• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

744 SQL courses

B6252 IBM Cognos Framework Manager: Design Metadata Models v11.1.x

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Data Modelers Overview Please refer to course overview This offering provides participants with introductory to advanced knowledge of metadata modeling concepts, and how to model metadata for predictable reporting and analysis results using IBM Cognos Framework Manager. Participants will learn the full scope of the metadata modeling process, from initial project creation, to publishing of metadata to the web, enabling end users to easily author reports and analyze data. Introduction to IBM Cognos Framework Manager Model data and identifying related data Define requirements and modeling strategies Overview of IBM Cognos Framework Manager Create a baseline project Extend a model Prepare reusable metadata Model for predictable results in IBM Cognos Framework Manager Identify query issues Identify reporting traps Model virtual star schemas Use query subjects, modify relationships, and consolidate metadata using virtual objects Create calculations, filter data, and customize metadata for runtime Implement a time dimension and specify determinants Model for presentation in IBM Cognos Framework Manager Create a presentation view Examine data source query subject types and stored procedure query subject types Specify data security and package security Specify object security and dynamic data security Create analysis objects Manage OLAP data sources Advanced capabilities in IBM Cognos Framework Manager Explore SQL generation and the use of governors Examine the use of IBM Cognos SQL and generated SQL for DMR data Other query considerations Use session parameters, prompt macros, and security macro functions Use materialized views, minimize SQL, and enable Dynamic Query Mode (DQM) DQM, CQM, caching metadata, query processing, aggregate calculation, and other ways to improve performance Extended capabilities in IBM Cognos Framework Manager Perform basic maintenance and management on a model Remap metadata to another source and import and link additional data sources Run scripts to automate or update a model and report on a model Segment a project, link a project, and branch a model Nest packages and specify package languages and functions Explore additional modeling techniques and customize metadata for a multilingual audience Additional course details: Nexus Humans B6252 IBM Cognos Framework Manager: Design Metadata Models v11.1.x training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the B6252 IBM Cognos Framework Manager: Design Metadata Models v11.1.x course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

B6252 IBM Cognos Framework Manager: Design Metadata Models v11.1.x
Delivered OnlineFlexible Dates
Price on Enquiry

Learn C# with Windows Forms and a Variety of Projects

By Packt

This course provides complete coverage of C# programming fundamentals and how to create an executable windows form project. You will be digging into the structures of Windows Forms to gain a detailed understanding and then sharpen your skills with the help of a variety of projects.

Learn C# with Windows Forms and a Variety of Projects
Delivered Online On Demand22 hours 19 minutes
£29.99

Business Intelligence Analyst Course

4.8(9)

By Skill Up

Unlock your potential as a Business Intelligence Analyst! Master data analysis, reporting, and visualisation skills to drive informed business decisions.

Business Intelligence Analyst Course
Delivered Online On Demand5 hours 14 minutes
£25

Cyber Security & Ethical Hacking

4.7(160)

By Janets

Register on the Cyber Security & Ethical Hacking today and build the experience, skills and knowledge you need to enhance your professional development and work towards your dream job. Study this course through online learning and take the first steps towards a long-term career. The course consists of a number of easy to digest, in-depth modules, designed to provide you with a detailed, expert level of knowledge. Learn through a mixture of instructional video lessons and online study materials. Receive online tutor support as you study the course, to ensure you are supported every step of the way. Get an e-certificate as proof of your course completion. The Cyber Security & Ethical Hacking is incredibly great value and allows you to study at your own pace. Access the course modules from any internet-enabled device, including computers, tablet, and smartphones. The course is designed to increase your employability and equip you with everything you need to be a success. Enrol on the now and start learning instantly! What You Get With The Cyber Security & Ethical Hacking Receive a e-certificate upon successful completion of the course Get taught by experienced, professional instructors Study at a time and pace that suits your learning style Get instant feedback on assessments 24/7 help and advice via email or live chat Get full tutor support on weekdays (Monday to Friday) Course Design The course is delivered through our online learning platform, accessible through any internet-connected device. There are no formal deadlines or teaching schedules, meaning you are free to study the course at your own pace. You are taught through a combination of Video lessons Online study materials Certification Upon successful completion of the course, you will be able to obtain your course completion e-certificate free of cost. Print copy by post is also available at an additional cost of £9.99 and PDF Certificate at £4.99. Who Is This Course For: The course is ideal for those who already work in this sector or are an aspiring professional. This course is designed to enhance your expertise and boost your CV. Learn key skills and gain a professional qualification to prove your newly-acquired knowledge. Requirements: The online training is open to all students and has no formal entry requirements. To study the Cyber Security & Ethical Hacking, all your need is a passion for learning, a good understanding of English, numeracy, and IT skills. You must also be over the age of 16. Course Content Introduction to Ethical Hacking Hacking Terms 00:07:00 VA vs PT and Rule of Engagement 00:09:00 Methodologies 00:07:00 Type of Pen Testing 00:06:00 Phases of Penetration Test 00:04:00 10 Steps to Follow 00:04:00 Setting up a Penetration Testing Lab What is Linux OS - Benefits 00:04:00 What is Kali Linux 00:03:00 Virtual Box Installation 00:06:00 Kali Linux Installation in VB 00:12:00 Install Metasploitable on Virtual Box 00:09:00 Install DVWA in Kali 00:18:00 Install TOR 00:09:00 Executing Basic Commands in Kali 00:12:00 Executing Advance Commands in Kali 00:14:00 Information Gathering What is Information Gathering 00:04:00 Maltego Part 1 00:07:00 Maltego Part 2 00:06:00 HTTrack 00:05:00 The Harvester 00:02:00 NSLookup 00:03:00 RedHawk 00:05:00 SHODAN 00:09:00 OSNIT Framework 00:05:00 Scanning and Enumeration What is Scanning 00:07:00 What is Nmap 00:05:00 Zenmap GUI 00:17:00 What is Enumeration 00:03:00 Types of Enumeration 00:03:00 Enumeration Using Hyena - 1 00:07:00 Enumeration Using Hyena - 2 00:06:00 VAPT What is Vulnerability Assessment 00:04:00 Phases of Vulnerability Assessment 00:08:00 Vulnerability Scoring Systems 00:09:00 Introduction to Nessus 00:05:00 Create and Configure Nessus Network Policy 00:08:00 Nessus Launch Scan and Analyse Result 00:08:00 Firewalls What is IDS 00:11:00 What Are Firewalls 00:10:00 What is DMZ 00:06:00 IDS Evasion Techniques 00:08:00 Firewall Evasion Techniques 00:09:00 Firewall Pentesting 00:02:00 WAPT Introduction to Web Servers 00:05:00 Types of Web Server Attacks 00:05:00 Web Server Penetration Testing 00:04:00 Countermeasures of Web Servers? 00:05:00 OWASP Top 10 Attacks Part 1 00:05:00 OWASP Top 10 Attacks Part 2 00:07:00 Website Foot Printing Part 1 00:05:00 Website Foot Printing Part 2 00:03:00 Command Execution Low 00:06:00 Command Execution Medium 00:07:00 Configuring Burp Suite 00:16:00 File Upload Low 00:10:00 File Upload Medium 00:07:00 File Upload High 00:08:00 SQL Injection 00:04:00 SQL Injection II 00:05:00 Manual SQL 00:17:00 Automating SQL 00:09:00 Countermeasures of SQL Injection 00:03:00 What Is XSS 00:03:00 Types of XSS 00:06:00 XSS Low 00:11:00 XSS Medium 00:05:00 XSS High 00:11:00 Countermeasures of XSS 00:04:00 What is CSRF 00:06:00 CSRF Practical 00:07:00 What is a Brute Force Attack? 00:05:00 Brute Force Political 00:18:00 Web Application Penetration Testing? 00:09:00 Web Application Countermeasures 00:06:00 Denial of Service What is Denial of Service (DOS)? 00:03:00 Types of DOS attack? 00:05:00 What is a BOTNET? 00:03:00 Malware Threats Introduction to Malware 00:09:00 Trojan 00:08:00 Types of Trojans 00:08:00 Viruses and Worms 00:07:00 Types of Viruses 00:10:00 Countermeasures 00:07:00 Social Engineering Introduction to Social Engineering 00:05:00 Social Engineering 00:06:00 Installing BeEF Framework 00:09:00 Getting User Credentials Using BeEF Framework 00:11:00 Cryptography Introduction to Cryptography 00:05:00 Symmetric Encryption 00:03:00 DES and AES 00:06:00 Asymmetric Encryption 00:03:00 RSA and Diffie 00:07:00 Hashing 00:07:00 Public Key Infrastructure (PKI) and Certificate Authority (CA) 00:10:00 Digital Signatures 00:09:00 Transport Layer Security (TLS) 00:04:00 Calculating One Way Hashes Using HashCal 00:04:00 Basic Data Encryption Advance and Decryption Package 00:05:00 Report Writing Introduction to Report Writing 00:08:00 Component of a Report 00:14:00 Bonus Section Why we need to fix vulnerabilities 00:05:00 Hacker Sponsored Security 00:03:00 Key Terms in Bug Bounty Program 00:05:00 Bug Bounty Definition 00:03:00 Public or Private Bug Bounty Program 00:04:00 What is HackerOne 00:05:00 Why Organizations will hire you 00:08:00

Cyber Security & Ethical Hacking
Delivered Online On Demand12 hours 17 minutes
£25

Google Cloud Engineer Associate Certification Bootcamp

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Cloud Solutions Architects  DevOps Engineers  Individuals using Google Cloud Platform who deploy applications, monitor operations, and manage enterprise solutions Overview At course completion, you will have attained knowledge of: Fundamentals of Google Cloud Platform (GCP) Google Cloud Storage Google Compute Engine Google Cloud SQL Load Balancing (LB) Google Cloud Monitoring Auto-Scaling Virtual Private Cloud (VPC) Network Cloud Identity and Access Management (IAM) Cloud CDN and DNS Cloud VPN Google Cloud Deployment Manager Google Container Engine Cloud Run Cloud Bigtable Cloud Datastore Cloud BigQuery Cloud DataFlow Cloud DataProc Cloud Pub/Sub In this course you will attain a deep knowledge of Google Cloud Platform infrastructure and design patterns on developing applications on GCP. This course will prepare you for the Google Cloud Architect Associate Certification Exam. Fundamentals of Google Cloud Platform (GCP) Overview Regions and Zones Review of major GCP services Google Cloud Storage Fundamental APIs Consistency Cloud Storage Namespace Buckets and Objects Bucket and Object Naming Guidelines Encryption Object Versioning Object Lifecycle Management Access Control Access Control Lists Signed URL Multipart upload Resumable upload Understanding Pricing for Cloud Storage Offline Media Import/Export Architecture case study of common Use Cases of Google Cloud Storage Hands-on: Cloud Storage Lab; Creating Buckets, objects, and managing access control Google Compute Engine Compute Engine Architecture VM Instances types Persistence Disks Images Generating Custom Images IP Addresses Static IPs Ephemeral Access Control Options IAM Service Account Monitoring Instances with Google Cloud Monitoring Compute Engine Networks and Firewalls Hands-on: Hosting an Application on Compute Engine Google Cloud SQL Core advantages of Cloud SQL Cloud SQL database instance types Access Control High availability options Failover Read replica Backup options On Demand Automated Understanding Pricing of Cloud SQL Load Balancing (LB) Fundamentals of a Load Balancer Network Load balancing HTTPS Load balancing Cross region Load balancing Content Load balancing Target proxies SSL Load Balancing Internal Load Balancing Network Load Balancing Understanding Pricing for Load Balancer Google Cloud Monitoring Architecture of Cloud Monitoring Supported metrics Stackdriver Monitoring APIs Auto-Scaling Overview of Autoscaling Auto-scaling Fundamentals Instance groups Templates Policies Decisions Hands-on: Deploying a scale application on GCP using Autoscaling, Compute Engine, Cloud SQL, Load Balancers. Virtual Private Cloud (VPC) Network Salient features of Virtual Private Cloud (VPC) Network Infrastructure Virtual Private Cloud (VPC) Networking Fundamentals Subnetworks Firewall Internal DNS Network Routes Hands-on: Hosting Secure Applications in Google Cloud VPC Networks Cloud Identity and Access Management (IAM) Introduction User and Service Accounts IAM Roles Policy Hands-on: Managing Users, Policies and Granting Roles using Service Accounts Cloud CDN and DNS What is CDN Google Cloud CDN Cloud CDN Concepts Some of the Cloud CDN Edge locations Cloud DNS Cloud DNS Terminologies Supported Record Types Hands-on: Moving an Existing Domain Name to Cloud DNS Cloud VPN Cloud VPN overview Types of Cloud VPN Specifications Maintenance and Availability Google Cloud Deployment Manager Deployment Manager Deployment Manager Fundamentals Runtime Configurator Quotas Hands-on: Generating and Creating Cloud Deployment Manager Template Google Container Engine Google Container Engine Overview Docker Overview Kubernetes Terminologies Replication Controller Deployment Price and Quotas Hands-on: Deploying WordPress Cluster using Container Engine Cloud Run Overview of Cloud Run Deploy a Prebuilt Sample container Cloud Bigtable Overview of Cloud Bigtable Access Control Performance Locations Cloud Datastore Overview of Cloud Datastore Limits Storage Size Multitenancy Benefits of Multitenancy Encryption Locations Cloud BigQuery BigQuery Overview Interacting with BigQuery Datasets, Tables, and Views Partitioned Tables Query Plan Explanation Hands-on: Getting Started with BigQuery Cloud DataFlow Overview Programming Model DataFlow SDK 1.x for java Cloud Dataflow SDK 2.x Security and Permissions Advanced Access Control Cloud DataProc Overview Clusters Versioning Cloud Pub/Sub Overview of Cloud Pub/Sub Pub/Sub Concepts and Message Flow Data Model Cleanup of All Services Hands-on: Cloud Pub/Sub Lab with Background Cloud Function Additional course details: Nexus Humans Google Cloud Engineer Associate Certification Bootcamp training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Google Cloud Engineer Associate Certification Bootcamp course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Google Cloud Engineer Associate Certification Bootcamp
Delivered OnlineFlexible Dates
Price on Enquiry

Ethical Hacking Hands-on Training Certification: Intermediate Level

By Study Plex

Recognised Accreditation This course is accredited by continuing professional development (CPD). CPD UK is globally recognised by employers, professional organisations, and academic institutions, thus a certificate from CPD Certification Service creates value towards your professional goal and achievement. The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries. What is CPD? Employers, professional organisations, and academic institutions all recognise CPD, therefore a credential from CPD Certification Service adds value to your professional goals and achievements. Benefits of CPD Improve your employment prospects Boost your job satisfaction Promotes career advancement Enhances your CV Provides you with a competitive edge in the job market Demonstrate your dedication Showcases your professional capabilities What is IPHM? The IPHM is an Accreditation Board that provides Training Providers with international and global accreditation. The Practitioners of Holistic Medicine (IPHM) accreditation is a guarantee of quality and skill. Benefits of IPHM It will help you establish a positive reputation in your chosen field You can join a network and community of successful therapists that are dedicated to providing excellent care to their client You can flaunt this accreditation in your CV It is a worldwide recognised accreditation What is Quality Licence Scheme? This course is endorsed by the Quality Licence Scheme for its high-quality, non-regulated provision and training programmes. The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries. Benefits of Quality License Scheme Certificate is valuable Provides a competitive edge in your career It will make your CV stand out Course Curriculum Course Overview Course Overview 00:05:00 Virtual Lab Build Video - Downloading ISO and OVA Files for VirtualBox 00:08:00 Video and Lab -Creating a Virtual install of Kali using VirtualBox 00:12:00 Video and lab - Create a virtual install of Metasploitable2 00:10:00 Video and Lab - Creating Windows 7 Pro Target Machine Using VirtualBox 00:07:00 Video and Lab - Creating Windows 10 Target Machine Using VirtualBox 00:08:00 Creating Windows 10 Target Machine Using VirtualBox 00:08:00 Installing the VirtualBox Extension Pack 00:02:00 NMap Installing the WebMap-Nmap Dashboard 00:12:00 Automated Recon/Enumeration Using nmapAutomator 00:10:00 Enumerating a Windows 10 Target Creating a Vulnerable Windows 10 Target 00:04:00 Reverse Shells, Privilege Escalation and Persistent Backdoors. Create a Windows Reverse Shell Using the PowerShell 00:08:00 Create a Reverse Shell Using Command Injection 00:06:00 Create a Reverse Shell Using a File Upload 00:08:00 Launch an Automated Meterpreter Session 00:13:00 Upgrade a Dumb Terminal to Fully Functional BASH Shell 00:09:00 Windows 7 Privilege Escalation Using UAC Bypass 00:05:00 Creating a Persistent Backdoor Using a Persistent Service 00:14:00 PowerShell Empire Create Virtual Install of Server 2016 Full GUI Using VirtualBox 00:12:00 00:09:00 Installing PowerShell Empire StarKiller On Kali Linux 00:05:00 Enumerating Active Directory 00:15:00 Post-Exploitation of Windows Using PowerShell Empire 00:19:00 Post Exploitation of Microsoft Windows Advanced Password Hacking with Metasploit 00:13:00 Post-Exploitation of Microsoft Windows 00:13:00 Brute Force the SMB Password on a Windows Server 00:10:00 Enumerating Active Directory Using RPCClient 00:16:00 Dumping Wi-Fi Credentials Using netsh 00:04:00 Practical Pentesting Labs Heartbleed OpenSSL Exploit Vulnerability 00:17:00 Performing an RDP Brute Force Attack 00:14:00 Exploiting Active Directory using LLMNR/NBT-NS Poisoning 00:11:00 Accessing Kali Across the WAN with NGROK 00:15:00 Pentesting with Netcat 00:12:00 Enumerate DNS Records Using DNSRecon 00:12:00 Auditing Wireless Networks Installing a Wireless Adapter in Kali 00:09:00 Hacking a Wireless Network Using Kali Linux 00:14:00 Wireless Deauthentication Attack 00:06:00 PMKID Client-less Wireless Attack Using Bettercap 00:10:00 Wireshark Overview of Wireshark 3.2 00:10:00 Wireshark Capture Options 00:07:00 Wireshark Toolbar Icons 00:03:00 Capturing Wireless Traffic Using Wireshark 00:05:00 Capturing a 3-way TCP Handshake Using Wireshark 00:05:00 Web App Penetration Testing Creating a virtual install of OWASP 00:05:00 Setting Up Burp Suite 00:09:00 Attack Web Apps with Burp Suite Using SQL Injection 00:11:00 OS Command Injection Using Commix 3.2x 00:16:00 Web Application Firewall Detection Using WAFW00F 00:04:00 Exploit Vulnerable Web Applications Using Command Injection 00:09:00 Exploit Vulnerable Web Applications Using Command Injection 00:09:00 Using Banner Grabbing to Aid in Reconnaissance 00:10:00 Anonymity - Remaining Anonymous While Pentesting Anonymize Kali Using Whonix 00:10:00 CTF - SQL Injection to Shell Walkthrough Lab Preparation for CTF SQL Injection to Shell 00:04:00 CTF Walkthrough for SQL Injection to Shell 00:13:00 Obtain Your Certificate Order Your Certificate of Achievement 00:00:00 Get Your Insurance Now Get Your Insurance Now 00:00:00 Feedback Feedback 00:00:00

Ethical Hacking Hands-on Training Certification: Intermediate Level
Delivered Online On Demand
£19

Data Science Engineering: Data Analytics & Database Management with MySQL - QLS Endorsed

4.8(9)

By Skill Up

Level-7 QLS Endorsed | 22-in-1 Diploma Bundle| Free CPD PDF+ Transcript Certificate| Lifetime Access| Learner Support

Data Science Engineering: Data Analytics & Database Management with MySQL - QLS Endorsed
Delivered Online On Demand5 days
£119

Business Intelligence Analyst Course

By The Teachers Training

Unlock the power of data-driven decision-making with our Business Intelligence Analyst Course. Gain essential skills in data analysis, visualization, and interpretation to extract valuable insights for business growth. Whether you're a seasoned professional or new to the field, this course provides comprehensive training in business intelligence tools and techniques. Enroll now and become proficient in transforming raw data into actionable intelligence, empowering organizations to make informed strategic decisions.

Business Intelligence Analyst Course
Delivered Online On Demand6 hours
£15

HA400 SAP ABAP Programming for SAP HANA

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Primary target audiences for this training are developers and development consultants but also other roles involved with implementing or reviewing program code to optimize ABAP based applications for SAP HANA. This course will prepare students to develop and optimize ABAP applications that access data stored in the SAP HANA Database. Course Outline Technical concepts of SAP HANA Introduction to HANA Studio Introduction to ADT (ABAP Development Tools, also known as ABAP in Eclipse) Tools to detect potential functional and performance issues when migrating to SAP HANA: Code Inspector and ABAP Test Cockpit, ABAP Trace and ABAP Profiler, SQL Trace Tools to prioritize performance issues: SQL Monitor, SQL Performance Tuning Worklist Performance Rules and Guidelines for ABAP in the context of SAP HANA Optimizing ABAP by accessing SAP HANA as a Secondary Database Optimizing ABAP using SAP HANA as Primary Database Using SAP HANA Fuzzy Search in ABAP Enabling input fields for Type-Ahead search. SAP List Viewer (ALV) for SAP HANA Additional course details: Nexus Humans HA400 SAP ABAP Programming for SAP HANA training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the HA400 SAP ABAP Programming for SAP HANA course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

HA400 SAP ABAP Programming for SAP HANA
Delivered OnlineFlexible Dates
Price on Enquiry

Web Development: Software and Web Development Training - CPD Certified Diploma

4.8(9)

By Skill Up

CPD Certified | 19-in-1 Diploma Bundle | Free PDF & Transcript Certificate | New & Updated | 24/7 Learner Support

Web Development: Software and Web Development Training - CPD Certified Diploma
Delivered Online On Demand5 days
£101