• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

695 Courses

Business Intelligence: In-House Training

By IIL Europe Ltd

Business Intelligence: In-House Training Business Intelligence (BI) refers to a set of technology-based techniques, applications, and practices used to aggregate, analyze, and present business data. BI practices provide historical and current views of vast amounts of data and generate predictions for business operations. The purpose of Business Intelligence is the support of better business decision making. This course provides an overview of the technology and application of BI and how it can be used to improve corporate performance. What you will Learn You will learn how to: Specify a data warehouse schema Identify the data and visualization to be used for data mining and Business Intelligence Design a Business Intelligence user interface Getting Started Introductions Agenda Expectations Foundation Concepts The challenge of decision making What is Business Intelligence? The Business Intelligence value proposition Business Intelligence taxonomy Business Intelligence management issues Sources of Business Intelligence Data warehousing Data and information Information architecture Defining the data warehouse and its relationships Facts and dimensions Modeling, meta-modeling, and schemas Alternate architectures Building the data warehouse Extracting Transforming Loading Setting up the data and relationships Dimensions and the Fact Table Implementing many-to-many relationships in data warehouse Data marts Online Analytical Processing (OLAP) What is OLAP? OLAP and OLTP OLAP functionality Multi-dimensions Thinking in more than two dimensions What are the possibilities? OLAP architecture Cubism Tools OLAP variations - MOLAP, ROLAP, HOLAP BI using SOA Applications of Business Intelligence Applying BI through OLAP Enterprise Resource Planning and CRM Business Intelligence and financial information Business Intelligence User Interfaces and Presentations Data access Push-pull data access Types of decision support systems Designing the front end Presentation formats Dashboards Types of dashboards Common dashboard features Briefing books and scorecards Querying and Reporting Reporting emphasis Retrofitting Talking back Key Performance Indicators Report Definition and Visualization Typical reporting environment Forms of visualization Unconstrained views Data mining What is in the mine? Applications for data mining Data mining architecture Cross Industry Standard Process for Data Mining (CISP-DM) Data mining techniques Validation The Business Intelligence User Experience The business analyst role Business analysis and data analysis Five-step approach Cultural impact Identifying questions Gathering information Understand the goals The strategic Business Intelligence cycle Focus of Business Intelligence Design for the user Iterate the access Iterative solution development process Review and validation questions Basic approaches Building ad-hoc queries Building on-demand self-service reports Closed loop Business Intelligence Coming attractions - future of Business Intelligence Best practices in Business Intelligence

Business Intelligence: In-House Training
Delivered in London or UK Wide or OnlineFlexible Dates
£1,495

Business Intelligence

By IIL Europe Ltd

Business Intelligence Business Intelligence (BI) refers to a set of technology-based techniques, applications, and practices used to aggregate, analyze, and present business data. BI practices provide historical and current views of vast amounts of data and generate predictions for business operations. The purpose of Business Intelligence is the support of better business decision making. This course provides an overview of the technology and application of BI and how it can be used to improve corporate performance. What you will Learn You will learn how to: Specify a data warehouse schema Identify the data and visualization to be used for data mining and Business Intelligence Design a Business Intelligence user interface Getting Started Introductions Agenda Expectations Foundation Concepts The challenge of decision making What is Business Intelligence? The Business Intelligence value proposition Business Intelligence taxonomy Business Intelligence management issues Sources of Business Intelligence Data warehousing Data and information Information architecture Defining the data warehouse and its relationships Facts and dimensions Modeling, meta-modeling, and schemas Alternate architectures Building the data warehouse Extracting Transforming Loading Setting up the data and relationships Dimensions and the Fact Table Implementing many-to-many relationships in data warehouse Data marts Online Analytical Processing (OLAP) What is OLAP? OLAP and OLTP OLAP functionality Multi-dimensions Thinking in more than two dimensions What are the possibilities? OLAP architecture Cubism Tools OLAP variations - MOLAP, ROLAP, HOLAP BI using SOA Applications of Business Intelligence Applying BI through OLAP Enterprise Resource Planning and CRM Business Intelligence and financial information Business Intelligence User Interfaces and Presentations Data access Push-pull data access Types of decision support systems Designing the front end Presentation formats Dashboards Types of dashboards Common dashboard features Briefing books and scorecards Querying and Reporting Reporting emphasis Retrofitting Talking back Key Performance Indicators Report Definition and Visualization Typical reporting environment Forms of visualization Unconstrained views Data mining What is in the mine? Applications for data mining Data mining architecture Cross Industry Standard Process for Data Mining (CISP-DM) Data mining techniques Validation The Business Intelligence User Experience The business analyst role Business analysis and data analysis Five-step approach Cultural impact Identifying questions Gathering information Understand the goals The strategic Business Intelligence cycle Focus of Business Intelligence Design for the user Iterate the access Iterative solution development process Review and validation questions Basic approaches Building ad-hoc queries Building on-demand self-service reports Closed loop Business Intelligence Coming attractions - future of Business Intelligence Best practices in Business Intelligence

Business Intelligence
Delivered In-Person in LondonFlexible Dates
£1,495

Professional Certificate in Introduction to Business Intelligence And Data Warehousing in London 2024

4.9(261)

By Metropolitan School of Business & Management UK

The Professional Certificate in Business Intelligence and Data Warehousing aims to introduce the learner to the concepts of business intelligence gathering, interpreting and disseminating using the management of stored data available with the organization. Learning Outcomes After the successful completion of the certificate, the student will be able to: Outline the major characteristics of business intelligence Describe the components of business intelligence Describe the concept of data warehousing The Professional Certificate in Business Intelligence and Data Warehousing aims to introduce the learner to the concepts of business intelligence gathering, interpreting and disseminating using the management of stored data available with the organization. VIDEO - Course Structure and Assessment Guidelines Watch this video to gain further insight. Navigating the MSBM Study Portal Watch this video to gain further insight. Interacting with Lectures/Learning Components Watch this video to gain further insight. Introduction to Business Intelligence and Data Warehousing Objectives of the lecture: Outline the major characteristics of business intelligence. Describe the components of business intelligence. Describe the concept of data warehousing. BUSINESS INTELLIGENCE AND DATA WAREHOUSING Put your knowledge to the test with this quiz. Read each question carefully and choose the response that you feel is correct. All MSBM courses are accredited by the relevant partners and awarding bodies. Please refer to MSBM accreditation in about us for more details. There are no strict entry requirements for this course. Work experience will be added advantage to understanding the content of the course. The certificate is designed to enhance the knowledge of the learner in the field. This certificate is for very one eager to know more and gets updated on current ideas in the respective field. We recommend this certificate for the following audience. CEO, Director, Manager, Supervisor Data warehousing Manager Marketing Intelligent Manager Research Manager Average Completion Time 2 Weeks Accreditation 1 CPD Hour Level Advanced Start Time Anytime 100% Online Study online with ease. Unlimited Access 24/7 unlimited access with pre-recorded lectures. Low Fees Our fees are low and easy to pay online.

Professional Certificate in Introduction to Business Intelligence And Data Warehousing in London 2024
Delivered Online On Demand14 days
£25

Autumn Series 2025 - Organisation & Relationship Systems Coaching Training

By CRR UK

CRRUK equips professionals with the concepts, skills and tools to build conscious, intentional relationships, and to coach relationship systems of any size.

Autumn Series 2025 - Organisation & Relationship Systems Coaching Training
Delivered Online + more
£4,920

Small Biz Owners December Get-Together

By The Motivation Clinic

The Motivation Clinic - December Gathering - Wednesday 7th December 2022 12 til 2pm Lunch and Learn gathering & networking at The Brew House, 155 Guildford High Street, Guildford House Gallery, Guildford, GU1 3AJ (Opposite Sainsbury/Bora) It can be a lonely world beavering away growing your business alone and navigating the veritable rollercoaster! Plus, you never get a Christmas Party! Well here is one especially for you! Love to see you for warm chats, networking, food and mince pies to assure you that you are not alone and provide you with the support, encouragement and the motivation to keep going, even when times are tough. Lunch & Learn - 10 minute talk plus questions Diccon Brown, Solution Focused Clinical Hypnotherapist & Psychotherapist at Tranquility Hypnotherapy Clinic, will be taking us through the fascinating world of hypnotherapy, which I personally have had very positive results from so can't wait to hear more about how this research backed modility can help people overcome phobias, anxiety and habits. Feedback from previous Gatherings "a great opportunity to network with like minded business owners in a friendly, community space" "Informal atmosphere, great group of people, lovely environment" "a friendly, welcoming relaxed atmosphere real sense of community." "uplifted and felt encouraged to get involved more." "lovely session and some great conversations" "a lovely opportunity to meet fellow business owners." Finally, please do share with other business owners you may know in Guildford and surrounding areas! Look forward to seeing you there! Lara Doherty, The Motivation Clinic 07817247727 / lara@themotivationclinic.co.uk

Small Biz Owners December Get-Together
Delivered In-PersonFlexible Dates
£13.27

Root Cause Analysis for Incident Investigation Training - Online Course

By i2Comply

Root Cause Analysis for Incident Investigation Training - Online Course This Root Cause Analysis for Incident Investigation online training provides a structured approach to incident investigation. It covers gathering and organising the information, through a detailed analysis of the issues and evidence, to the production of the formal report. The training follows a proven Root Cause Analysis (RCA) methodology tailored to investigating patient incidents in hospitals, care homes and care services. Which Root Cause Analysis training course should I take? Level 1 - Is an introductory course that is suitable for people that will be involved in investigations. Staff are able to understand the process and know what to expect during the actual investigation. It can also be used by investigators before face-to-face training with InPractice. Level 2 - Is a comprehensive course that is designed for investigators. It covers gathering and organising the information, through a detailed analysis of the issues and evidence, to the production of the formal report. Please note: the level 2 course covers all the material in Root Cause Analysis for Incident Investigation (Level 1) course. What are the learning outcomes for the Root Cause Analysis Level 2 course? After completing the course you will be able to describe: The purpose of RCA in an incident investigation The underlying principles that guide RCA in incident investigation 12 key steps when applying RCA How information is gathered and organised in the investigation folder The purpose of a wagon-wheel analysis and explain how a wagon-wheel is produced How RCA can produce recommendations that are both actionable and measurable The essential elements of an incident investigation report and explain how it is produced How the investigation outcomes are communicated to participants What is Root Cause Analysis? The first topic outlines the purpose of an RCA investigation. It explains the focus on improvement and avoidance of blame. You will also learn about the twelve steps in an RCA investigation. Step 1: Write a Timetable The second topic explains why you need a timetable and how to produce one. Then you will learn about why information gathering is more important than information analysis. Step 2: Neutralise the Incident The third topic explains why it is important that you have a neutral statement about the incident. You will learn how to reword a statement to remove all subjective terms. Step 3a: Scoping - Introduction The fourth topic describes the purpose of scoping and outlines three scoping activities. Step 3b: Scoping - The 5 Hypotheses This topic describes the activity called '5 hypotheses'. You will learn how to produce 5 hypotheses about the incident. Step 3c: Scoping - 4 Ps (Paper, People, Parts, Place) This topic is about the 4 Ps of Root Cause Analysis. You will learn about how the 5 hypotheses of the previous topic generate the 4 Ps. Step 3d: Scoping - Index the Information This topic describes how to organise the information identified in the 4 Ps activity. You will learn how to ensure cooperation with information requests. You will also learn about when to move on to the next step in your investigation. Step 4: Produce a Simple Timeline This topic explains how to identify relevant events and then how to put them in a simple timeline. Step 5: Produce a Tabular Timeline This topic describes how to create a tabular timeline, You will learn how to populate this timeline with events, dates and times. You will also learn how to deal with missing information. Step 6: Conduct Interviews This topic explains how to select people for interview. Then you will learn about how to question people in an interview. The topic also explains how to interview witnesses without alienating them. Step 7: Identifying Good Practice This topic is about how and why to add instances of good practice to the tabular timeline. Step 8: Identifying Care Delivery Problems This topic explains how to add care delivery problems to the tabular timeline. Then you will learn how to write about these problems precisely. The topic also explains why you should avoid using a patient's presentation as a CDP. Step 9: Prioritise Care Delivery Problems In this topic you will learn how to prioritise CDPs using the Nominal Group Technique. Step 10: Wagon-Wheel Analysis In this topic you will learn about how and why to carry out a Wagon-Wheel analysis. Step 10: Wagon-Wheel Analysis - Identifying Root Causes In this topic you will learn how to evaluate each contributory factor in the Wagon-Wheel analysis to determine whether or not it is a root cause. Step 11: Produce the Incident Investigation Report This topic explains how to produce the Incident Investigation Report that is fit for purpose. Step 12: Debrief and Follow-up The final topic explains why you need to give staff feedback and what should be included in the feedback.

Root Cause Analysis for Incident Investigation Training - Online Course
Delivered Online On Demand
£90

Stitch & Bitch social sewing sessions

By cheekyhandmades

Stitch n bitch are social sewing sessions aimed at people who love getting together over a glass of wine and with some music on to work on garments, discuss designs, encourage and celebrate sewing. Machines and food and drinks all provided.

Stitch & Bitch social sewing sessions
Delivered In-PersonFlexible Dates
£15

Certified Virtualization Security Expert (Advanced VMware Security) Training

4.3(43)

By John Academy

Description This Certified Virtualization Security Expert (Advanced VMware Security) Training covers everything you need to know becoming a Certified Virtualization Security Expert. In this course you will learn about routing and the security design of VMware, Remote DataStore security, Penetration Testing 101, information gathering, scanning and enumeration, penetration testing and the tools of the trade, DMZ virtualization and common attack vectors, hardening your ESX server, hardening your ESXi server, hardening your vCenter server, and 3rd party mitigation tools. This Advanced course provides a solid understanding of the various components that make up the VMware vSphere environment. You will have the opportunity to study and understand all aspects of the CIA triad as it pertains to the VMware vSphere infrastructure from the virtual CPU to the storage devices attached to your host and everything in and around that network, including the interconnectivity and design of all those components. So, get this course to learn more. Assessment & Certification To achieve a formal qualification, you are required to book an official exam separately with the relevant awarding bodies. However, you will be able to order a course completion CPD Certificate by paying an additional fee. Hardcopy Certificate by post - £19 Soft copy PDF via email - £10 Requirements Our Certified Virtualization Security Expert (Advanced VMware Security) Training is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Primer and Reaffirming Our Knowledge Primer and Reaffirming Our Knowledge FREE 00:25:00 Virtual Ports 00:21:00 Symmetric vs. Asymmetric Encryption 01:07:00 File System Structure 00:13:00 Accounts and Groups 00:35:00 Routing and the Security Design of VMware Routing and the Security Design of Vmware 00:11:00 Virtualization Layer 00:28:00 Memory Virtualization 00:28:00 Major Benefits of Using VLANs 00:13:00 Remote Data Store Security Remote DataStore Security 00:15:00 Fiber Channel Attacks - The Basics 00:22:00 Penetration Testing 101 Penetration Testing 101 00:33:00 The Evolving Threat 00:40:00 Information Gathering, Scanning and Enumeration Information Gathering, Scanning and Enumeration9 00:30:00 FireFox Fully Loaded 00:14:00 Introduction to Port Scanning 00:30:00 UDP Port Scan 00:42:00 Penetration Testing and the Tools of the Trade Penetration Testing and the Tools of the Trade 00:43:00 Windows Password Cracking 00:24:00 VASTO 00:22:00 DMZ Virtualization and Common Attack Vectors DMZ Virtualization and Common Attack Vectors9 00:21:00 Clearly Label Networks for Each Zone within the DMZ 00:22:00 Schmoo Con 2010 Virtualization Vulnerabilities Found! 00:08:00 Hardening Your ESX Server Hardening Your ESX Server 01:03:00 Configuring the ESX ESXi Host 02:19:00 Establish a Password Policy for Local User Accounts 00:21:00 Secure the SNMP Configuration 00:19:00 Hardening Your ESXi Server Hardening Your ESXi Server 00:20:00 Hardening Your vCenter Server Hardening Your vCenter Server 00:17:00 VMware Converter Enterprise 01:10:00 3rd Party Mitigation Tools 3rd Party Mitigation Tools 00:24:00 Mock Exam Mock Exam- Certified Virtualization Security Expert (Advanced VMware Security) Training 00:20:00 Final Exam Final Exam- Certified Virtualization Security Expert (Advanced VMware Security) Training 00:20:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

Certified Virtualization Security Expert (Advanced VMware Security) Training
Delivered Online On Demand17 hours
£24

Domestic Violence (Achieving ILR)

By Immigration Advice Service

This course equips immigration practitioners and advocates with the knowledge and skills to assist domestic violence survivors in obtaining Indefinite Leave to Remain (ILR) in the UK. Course Overview:   Achieving Indefinite Leave to Remain in Domestic Violence Cases” is a comprehensive training program designed for immigration practitioners and advocates. It provides the necessary knowledge and skills to support domestic violence survivors in obtaining Indefinite Leave to Remain (ILR) in the UK. Participants will explore eligibility criteria, evidence gathering, exceptional circumstances, and application processes to empower survivors on their journey to safety and security. Throughout the course, participants will gain a deep understanding of the eligibility requirements for ILR, enabling them to effectively advise and support their clients. They will learn how to guide survivors in collecting and presenting compelling evidence that strengthens their cases, while also understanding alternative routes and exceptional circumstances for those who do not meet standard eligibility criteria. The course provides practical strategies for enhancing the chances of a successful outcome. Participants will also learn the step-by-step procedures for making a domestic violence concession application, equipping them with the skills to compile persuasive application packages. By the end of the training, participants will be equipped with the knowledge, practical skills, and strategies necessary to assist domestic violence survivors in achieving ILR.   Course joining links, materials and instructions are sent out 24hours before the course starts. Why Choose IAS’ Immigration Training Courses? Immigration Advice Service has been providing professional immigration services for over 10 years in the public, private and corporate sectors. Our fully qualified and OISC regulated trainer will guide you through the content in our comprehensive training course. See why others like to study with IAS: Delivered Online Expert Course Trainer Free Course Materials Certificate of Attendance   Join over 92% of satisfied customers who found their training with IAS useful and beneficial. You will also be provided with training materials to keep after completing the course. How is this course structured? The “Domestic Violence (Immigration based)” training workshop will involve the following: 1. Understanding Eligibility: Who Qualifies for Indefinite Leave to Remain Overview of the criteria and requirements for domestic violence survivors seeking Indefinite Leave to Remain Exploring the key factors that determine eligibility 2. Advising Clients about Evidence Guidance on effectively advising clients on gathering and presenting compelling evidence to support their cases Understanding the types of evidence that can strengthen an application and highlight the impact of domestic violence 3. Considering Exceptional Circumstances when Clients Do Not Qualify under the Rules Exploring alternative routes and exceptional circumstances that may still enable survivors to secure Leave to Remain Discussing strategies for presenting exceptional circumstances to enhance the chances of a successful outcome 4. Making a Domestic Violence Concession Application

Domestic Violence (Achieving ILR)
Delivered OnlineFlexible Dates
£120

Forensic Science, Criminal psychology & Accident investigation (QLS)

By Imperial Academy

3 QLS Endorsed Diploma | QLS Hard Copy Certificate Included | 10 CPD Courses | Lifetime Access | 24/7 Tutor Support

Forensic Science, Criminal psychology & Accident investigation (QLS)
Delivered Online On Demand
£399