• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

537 Writing courses in Frimley delivered Live Online

18th July Maddy Belton #Agent121. Looking for: MG, YA, CHILDREN'S NON-FICTION, ADULT FICTION

5.0(3)

By I Am In Print

LOOKING FOR: MG, YA AND ADULT SCI-FI / FANTASY, CHILDREN'S NON-FICTION After graduating from St Andrews University with a degree in English Literature and Art History, Maddy followed her love of literature to an internship at non-fiction literary agency Graham Maw Christie. At GMC, Maddy worked her way up to Agent and built a list of authors who wrote for both for adults and children, spanning history, tarot, and nature writing. An avid reader of anything magical, Maddy joined Madeleine Milburn in 2022 to build a list specialising in SFF. Maddy would like to see SFF across all genres for all ages, including: grim dark, thriller, historical, romance, cosy fantasy, sci-fi, epic, YA fantasy, dark academia, contemporary fantasy, fantasy middle-grade, mythology, fairy tale and queer fantasy. Inspiring children’s non-fiction. She loves worlds to get lost in, adventures that transform what it means to be a hero, and unique magic that offers as many problems as solutions. She likes books that make her cry and books that change her mind. Above all, when she finishes a story about another world, she wants it to have taught her a lesson which helps her live in this one. She loves all fantasy, but favours richly imagined, complex worlds with a history to discover and a future to protect. Worldbuilding is one of her favourite aspects of this genre and she is always looking for a new, dense world with series potential. Think Brandon Sanderson’s Cosmere or the Marvel Cinematic Universe – the bigger the better! Maddy also likes character-driven fantasy with a diverse cast to root for (or root against) and she wants to see a range of different relationships depicted authentically. She particularly like epics that dip into big, universal themes such as grief, climate change, or war and which ask impossible questions in the vein of R.F. Kuang or N.K. Jemisin. She is also excited by authors that play with form and language in a fantasy setting. In YA, she is looking for much the same as in an adult fantasy, but with younger protagonists and a closer focus on relationships. She wants to see the tropes she knows and loves in new and exciting forms and her favourite YA books often centre around belonging and becoming. She likes a dash of romance in everything, because she is sentimental that way, but it’s particularly important in the YA space. Sci-fi is a big passion of hers, especially when it comes with a strong hook. She is a huge fan of Becky Chamber’s The Long Way to a Small Angry Planet and Michaiah Johnson’s The Space Between Worlds. She likes space as a metaphor, and would love something that explores different alien species. Please send her your space operas and sci-fi romances which combine space, magic and mayhem! In fantasy middle grade, she favours whimsy and animal companions; she would love to follow a group of kids through magic school. She tends to look for plenty of humour with a strong friendship at the centre, and she wants middle grade stories which engage with the concerns of children growing up as well as offering an all-important escape (preferably on a dragon/unicorn’s back). She is also looking for children’s non-fiction for all ages. In this space, she wants something as creative as it is informative, and thinks diverse voices are increasingly important. Maddy would like you to submit a covering letter, one page synopsis and the first three chapters (Max 5000 words) of your completed manuscript in a single word document. (In addition to the paid sessions, Maddy is kindly offering one free session for low income/under-represented writers. Please email agent121@iaminprint.co.uk to apply, outlining your case for this option which is offered at the discretion of I Am In Print).  By booking you understand you need to conduct an internet connection test with I Am In Print prior to the event. You also agree to email your material in one document to reach I Am In Print by the stated submission deadline and note that I Am In Print take no responsibility for the advice received during your agent meeting. The submission deadline is: Friday 11th July 2025

18th July Maddy Belton #Agent121. Looking for: MG, YA, CHILDREN'S NON-FICTION, ADULT FICTION
Delivered Online + more
£72

Essential ZigBee for engineers

5.0(3)

By Systems & Network Training

ZigBee training course description A hands on course covering the entire ZigBee protocol stack. ZigBee operation, primitives and frame formats are covered in detail using software tools to test and analyse ZigBee commands and demonstrate how these affect the 802.15.4 MAC. Analysers are used to decode packet formats. What will you learn Describe the ZigBee architecture and applications. Explain the workings of ZigBee protocol stack including the 802.15.4, NWK, APS and ZDO sub layers. Describe in detail the ZigBee primitives and how they are used to pass data; make networks; join networks and repair networks. Secure ZigBee networks. ZigBee training course details Who will benefit: Technical staff requiring grounding in ZigBee including application engineers. Prerequisites: RF fundamentals. Duration 2 days ZigBee training course contents Wireless data overview What is 802.15.4 and ZigBee? WLAN, WPAN, Bluetooth vs. ZigBee. Markets. Applications and architecture. ZigBee demonstration. ZigBee Standards and technology The 7-layer model, IEEE WPAN standards overview, 802.15.4 & ZigBee, ZigBee alliance. ZigBee Protocol stack The ZigBee 5 layer model, The network (NWK) sub layer, Application support sub layer (APS), the ZigBee Device Object (ZDO). 802.15.4 Radio Frequencies, modulation, power, DSSS, BPSK/ O-QPSK, channels, symbols, chips and bit rate. 802.15.4 PHY PHY data transfer primitives. The PHY packet. PHY PIB management. 802.15.4 MAC layer The MAC layer overview, CSMA/CA, addresses, frame types, super frames, MAC layer: Data, Data control, Scan and join, PAN maintenance, MAC PIB. Hands on 802.15.4 frame analysis. ZigBee Topologies Point to point topology, star topology, cluster tree, wired integration. Hands on Building a ZigBee network. ZigBee frame formats General frame format, data frames, command frames. Hands on Analysing ZigBee frames. ZigBee NWK NWK data primitives: Request. Confirm. Indication. NWK management primitives: Network discovery, network formation. Permit joining. Start router. Join. Direct join. Leave. Reset. Sync. NWK database management. Hands on NWK analysis ZigBee APS Address mapping, matching devices, binding devices, binding tables. Hands on APS analysis. ZigBee ZDO Device roles, binding requests, initiating and responding, device discovery, service discovery, network management. ZDO Endpoint 0. ZigBee Security Security issues, security modes, MAC security, NWK security, APS security. Applications Writing ZigBee applications, application profiles, End points, Endpoint addressing, clusters of attributes, broadcasts. Hands on Sample ZigBee application.

Essential ZigBee for engineers
Delivered in Internationally or OnlineFlexible Dates
£2,477

Securing Cisco Networks with Snort Rule Writing Best Practices (SSFRULES) v2.0

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is for technical professionals to gain skills in writing rules for Snort-based intrusion detection systems (IDS) and intrusion prevention systems (IPS). The primary audience includes: Security administrators Security consultants Network administrators System engineers Technical support personnel using open source IDS and IPS Channel partners and resellers Overview After taking this course, you should be able to: Describe the Snort rule development process Describe the Snort basic rule syntax and usage Describe how traffic is processed by Snort Describe several advanced rule options used by Snort Describe OpenAppID features and functionality Describe how to monitor the performance of Snort and how to tune rules The Securing Cisco Networks with Snort Rule Writing Best Practices (SSFRules) v2.0 course shows you how to write rules for Snort, an open-source intrusion detection and prevention system. Through a combination of expert-instruction and hands-on practice, this course provides you with the knowledge and skills to develop and test custom rules, standard and advanced rules-writing techniques, how to integrate OpenAppID into rules, rules filtering, rules tuning, and more. The hands-on labs give you practice in creating and testing Snort rules. Course Outline Introduction to Snort Rule Development Snort Rule Syntax and Usage Traffic Flow Through Snort Rules Advanced Rule Options OpenAppID Detection Tuning Snort Lab outline Connecting to the Lab Environment Introducing Snort Rule Development Basic Rule Syntax and Usage Advanced Rule Options OpenAppID Tuning Snort

Securing Cisco Networks with Snort Rule Writing Best Practices (SSFRULES) v2.0
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Securing Cisco Networks with Snort Rule Writing Best Practices v2.1 (SSFRULES)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is for technical professionals to gain skills in writing rules for Snort-based Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS). The primary audience includes: Security administrators Security consultants Network administrators System engineers Technical support personnel using open source IDS and IPS Channel partners and resellers Overview After taking this course, you should be able to: Describe the Snort rule development process Describe the Snort basic rule syntax and usage Describe how traffic is processed by Snort Describe several advanced rule options used by Snort Describe OpenAppID features and functionality Describe how to monitor the performance of Snort and how to tune rules The Securing Cisco Networks with Snort Rule Writing Best Practices (SSFRules) v2.1 course shows you how to write rules for Snort, an open-source intrusion detection and prevention system. Through a combination of expert-instruction and hands-on practice, this course provides you with the knowledge and skills to develop and test custom rules, standard and advanced rules-writing techniques, how to integrate OpenAppID into rules, rules filtering, rules tuning, and more. The hands-on labs give you practice in creating and testing Snort rules. Course Outline Introduction to Snort Rule Development Snort Rule Syntax and Usage Traffic Flow Through Snort Rules Advanced Rule Options OpenAppID Detection Tuning Snort

Cisco Securing Cisco Networks with Snort Rule Writing Best Practices v2.1 (SSFRULES)
Delivered OnlineFlexible Dates
Price on Enquiry

Writing Analytical Queries for Business Intelligence

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is intended for information workers and data science professionals who seek to use database reporting and analysis tools such as Microsoft SQL Server Reporting Services, Excel, Power BI, R, SAS and other business intelligence tools, and wish to use TSQL queries to efficiently retrieve data sets from Microsoft SQL Server relational databases for use with these tools. Overview Identify independent and dependent variables and measurement levels in their own analytical work scenarios. Identify variables of interest in relational database tables. Choose a data aggregation level and data set design appropriate for the intended analysis and tool. Use TSQL SELECT queries to produce ready-to-use data sets for analysis in tools such as PowerBI, SQL Server Reporting Services, Excel, R, SAS, SPSS, and others. Create stored procedures, views, and functions to modularize data retrieval code. This three-day instructor-led course is about writing TSQL queries for the purpose of database reporting, analysis, and business intelligence. Specifically, this course presents TSQL within the context of data analysis in other words, making meaning from the data rather than transaction-oriented data-tier application development. The course starts with a brief discussion of levels of measurement and quantitative research methodogy, and integrates these concepts into each TSQL topic presented. The goal is to provide a consistent, direct, and purposeful learning path from RDBMS data retrieval through analytical tools such as SQL Server Reporting Services, PowerBI, Excel, R, SAS, and SPSS. Module 1: Introduction to TSQL for Business Intelligence Two Approaches to SQL Programming TSQL Data Retrieval in an Analytics / Business Intelligence Environment The Database Engine SQL Server Management Studio and the CarDeal Sample Database Identifying Variables in Tables SQL is a Declarative Language Introduction to the SELECT Query Module 2: Turning Table Columns into Variables for Analysis: SELECT List Expressions, WHERE, and ORDER BY Turning Columns into Variables for Analysis Column Expressions, Data Types, and Built-in Functions Column aliases Data type conversions Built-in Scalar Functions Table Aliases The WHERE clause ORDER BY Module 3: Combining Columns from Multiple Tables into a Single Dataset: The JOIN Operators Primary Keys, Foreign Keys, and Joins Understanding Joins, Part 1: CROSSJOIN and the Full Cartesian Product Understanding Joins, Part 2: The INNERJOIN Understanding Joins, Part 3: The OUTERJOINS Understanding Joins, Part 4: Joining more than two tables Understanding Joins, Part 5: Combining INNER and OUTERJOINs Combining JOIN Operations with WHERE and ORDER BY Module 4: Creating an Appropriate Aggregation Level Using GROUP BY Identifying required aggregation level and granularity Aggregate Functions GROUP BY HAVING Order of operations in SELECT queries Module 5: Subqueries, Derived Tables and Common Table Expressions Non-correlated and correlated subqueries Derived tables Common table expressions Module 6: Encapsulating Data Retrieval Logic Views Table-valued functions Stored procedures Creating objects for read-access users Creating database accounts for analytical client tools Module 7: Getting Your Dataset to the Client Connecting to SQL Server and Submitting Queries from Client Tools Connecting and running SELECT queries from: Excel PowerBI RStudio Exporting datasets to files using Results pane from SSMS The bcp utility The Import/Export Wizard Additional course details: Nexus Humans Writing Analytical Queries for Business Intelligence training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Writing Analytical Queries for Business Intelligence course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Writing Analytical Queries for Business Intelligence
Delivered OnlineFlexible Dates
Price on Enquiry

Communication III: Higher Intermediate

By Scotland Study Centre (SSC)

Higher Intermediate Communication Training in all 4 Integrated Skills: Listening, Speaking, Reading and Writing. Learn REAL language, not "textbook English".

Communication III:  Higher Intermediate
Delivered OnlineFlexible Dates
£120

Wonderful Writers: 9-11 year olds

By Creative Writing with Hannah

These groups are for children who can already write a whole story with a beginning, middle and end. Children will enhance their writing skills, learn how to edit and improve their writing, expand their vocabulary and experiment with figurative language techniques. We will compose fiction of various genres, as well as deepening our knowledge of non-fiction text types and poetry – all in a fun and creative way! 5 children maximum fully interactive weekly 55 minute lessons qualified, expert teacher optional homework set weekly additional resources set via online classroom lesson recordings for absent students written progress reports three times per year Classes are £90 per month. Variety of times and dates available. Enquire to find out more!

Wonderful Writers: 9-11 year olds
Delivered OnlineFlexible Dates
£90

Definitive Puppet for engineers

5.0(3)

By Systems & Network Training

Definitive Puppet training course description Puppet is a framework and toolset for configuration management. This course covers Puppet to enable delegates to manage configurations. Hands on sessions follow all the major sections. What will you learn Deploy Puppet. Manage configurations with Puppet. Build hosts with Puppet. Produce reports with Puppet. Definitive Puppet training course details Who will benefit: Anyone working with Puppet. Prerequisites: Linux fundamentals. Duration 2 days Definitive Puppet training course contents Getting started with Puppet What is Puppet, Selecting the right version of Puppet, Installing Puppet, Configuring Puppet. Developing and deploying Puppet The puppet apply command and modes of operation, Foreground Puppet master, Developing Puppet with Vagrant, Environments, Making changes to the development environment, Testing the new environments with the Puppet agent, Environment branching and merging, Dynamic Puppet environments with Git branches, Summary, Resources. Scaling Puppet Identifying the challenges, Running the Puppet master with Apache and Passenger, Testing the Puppet master in Apache, Load balancing multiple Puppet masters, Scaling further, Load balancing alternatives. Measuring performance, Splay time, Summary, Going further, Resources. Externalizing Puppet configuration External node classification, Storing node configuration in LDAP, Summary, Resources. Exporting and storing configuration Virtual resources, Getting started with exported and stored configurations, Using exported resources, Expiring state resources, Summary, Resources. Puppet consoles The foreman, Puppet enterprise console, Puppetboard, Summary, Resources. Tools and integration Puppet forge and the module tool, Searching and installing a module from the forge, Generating a module, Managing module dependencies, Testing the modules, Developing Puppet modules with Geppetto, Summary, Resources. Reporting with Puppet Getting started, Configuring reporting, Report processors, Custom reporting, Other Puppet reporters, Summary, Resources. Extending Facter and Puppet Writing and distributing custom facts, Developing custom types, providers and functions, Summary, Resources, Complex data structures, Additional backends, Hiera functions in depth, Module data bindings, Hiera examples. Jiera-2, Summary, Resources. Mcollective Installing and configuring Mcollective, testing, Mcollective plugins, accessing hosts with Metadata. Hiera Lists, initial Hiera configuration, Hiera command line utility, complex data structures, additional backends, Hiera functions in depth, module data bindings. Hiera-2.

Definitive Puppet for engineers
Delivered in Internationally or OnlineFlexible Dates
£1,727

Existential Dialogue 2025: "Opening" with Dr. Yaqui Martinez

By Therapy Harley Street

I want to discuss the existential-phenomenological challenges of viewing the human condition and explore alternatives for openness. We aim to explore the lived experiences on irregular perceptions of reality with an open mind. Each Saturday includes: a live dialogue between Prof. Ernesto Spinelli and an International Existential Therapist; a moment to share your thoughts and feelings with the teachers; and a final integration facilitated by Bárbara Godoy. This series of ten dialogues set out to explore the multifaceted dimentions and complexities associated with Existential Therapies. It attempts to engage with various interpretations of insanity through the lens of patients often painful, confounding, and deeply unsettling life experiences. Opening- between Prof. Ernesto Spinelli and Dr. Yaqui Martinez “From my early days studying psychology, I never felt comfortable with psychopathological nosologies. They seemed exaggerated to me and demonstrated the intense human desire to classify all possible expressions of our existence. Likewise, I have not been comfortable with the tendency to promote dualistic perspectives that compartmentalize our reality into separate aspects where one is not only different from the other but even in opposition, such as the sane/insane dichotomy. During this dialogue, I want to talk with Ernesto about the difficulties involved, from an existential-phenomenological perspective, in viewing the human condition from this position. Perhaps we can ask ourselves together what advantages they offer and what alternatives for openness we can propose.” Dr. Yaqui Martinez. Dr. Yaqui A. Martínez-Robles is a psychologist with Masters, PhD and PsyD in Psychotherapy. He has training in Gestalt Therapy; Music Therapy; Transpersonal Psychology and Holotropic Breathwork (with the Grof Transpersonal Training Association); Narrative and postmodern therapies and Social Constructionism; and in Psychedelic-Assisted Therapy (with the Integrative Psychiatry Institute and MAPS-Multidisciplinary Association for Psychedelic Studies). He is the author of four books, and co-author of another two, focused on the existential perspective. He has participated with chapters in several books and with articles in several journals. Yaqui is the founder of the Circle of Studies in Existential Therapy, in Mexico City and in Medellin, Colombia,. He teaches existential-phenomenological psychology and therapy in Mexico and different countries of South America. He is the current president of the Latin American Association of Existential Psychotherapy (ALPE). He works in private practice as an existential-phenomenological therapist and coach, in modalities one-on-one, couples and groups. Prof. Ernesto Spinelli was Chair of the Society for Existential Analysis between 1993 and 1999 and is a Life Member of the Society. His writings, lectures and seminars focus on the application of existential phenomenology to the arenas of therapy, supervision, psychology, and executive coaching. He is a Fellow of the British Psychological Society (BPS) as well as an APECS accredited executive coach and coaching supervisor. In 2000, he was the Recipient of BPS Division of Counselling Psychology Award for Outstanding Contribution to the Profession. And in 2019, Ernesto received the BPS Award for Distinguished Contribution to Practice. His most recent book, Practising Existential Therapy: The Relational World 2nd edition (Sage, 2015) has been widely praised as a major contribution to the advancement of existential theory and practice. Living up to the existential dictum that life is absurd, Ernesto is also the author of an on-going series of Private Eye novels. Date and Time: Saturday 19 June from 2 pm to 3 pm – (UK time) Individual Dialogue Fee: £70 Venue: Online Zoom FULL PROGRAMME 2025: 25 January “Knots” with Prof. Ernesto Spinelli and Bárbara Godoy 22 February “Healing” with Dr. Michael Guy Thompson and Prof. Ernesto Spinelli 22 March “Difference” with Prof. Tod DuBose and Prof. Ernesto Spinelli 12 April “Polarisation” with Prof. Kirk Schneider and Prof. Ernesto Spinelli 3 May “Character” with Prof. Robert Romanyshyn and Prof. Ernesto Spinelli 21 June “Opening” with Dr. Yaqui Martinez and Prof. Ernesto Spinelli 19 July “Meaning” with Dr. Jan Resnick and Prof. Ernesto Spinelli 25 October “Invention” with Dr. Betty Cannon and Prof. Ernesto Spinelli 15 November “Hallucination” with Prof. Simon du Plock and Prof. Ernesto Spinelli 13 December “Hysteria” with Bárbara Godoy and Prof. Ernesto Spinelli Read the full programme here > Course Organised by:

Existential Dialogue 2025: "Opening" with Dr. Yaqui Martinez
Delivered Online
£70

Oracle SQL foundation

5.0(3)

By Systems & Network Training

Oracle SQL training course description The Oracle SQL course is designed to give delegates practical experience in writing SQL statements and scripts using Oracle SQL. The basic SELECT statement, the use of SQL functions and the basic table and view handling statements are introduced. What will you learn Create SQL statements to query database tables. Use standard aggregate functions and related SELECT statement clauses. Join Tables. Use basic subqueries and the set operators. Use numeric, character and date functions. Use conversion and other miscellaneous functions. Use SQL parameters. Use complex subqueries. Create and alter tables and views. Insert, update and delete rows in database tables. Manage sequences and synonyms. Oracle SQL training course details Who will benefit: Anyone who needs to use and understand Oracle SQL to query and update data in an Oracle database. Prerequisites: None. Duration 3 days Oracle SQL training course contents Retrieving data with the SELECT statement The SELECT statement, The SELECT and FROM clauses, Conditions and the WHERE clause, Other conditional operators, Logical operators, The ORDER BY clause, Column aliases, Arithmetic expressions, Precedence of operators. Aggregate functions Overview of built In aggregate functions, The GROUP BY clause, The HAVING clause. Joining tables Overview of table joins, Inner joins, Table aliases, Outer joins, Self joins, ANSI standard joins. Basic subqueries and set operators Overview of subqueries, Basic subqueries, Set operators, The union, intersect and ,minus operators. Numeric, character and data functions Function types, Using the table dual to try out functions, Numeric functions, Character functions, String concatenation, Date arithmetic and date functions. Conversion and miscellaneous functions Conversion functions, The NVL and NVL2 functions, The DECODE function, CASE expressions, The COALESCE and NULLIF functions. SQL parameters Command line substitution parameters, The accept command, The define and undefine commands. Complex subqueries Subqueries usage, In-line views, Top-N queries, Subqueries with joins, Multi column subqueries, Correlated subqueries, Subquery rules, Using the ANY, ALL and SOME operators. Managing data Inserting rows, Updating rows, Deleting rows, Verifying updates, Transaction control, Commit and rollback, Savepoints, Commits and constraints, Amending data in SQL developer. Managing tables Creating tables, Specifying constraints, Altering tables, columns and constraints, Dropping tables, columns and constraints, Recovering dropped tables, Copying tables. Managing indexes and views Creating indexes, Dropping indexes, Listing indexes, Creating and using views, Dropping views, Listing views. Managing sequences and synonyms Create a sequence, View sequence details, Create a synonym, List synonyms.

Oracle SQL foundation
Delivered in Internationally or OnlineFlexible Dates
£2,367