• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

46223 Courses

DP-080T00 Querying Data with Microsoft Transact-SQL

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course can be valuable for anyone who needs to write basic SQL or Transact-SQL queries. This includes anyone working with data as a data analyst, a data engineer, a data scientist, a database administrator or a database developer. It can also be useful for others peripherally involved with data, or wanting to learn more about working with data such as solution architects, students and technology managers. This course will teach the basics of Microsoft's dialect of the standard SQL language: Transact-SQL. Topics include both querying and modifying data in relational databases that are hosted in Microsoft SQL Server-based database systems, including: Microsoft SQL Server, Azure SQL Database and, Azure Synapse Analytics. 1 - Introduction to Transact-SQL Work with schemas Explore the structure of SQL statements Examine the SELECT statement Work with data types Handle NULLs 2 - Sort and filter results in T-SQL Sort your results Limit the sorted results Page results Remove duplicates Filter data with predicates 3 - Combine multiple tables with JOINs in T-SQL Understand joins concepts and syntax Use inner joins Use outer joins Use cross joins Use self joins 4 - Write Subqueries in T-SQL Understand subqueries Use scalar or multi-valued subqueries Use self-contained or correlated subqueries 5 - Use built-in functions and GROUP BY in Transact-SQL Categorize built-in functions Use scalar functions Use ranking and rowset functions Use aggregate functions Summarize data with GROUP BY Filter groups with HAVING 6 - Modify data with T-SQL Insert data Generate automatic values Update data Delete data Merge data based on multiple tables Additional course details: Nexus Humans DP-080T00 Querying Data with Microsoft Transact-SQL training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the DP-080T00 Querying Data with Microsoft Transact-SQL course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

DP-080T00 Querying Data with Microsoft Transact-SQL
Delivered OnlineFlexible Dates
£1,190

CompTIA Security+ Certification - CPD Approved

4.5(3)

By Studyhub UK

24 Hour Flash Deal **25-in-1 CompTIA Security+ Certification Mega Bundle** CompTIA Security+ Certification Enrolment Gifts **FREE PDF Certificate**FREE PDF Transcript ** FREE Exam** FREE Student ID ** Lifetime Access **FREE Enrolment Letter ** Take the initial steps toward a successful long-term career by studying the CompTIA Security+ Certification package online with Studyhub through our online learning platform. The CompTIA Security+ Certification bundle can help you improve your CV, wow potential employers, and differentiate yourself from the mass. This CompTIA Security+ Certification course provides complete 360-degree training on CompTIA Security+ Certification. You'll get not one, not two, not three, but twenty-five CompTIA Security+ Certification courses included in this course. Plus Studyhub's signature Forever Access is given as always, meaning these CompTIA Security+ Certification courses are yours for as long as you want them once you enrol in this course This CompTIA Security+ Certification Bundle consists the following career oriented courses: Course 01: CompTIA Security+ Course 02: Cyber Security Advanced Training Course 03: CEH: Learn Ethical Hacking From A-Z: Beginner To Expert Course 04: CompTIA Network+ Certification (N10-007) Course 05: CompTIA PenTest+ (Ethical Hacking) course Course 06: Computer Networks Security from Scratch to Advanced Course 07: Web Application Penetration Testing Course 08: Cyber Security Incident Handling and Incident Response Course 09: Network Security and Risk Management Course 10: Data Protection and Data Security (GDPR) Training Certification Course 11: Cyber Security Awareness Training Course 12: Digital Forensic Science: Unraveling Cybercrime Mysteries Course Course 13: Security Analyst Course 14: CompTIA Cloud+ (CV0-002) Course 15: Forensic Engineering Investigator Course 16: Information Governance and Data Management Training Course 17: Security Management and Fraud Prevention Training Course 18: GDPR, Data Protection and Cyber Security Course Course 19: Financial Statements Fraud Detection Training Course 20: Data Protection (GDPR) Practitioner Course 21: CompTIA ITF+ (FCO-U61) Course 22: CompTIA Healthcare IT Technician Course 23: Cyber Security Law Course 24: ITIL Foundation Course 25: Functional Skills IT/ ICT The CompTIA Security+ Certification course has been prepared by focusing largely on CompTIA Security+ Certification career readiness. It has been designed by our CompTIA Security+ Certification specialists in a manner that you will be likely to find yourself head and shoulders above the others. For better learning, one to one assistance will also be provided if it's required by any learners. The CompTIA Security+ Certification Bundle is one of the most prestigious training offered at StudyHub and is highly valued by employers for good reason. This CompTIA Security+ Certification bundle course has been created with twenty-five premium courses to provide our learners with the best learning experience possible to increase their understanding of their chosen field. This CompTIA Security+ Certification Course, like every one of Study Hub's courses, is meticulously developed and well researched. Every one of the topics is divided into CompTIA Security+ Certification Elementary modules, allowing our students to grasp each lesson quickly. The CompTIA Security+ Certification course is self-paced and can be taken from the comfort of your home, office, or on the go! With our Student ID card you will get discounts on things like music, food, travel and clothes etc. In this exclusive CompTIA Security+ Certification bundle, you really hit the jackpot. Here's what you get: Step by step CompTIA Security+ Certification lessons One to one assistance from CompTIA Security+ Certificationprofessionals if you need it Innovative exams to test your knowledge after the CompTIA Security+ Certificationcourse 24/7 customer support should you encounter any hiccups Top-class learning portal Unlimited lifetime access to all twenty-five CompTIA Security+ Certification courses Digital Certificate, Transcript and student ID are all included in the price PDF certificate immediately after passing Original copies of your CompTIA Security+ Certification certificate and transcript on the next working day Easily learn the CompTIA Security+ Certification skills and knowledge you want from the comfort of your home CPD 250 CPD hours / points Accredited by CPD Quality Standards Who is this course for? This CompTIA Security+ Certification training is suitable for - Students Recent graduates Job Seekers Individuals who are already employed in the relevant sectors and wish to enhance their knowledge and expertise in CompTIA Security+ Certification Requirements To participate in this CompTIA Security+ Certification course, all you need is - A smart device A secure internet connection And a keen interest in CompTIA Security+ Certification Career path You will be able to kickstart your CompTIA Security+ Certification career because this course includes various courses as a bonus. This CompTIA Security+ Certification is an excellent opportunity for you to learn multiple skills from the convenience of your own home and explore CompTIA Security+ Certification career opportunities. Certificates CPD Accredited Certificate Digital certificate - Included CPD Accredited e-Certificate - Free CPD Accredited Hardcopy Certificate - Free Enrolment Letter - Free Student ID Card - Free

CompTIA Security+ Certification - CPD Approved
Delivered Online On Demand6 days
£279

WA2925 Agile Project Management using JIRA Software Training

By Nexus Human

Duration 2 Days 12 CPD hours Overview What is JIRA Software? Managing agile projects using JIRA Software Managing project backlog Managing iterations / sprints Managing releases / versions Managing project components Managing security Managing fields and screens Managing custom issue types Viewing various burn-down/burn-up reports This course introduces students to JIRA Software which is one of the most popular agile project management tool. Agile methods help in accelerating the delivery of initial business value. Continuous planning and feedback ensures that value is maximized throughout the development process. JIRA Software lets you manage project backlog, plan and execute sprints, and manage releases. It also lets you view useful reports, such as, velocity, various burndown / burn-up charts. Navigating JIRA Connecting to JIRA Software JIRA Account System Dashboard Sidebars Global Sidebar Search Help Dashboards Projects Boards Issues Project Sidebar Summary Managing Projects What is a Project? What is a Project (Contd.)? Backlog Sprints Versions / Releases Issues What is Component? Project Name and Key Project Key Format Editing Project Key Caveats Editing Project Key Deleting Project Summary Managing Versions What is Version What is Version (Contd.)? Merging Versions Other Version Options Version Fields What is Version? Summary Managing Issues Issues What are Epics? Epics ? Types Creating a new Epic What is a Story? Creating a Story Story Estimation Tasks Sub-tasks Summary Managing Sprints Sprints What is typically done in Sprint Planning? Velocity Agile Board Sprint Naming Convention Sprint Execution Summary Search & Using JQL Search Search Types JQL JQL Examples Sharing search result Save Search and Reuse in a Board Summary Working with JIRA Dashboards and Reports What is a JIRA Dashboard? Creating a JIRA Dashboard Choosing a Dashboard Layout What is a Gadget? Gadgets Available Out-of-the-box Adding a Gadget to a Dashboard Adding a Gadget to a Dashboard (Example Calendar Gadget) Moving a Gadget Removing a Gadget from a Dashboard Viewing Dashboard as a Wallboard Deleting a Dashboard JIRA Reports Generating a JIRA Report Generating a JIRA Report (Example ? Burndown Chart) Viewing the Burndown Chart Report Categories Available Out-of-the-box Agile Reports Issue Analysis Reports Forecast & Management Reports For further details ? Summary Jira Agile Common Jira Software boards Scrum Agility Kanban Scrum vs. Kanban Scrumban History of Kanban Kanban for software teams Kanban boards Kanban boards (Contd.) Kanban cards The benefits of Kanban Planning flexibility Shortened time cycles Fewer bottlenecks Visual metrics Continuous Delivery Kanban ? Kanban backlog Summary Miscellaneous Issue Features Voting Watching an Issue Adding/Removing Labels Linking Issues Linking Issue (Contd.) Commenting on Issue Attaching a File to an Issue Attaching a File to an Issue (Contd.) Cloning (Copying) an Issue Cloning (Copying) an Issue (Contd.) Cloning (copying) an Issue (Contd.) Viewing an Issue?s Change History Viewing an Issue's Change History (Contd. Summary Managing Fields & Screens (OPTIONAL: TIME PERMITTING) Fields OOB Fields Custom Fields Field Type Screens Summary

WA2925 Agile Project Management using JIRA Software Training
Delivered OnlineFlexible Dates
£1,495

CompTIA A+ (220-1001)

By Course Cloud

Course Overview Get the essential IT skills you want and the knowledge that leading IT companies need when you take this course for CompTIA A+ (220-1001). CompTIA A+ training is dedicated to preparing IT students for troubleshooting and resolving problems in a broad range of disciplines and domains. You can learn how to pass the A+ exam and specialise in a wider variety of issues that will boost your earning potential to new levels of opportunity as an IT technician.  This CompTIA A+ tutorial focuses on 220-1001 principles with high-end support for most personal and business equipment. You will be taught how to resolve issues with mobile devices, networking technology, hardware, virtualisation, cloud computing and connectivity problems. This learning package is an absolute must for the budding IT technician who wants to gain the most sought-after skills. Enrol now for an assured future in IT technology.  This best selling CompTIA A+ (220-1001) has been developed by industry professionals and has already been completed by hundreds of satisfied students. This in-depth CompTIA A+ (220-1001) is suitable for anyone who wants to build their professional skill set and improve their expert knowledge. The CompTIA A+ (220-1001) is CPD-accredited, so you can be confident you're completing a quality training course will boost your CV and enhance your career potential. The CompTIA A+ (220-1001) is made up of several information-packed modules which break down each topic into bite-sized chunks to ensure you understand and retain everything you learn. After successfully completing the CompTIA A+ (220-1001), you will be awarded a certificate of completion as proof of your new skills. If you are looking to pursue a new career and want to build your professional skills to excel in your chosen field, the certificate of completion from the CompTIA A+ (220-1001) will help you stand out from the crowd. You can also validate your certification on our website. We know that you are busy and that time is precious, so we have designed the CompTIA A+ (220-1001) to be completed at your own pace, whether that's part-time or full-time. Get full course access upon registration and access the course materials from anywhere in the world, at any time, from any internet-enabled device.  Our experienced tutors are here to support you through the entire learning process and answer any queries you may have via email.

CompTIA A+ (220-1001)
Delivered Online On Demand
£319

ITIL 4 Specialist: Drive Stakeholder Value: On-Demand

By IIL Europe Ltd

ITIL® 4 Specialist: Drive Stakeholder Value: On-Demand The ITIL® 4 Specialist: Drive Stakeholder Value module is part of the Managing Professional stream for ITIL 4. Candidates need to pass the related certification exam for working towards the Managing Professional (MP) designation. This course is based on the ITIL® 4 Specialist: Drive Stakeholder Value exam specifications from AXELOS. With the help of ITIL® 4 concepts and terminology, exercises, and examples included in the course, candidates acquire the relevant knowledge required to pass the certification exam. What You Will Learn The learning objectives of the course are based on the following learning outcomes of the ITIL® 4 Specialist: Drive Stakeholder Value exam specification: Understand how customer journeys are designed Know how to target markets and stakeholders Know how to foster stakeholder relationships Know how to shape demand and define service offerings Know how to align expectations and agree on details of services Know how to onboard and offboard customers and users Know how to act together to ensure continual value co-creation (service consumption / provisioning) Know how to realize and validate service value Customer Journey Purpose of the Module Purpose of Mastering the Customer Journey Touchpoints and Service Interactions Module Topics Mapping the Customer Journey Designing the Customer Journey Measuring and Improving the Customer Journey Customer Journey Step 1: Explore Purpose of the Module Purpose of the Explore Step Module Topics Understanding Service Consumers Understanding Service Providers Understanding and Targeting Markets Customer Journey Step 2: Engage Purpose of the Module Purpose of the Engage Step Aspects of Service Value Module Topics Service Relationship Types Building Service Relationships Building and Sustaining Trust and Relationships Analyzing Customer Needs Managing Suppliers and Partners Customer Journey Step 3: Offer Purpose of the Module Purpose of Shaping Demand and Service Offerings Module Topics Managing Demand and Opportunities Specifying and Managing Customer Requirements Designing Service Offerings and User Experience Selling and Obtaining Service Offerings Customer Journey Step 4: Agree Purpose of the Module Purpose of Aligning Expectations and Agreeing on Services Module Topics Agreeing on and Planning Value Co-Creation Negotiating and Agreeing on a Service Customer Journey Step 5: Onboard Purpose of the Module Purpose of Onboarding and Offboarding ITIL® Management Practices Module Topics Planning Onboarding Fostering Relationships with Users Providing User Engagement and Delivery Channels Enabling Users for Service Elevating Mutual Capabilities Offboarding Customer Journey Step 6: Co-create Purpose of the Module Purpose of Service Provision and Consumption Module Topics Service Mindset Ongoing Service Interactions Nurturing User Communities Customer Journey Step 7: Realize Purpose of the Module Measuring Service Value Purpose of Value Capturing and Customer Journey Improvement Realizing Service Value in Different Settings Module Topics Tracking Value Realization Assessing and Reporting Value Realization Evaluating Value Realization and Improving Customer Journeys Realizing Value for the Service Provider

ITIL 4 Specialist: Drive Stakeholder Value: On-Demand
Delivered Online On Demand24 hours
£850

SAFe Lean Portfolio Management: Virtual In-House Training

By IIL Europe Ltd

SAFe® Lean Portfolio Management: Virtual In-House Training Create a culture of innovation, flexibility, and speed where all people in the portfolio can effectively execute as one unified team. In this course, you will gain the practical tools and techniques necessary to implement the Lean Portfolio Management functions of Strategy and Investment Funding, Agile Portfolio Operations, and Lean Governance. You will have the opportunity to capture the current and future state of the portfolio with the Portfolio Canvas tool and identify important business initiatives for achieving the future state. You'll be able to establish portfolio flow with the Portfolio Kanban and prioritize initiatives for maximum economic benefit. The course also provides insights on how to establish Value Stream Budgets and Lean Budget Guardrails and measure the Lean portfolio performance. What you will Learn Describe the importance of LPM Connect the portfolio to enterprise strategy Implement Lean budgeting and guardrails Establish portfolio flow with the Portfolio Kanban Support operational excellence with APMO and CoPs Coordinate Value Streams Measure the LPM performance Build a plan for LPM implementation Introducing Lean Portfolio Management (LPM) Establishing Strategy and Investment Funding Applying Agile Portfolio Operations Applying Lean Governance Implementing the LPM function

SAFe Lean Portfolio Management: Virtual In-House Training
Delivered OnlineFlexible Dates
£2,850

Learn to Crochet Course - Tues evenings - Walton-on-Thames - (4x 2 hour sessions)

By Merrian Holland

Learn to crochet in Surrey - this is an immersive 4 x 2 hour course running on Tuesday evenings in Walton-on-Thames.

Learn to Crochet Course - Tues evenings - Walton-on-Thames - (4x 2 hour sessions)
Delivered In-Person in Walton-on-Thames
£102

SC-900T00 Microsoft Security Compliance and Identity Fundamentals

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for The audience for this course is looking to familiarize themselves with the fundamentals of security, compliance, and identity (SCI) across cloud-based and related Microsoft services. The content for this course aligns to the SC-900 exam objective domain. Candidates should be familiar with Microsoft Azure and Microsoft 365 and understand how Microsoft security, compliance, and identity solutions can span across these solution areas to provide a holistic and end-to-end solution. Before attending this course, students must have: General understanding of networking and cloud computing concepts. General IT knowledge or any general experience working in an IT environment. General understanding of Microsoft Azure and Microsoft 365. This course provides foundational level knowledge on security, compliance, and identity concepts and related cloud-based Microsoft solutions. Prerequisites General understanding of networking and cloud computing concepts. General IT knowledge or any general experience working in an IT environment. General understanding of Microsoft Azure and Microsoft 365. 1 - Describe security and compliance concepts Describe the shared responsibility model Describe defense in depth Describe the Zero Trust model Describe governance, risk, and compliance (GRC) concepts 2 - Describe identity concepts Define authentication and authorization Define identity as the primary security perimeter Describe the role of the identity provider Describe the concept of directory services and Active Directory Describe the concept of federation 3 - Describe the function and identity types of Microsoft Entra ID Describe Microsoft Entra ID Describe types of identities Describe hybrid identity Describe external identities 4 - Describe the authentication capabilities of Microsoft Entra ID Describe authentication methods Describe multifactor authentication Describe self-service password reset Describe password protection and management capabilities 5 - Describe access management capabilities of Microsoft Entra ID Describe Conditional Access Describe Microsoft Entra roles and role-based access control (RBAC) 6 - Describe the identity protection and governance capabilities of Azure AD Describe Microsoft Entra ID Governance Describe access reviews Describe entitlement management Describe the capabilities of Privileged identity Management Describe Microsoft Entra ID Protection Describe Microsoft Entra Permissions Management Describe Microsoft Entra Verified ID 7 - Describe core infrastructure security services in Azure Describe Azure DDoS protection Describe Azure Firewall Describe Web Application Firewall Describe network segmentation in Azure Describe Azure Network Security Groups Describe Azure Bastion Describe Azure Key Vault 8 - Describe the security management capabilities in Azure Describe Microsoft Defender for Cloud Describe how security policies and initiatives improve cloud security posture Describe Cloud security posture management Describe the enhanced security of Microsoft Defender for Cloud Describe DevOps security management 9 - Describe security capabilities of Microsoft Sentinel Describe threat detection and mitigation capabilities in Microsoft Sentinel Describe Microsoft Security Copilot 10 - Describe threat protection with Microsoft Defender XDR Describe Microsoft Defender XDR services Describe Microsoft Defender for Office 365 Describe Microsoft Defender for Endpoint Describe Microsoft Defender for Cloud Apps Describe Microsoft Defender for Identity Describe Microsoft Defender Vulnerability Management Describe Microsoft Defender Threat Intelligence Describe the Microsoft Defender portal 11 - Describe Microsoft?s Service Trust portal and privacy capabilities Describe the offerings of the Service Trust portal Describe Microsoft's privacy principles Describe Microsoft Priva 12 - Describe the compliance management capabilities in Microsoft Purview Describe the Microsoft Purview compliance portal Describe Compliance Manager Describe use and benefits of compliance score 13 - Describe information protection, data lifecycle management, and data governance capabilities in Microsoft Purview Know your data, protect your data, and govern your data Describe the data classification capabilities of the compliance portal Describe sensitivity labels and policies Describe data loss prevention Describe retention policies and retention labels Describe records management Describe the Microsoft Purview unified data governance solution 14 - Describe the insider risk capabilities in Microsoft Purview Describe insider risk management Describe communication compliance 15 - Describe the eDiscovery and Audit capabilities in Microsoft Purview Describe the eDiscovery solutions in Microsoft Purview Describe the audit solutions in Microsoft Purview

SC-900T00 Microsoft Security Compliance and Identity Fundamentals
Delivered OnlineFlexible Dates
£595

Learn to use your sewing machine & Make a pencil case

By isifiso

Are you looking for a sewing machine workshop nearby? Want to learn the fundamentals? Then visit the sewing machine workshop in London and enjoy the joy of stitching! This session will teach you everything from threading your machine and winding up the small bobbin to trying out different stitches and embroidering with your machine. This course is ideal for beginners who want to learn in an enjoyable and casual setting. Sign up today and let's start stitching!

Learn to use your sewing machine & Make a pencil case
Delivered In-Person in London
£43

TWO SPACES LEFT! 23rd September John Baker #Agent121. Looking for: YA/NA FANTASY, SFF, HORROR, ADULT FICTION

5.0(3)

By I Am In Print

LOOKING FOR: YA/NA FANTASY, SFF, HORROR, ADULT FICTION John Baker (he/him) joined the Bell Lomax Moreton agency in 2019, cultivating a list shaped around his passion for science fiction, fantasy, and horror, though has lately also branched out into action/adventure fiction. John focuses on authors writing in the Adult, New Adult, and YA spaces. John leads the wider agency's film & TV desk, is the Secretary of the Association of Author’s Agents, and the co-chair of the AAA’s Bridge Committee. He also serves on the Kingston University MA Publishing Advisory Board. Under the umbrella of speculative fiction, John is looking for fantasy, science fiction, horror, romantasy, or literary speculative fiction. He has built a reputation as a champion of underrepresented voices and stories, be it from creators hailing from the global majority and their diasporas or neurodiverse authors, and naturally gravitates towards this kind of storytelling. In short, if he’s never read a story like yours before, he wants to see it. Adult fantasy: John loves beefy epic fantasy, especially non-Anglo Christian-inspired. Give him an immersive world, a fresh magical or mythic system, and an exciting cast of characters and he’ll be happy. He is a broad church in the genre so loves a political fantasy, swords and sorcery, courtly intrigue, monster hunting and dastardly villains. John is keen to find an urban fantasy that feels fresh and fun and he’s a sucker for a heroic quest narrative. He’s also very open to fantasy that isn’t easily categorised, but it is playing in that world. John is keenly hunting for more historical fantasy, especially inspired by modern history. He’s had fun with mythological retellings in the past, but as ever, let’s make sure it’s shining the spotlight on new stories. He would also love fantasy that centres on types of relationships less celebrated in fantasy, such as established and secure married couples, or siblings. NA/YA fantasy: In this genre, most importantly, John wants to have a good time, whether it’s swoon-worthy kisses in lush ball gowns, or gruesome gore and monsters, so send him pacy, plot-filled adventures. He’d love more books that teenage boys would love: Skullduggery Pleasant forever! Romantasy: The thriving new romantasy genre comes with its own set of challenges, so John wants to know what makes your romantasy different; what will set it out from the (very crowded!) market. Give it completely barmy stakes, cool and unique new settings, or a love story that will make your jaw drop. To be clear, he’s happily sorted for a human person meets a fae creature in the spooky woods. Also, cosmic romance is the genre of the future. Give him romantasy in space. Easy. Horror: John and horror are old friends. He loves horror inspired by myth and folklore, subversive weird horror that leaves your eyebrows in your hairline, historical horror that pulls from ghastly true stories, and anything that you’ll be reading with the light on. He also loves a gothic element and is particularly looking for horror with a strong romantic throughline, fun YA horror, and female & NB horror authors. Science fiction: SF is coming back! And John has been shouting about that. He loves to see an adventurous found-family romp through space or an epic, crunchy space opera. Speculative near-future is fun too, in the vein of Black Mirror’s more uplifting episodes, (e.g. San Junipero). He loves YA science fiction as well; the more creative the better. Literary: John is open to finding more rich magical realism or something character-led yet supernatural and would love a high-concept mystery, in the vein of Stuart Turton. He also loves spec fic that uses the speculative lightly as a way of confronting a deeper truth in society today. Weird stuff: John wants books that will blow people’s minds and defy categorisation. This is hard to describe, but think Gideon The Ninth, The Library At Mount Char, This Is How You Lose The Time War. John loves a pitch that leaves the editors baffled but intrigued. Action/Adventure, Historical Adventure, Espionage: John is branching out into non-speculative adventures, such as John Le Carré, Lee Child, Ian Flemming, and Mick Herron. More as his taste develops, but the hunt is on! Not looking for: military sci-fi or hard SF, or anything with biblical “character wakes up in purgatory/heaven/hell” narratives. The right comedic fantasy has yet to hit his inbox, but please don’t comp Douglas Adams or Sir Terry. John would like you to submit a covering letter, 1-2 page synopsis and the first two chapters of your manuscript in a single word document. (In addition to the paid sessions, John is kindly offering one free session for low income/under-represented writers. Please email agent121@iaminprint.co.uk to apply, outlining your case for this option which is offered at the discretion of I Am In Print).  By booking you understand you need to conduct an internet connection test with I Am In Print prior to the event. You also agree to email your material in one document to reach I Am In Print by the stated submission deadline and note that I Am In Print take no responsibility for the advice received during your agent meeting. The submission deadline is: Tuesday 16th September 2025

TWO SPACES LEFT! 23rd September John Baker #Agent121. Looking for: YA/NA FANTASY, SFF, HORROR, ADULT FICTION
Delivered Online + more
£72