to a lucrative career. We are pleased to present you and invite you to most popular and advanced study program for information technology – IT that aims to prepare you for a role of IT Specialist.In the course, you will be introduced to the world of IT through carefully, detailed developed lessons. The material shared covers plenty of IT topics and is designed to give you deeper knowledge of the IT field. The course will instruct you and teach you how to accomplish common IT tasks with the best tools and resources.This certificate course will equip you with the skills and working practices you need to apply to any IT job and that you need to succeed at all stages of your IT career. It will help you to develop and further improve your knowledge at a range of a master of IT.Investing in yourself is not wasting money and time, but a key for a better future ahead. Enroll our self-paced IT course now and start learning today, so you can benefit tomorrow!Toni Matthijs- IT Expert

IT Course
Delivered Online On Demand10 hours
£385

Use Cases for Business Analysis: Virtual In-House Training

By IIL Europe Ltd

Use Cases for Business Analysis: Virtual In-House Training The use case is a method for documenting the interactions between the user of a system and the system itself. Use cases have been in the software development lexicon for over twenty years, ever since it was introduced by Ivar Jacobson in the late 1980s. They were originally intended as aids to software design in object-oriented approaches. However, the method is now used throughout the Solution Development Life Cycle from elicitation through to specifying test cases, and is even applied to software development that is not object oriented. This course identifies how business analysts can apply use cases to the processes of defining the problem domain through elicitation, analyzing the problem, defining the solution, and confirming the validity and usability of the solution. What you will Learn You'll learn how to: Apply the use case method to define the problem domain and discover the conditions that need improvement in a business process Employ use cases in the analysis of requirements and information to create a solution to the business problem Translate use cases into requirements Getting Started Introductions Course structure Course goals and objectives Foundation Concepts Overview of use case modeling What is a use case model? The 'how and why' of use cases When to perform use case modeling Where use cases fit into the solution life cycle Use cases in the problem domain Use cases in the solution domain Use case strengths and weaknesses Use case variations Use case driven development Use case lexicon Use cases Actors and roles Associations Goals Boundaries Use cases though the life cycle Use cases in the life cycle Managing requirements with use cases The life cycle is use case driven Elicitation with Use Cases Overview of the basic mechanics and vocabulary of use cases Apply methods of use case elicitation to define the problem domain, or 'as is' process Use case diagrams Why diagram? Partitioning the domain Use case diagramming guidelines How to employ use case diagrams in elicitation Guidelines for use case elicitation sessions Eliciting the problem domain Use case descriptions Use case generic description template Alternative templates Elements Pre and post conditions Main Success Scenario The conversation Alternate paths Exception paths Writing good use case descriptions Eliciting the detailed workflow with use case descriptions Additional information about use cases Analyzing Requirements with Use Cases Use case analysis on existing requirements Confirming and validating requirements with use cases Confirming and validating information with use cases Defining the actors and use cases in a set of requirements Creating the scenarios Essential (requirements) use case Use case level of detail Use Case Analysis Techniques Generalization and Specialization When to use generalization or specialization Generalization and specialization of actors Generalization and specialization of use cases Examples Associating generalizations Subtleties and guidelines Use Case Extensions The <> association The <> association Applying the extensions Incorporating extension points into use case descriptions Why use these extensions? Extensions or separate use cases Guidelines for extensions Applying use case extensions Patterns and anomalies o Redundant actors Linking hierarchies Granularity issues Non-user interface use cases Quality considerations Use case modeling errors to avoid Evaluating use case descriptions Use case quality checklist Relationship between Use Cases and Business Requirements Creating a Requirements Specification from Use Cases Flowing the conversation into requirements Mapping to functional specifications Adding non-functional requirements Relating use cases to other artifacts Wire diagrams and user interface specifications Tying use cases to test cases and scenarios Project plans and project schedules Relationship between Use Cases and Functional Specifications System use cases Reviewing business use cases Balancing use cases Use case realizations Expanding and explaining complexity Activity diagrams State Machine diagrams Sequence diagrams Activity Diagrams Applying what we know Extension points Use case chaining Identifying decision points Use Case Good Practices The documentation trail for use cases Use case re-use Use case checklist Summary What did we learn, and how can we implement this in our work environment?

Use Cases for Business Analysis: Virtual In-House Training
Delivered OnlineFlexible Dates
£850

AutoCAD Basics to Intermediate Level Course Bespoke and 1-2-1

By Real Animation Works

Autocad face to face training customised and bespoke.

AutoCAD Basics to Intermediate Level Course Bespoke and 1-2-1
Delivered in London or OnlineFlexible Dates
£580

Basic Computer Literacy Training

5.0(1)

By Course Gate

Enroll in our Basic Computer Literacy Training course to gain essential skills in operating systems, software, hardware, and troubleshooting. Perfect for beginners, students, professionals, and anyone looking to improve their computer literacy.

Basic Computer Literacy Training
Delivered Online On Demand2 hours 31 minutes
£11.99