• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

10217 Professional Skills Course (PSC) courses

DP-080T00 Querying Data with Microsoft Transact-SQL

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course can be valuable for anyone who needs to write basic SQL or Transact-SQL queries. This includes anyone working with data as a data analyst, a data engineer, a data scientist, a database administrator or a database developer. It can also be useful for others peripherally involved with data, or wanting to learn more about working with data such as solution architects, students and technology managers. This course will teach the basics of Microsoft's dialect of the standard SQL language: Transact-SQL. Topics include both querying and modifying data in relational databases that are hosted in Microsoft SQL Server-based database systems, including: Microsoft SQL Server, Azure SQL Database and, Azure Synapse Analytics. 1 - INTRODUCTION TO TRANSACT-SQL * Work with schemas * Explore the structure of SQL statements * Examine the SELECT statement * Work with data types * Handle NULLs 2 - SORT AND FILTER RESULTS IN T-SQL * Sort your results * Limit the sorted results * Page results * Remove duplicates * Filter data with predicates 3 - COMBINE MULTIPLE TABLES WITH JOINS IN T-SQL * Understand joins concepts and syntax * Use inner joins * Use outer joins * Use cross joins * Use self joins 4 - WRITE SUBQUERIES IN T-SQL * Understand subqueries * Use scalar or multi-valued subqueries * Use self-contained or correlated subqueries 5 - USE BUILT-IN FUNCTIONS AND GROUP BY IN TRANSACT-SQL * Categorize built-in functions * Use scalar functions * Use ranking and rowset functions * Use aggregate functions * Summarize data with GROUP BY * Filter groups with HAVING 6 - MODIFY DATA WITH T-SQL * Insert data * Generate automatic values * Update data * Delete data * Merge data based on multiple tables ADDITIONAL COURSE DETAILS: Nexus Humans DP-080T00 Querying Data with Microsoft Transact-SQL training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the DP-080T00 Querying Data with Microsoft Transact-SQL course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

DP-080T00 Querying Data with Microsoft Transact-SQL
Delivered Online3 days, Jul 25th, 08:30 + 5 more
£1190

EC-Council Certified Ethical Hacker (CEH) v12

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The Certified Ethical Hacking v12 course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Overview Information security controls, laws, and standards. Various types of footprinting, footprinting tools, and countermeasures. Network scanning techniques and scanning countermeasures Enumeration techniques and enumeration countermeasures Vulnerability analysis to identify security loopholes in the target organization?s network, communication infrastructure, and end systems. System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities. Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures. Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing. Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures. DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures. Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures. Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures. Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures. SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures. Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools. Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools. Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures. Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools. Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap. Threats to IoT and OT platforms and defending IoT and OT devices. Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools. CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so you will be better positioned to setup your security infrastructure and defend against future attacks. An understanding of system weaknesses and vulnerabilities helps organizations strengthen their system security controls to minimize the risk of an incident. CEH was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to achieve the CEH credential. You will be exposed to an entirely different posture toward the responsibilities and measures required to be secure. Now in its 12th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies. 1 - INTRODUCTION TO ETHICAL HACKING * Information Security Overview * Cyber Kill Chain Concepts * Hacking Concepts * Ethical Hacking Concepts * Information Security Controls * Information Security Laws and Standards 2 - 2 - FOOT-PRINTING AND RECONNAISSANCE * Footprinting Concepts * Footprinting through Search Engines * Footprinting through Web Services * Footprinting through Social Networking Sites * Website Footprinting * Email Footprinting * Who is Footprinting * DNS Footprinting * Network Footprinting * Footprinting through Social Engineering * Footprinting Tools * Footprinting Countermeasures 3 - SCANNING NETWORKS * Network Scanning Concepts * Scanning Tools * Host Discovery * Port and Service Discovery * OS Discovery (Banner Grabbing/OS Fingerprinting) * Scanning Beyond IDS and Firewall * Draw Network Diagrams 4 - ENUMERATION * Enumeration Concepts * NetBIOS Enumeration * SNMP Enumeration * LDAP Enumeration * NTP and NFS Enumeration * SMTP and DNS Enumeration * Other Enumeration Techniques * Enumeration Countermeasures 5 - VULNERABILITY ANALYSIS * Vulnerability Assessment Concepts * Vulnerability Classification and Assessment Types * Vulnerability Assessment Solutions and Tools * Vulnerability Assessment Reports 6 - SYSTEM HACKING * System Hacking Concepts * Gaining Access * Escalating Privileges * Maintaining Access * Clearing Logs 7 - MALWARE THREATS * Malware Concepts * APT Concepts * Trojan Concepts * Virus and Worm Concepts * Fileless Malware Concepts * Malware Analysis * Countermeasures * Anti-Malware Software 8 - SNIFFING * Sniffing Concepts * Sniffing Technique: MAC Attacks * Sniffing Technique: DHCP Attacks * Sniffing Technique: ARP Poisoning * Sniffing Technique: Spoofing Attacks * Sniffing Technique: DNS Poisoning * Sniffing Tools * Countermeasures * Sniffing Detection Techniques 9 - SOCIAL ENGINEERING * Social Engineering Concepts * Social Engineering Techniques * Insider Threats * Impersonation on Social Networking Sites * Identity Theft * Countermeasures 10 - DENIAL-OF-SERVICE * DoS/DDoS Concepts * DoS/DDoS Attack Techniques * BotnetsDDoS Case Study * DoS/DDoS Attack Tools * Countermeasures * DoS/DDoS Protection Tools 11 - SESSION HIJACKING * Session Hijacking Concepts * Application Level Session Hijacking * Network Level Session Hijacking * Session Hijacking Tools * Countermeasures 12 - EVADING IDS, FIREWALLS, AND HONEYPOTS * IDS, IPS, Firewall, and Honeypot Concepts * IDS, IPS, Firewall, and Honeypot Solutions * Evading IDS * Evading Firewalls * IDS/Firewall Evading Tools * Detecting Honeypots * IDS/Firewall Evasion Countermeasures 13 - HACKING WEB SERVERS * Web Server Concepts * Web Server Attacks * Web Server Attack Methodology * Web Server Attack Tools * Countermeasures * Patch Management * Web Server Security Tools 14 - HACKING WEB APPLICATIONS * Web Application Concepts * Web Application Threats * Web Application Hacking Methodology * Web API, Webhooks, and Web Shell * Web Application Security 15 - SQL INJECTION * SQL Injection Concepts * Types of SQL Injection * SQL Injection Methodology * SQL Injection Tools * Evasion Techniques * Countermeasures 16 - HACKING WIRELESS NETWORKS * Wireless Concepts * Wireless Encryption * Wireless Threats * Wireless Hacking Methodology * Wireless Hacking Tools * Bluetooth Hacking * Countermeasures * Wireless Security Tools 17 - HACKING MOBILE PLATFORMS * Mobile Platform Attack Vectors * Hacking Android OS * Hacking iOS * Mobile Device Management * Mobile Security Guidelines and Tools 18 - IOT AND OT HACKING * IoT Hacking * IoT Concepts * IoT Attacks * IoT Hacking Methodology * IoT Hacking Tools * Countermeasures * OT Hacking * OT Concepts * OT Attacks * OT Hacking Methodology * OT Hacking Tools * Countermeasures 19 - CLOUD COMPUTING * Cloud Computing Concepts * Container Technology * Serverless Computing * Cloud Computing Threats * Cloud Hacking * Cloud Security 20 - CRYPTOGRAPHY * Cryptography Concepts * Encryption Algorithms * Cryptography Tools * Public Key Infrastructure (PKI) * Email Encryption * Disk Encryption * Cryptanalysis * Countermeasures ADDITIONAL COURSE DETAILS: Nexus Humans EC-Council Certified Ethical Hacker (CEH) v.12 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified Ethical Hacker (CEH) v.12 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

EC-Council Certified Ethical Hacker (CEH) v12
Delivered Online6 days, Jul 29th, 13:00 + 4 more
£3495

PL-400T00 Microsoft Power Platform Developer

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Candidates for this course design, develop, secure, and troubleshoot Power Platform solutions. Candidates implement components of a solution that include application enhancements, custom user experience, system integrations, data conversions, custom process automation, and custom visualizations. Candidates will gain applied knowledge of Power Platform services, including in-depth understanding of capabilities, boundaries, and constraints. Overview After completing this course, students will be able to: Create a technical design Configure Common Data Service Create and configure Power Apps Configure business process automation Extend the user experience Extend the platform Develop Integrations The Microsoft Power Platform helps organizations optimize their operations by simplifying, automating and transforming business tasks and processes. In this course, students will learn how to build Power Apps, Automate Flows and extend the platform to complete business requirements and solve complex business problems. CREATE A MODEL-DRIVEN APPLICATION IN POWER APPS * This module introduces you to creating a model-driven app in Power Apps that uses Common Data Service. GET STARTED USING COMMON DATA SERVICE * This module will explain the concepts behind and benefits of Common Data Service. Creating an environment, entities, fields and options sets are also discussed. CREATE A CANVAS APP IN POWER APPS * This module introduces you to Power Apps, helps you create and customize an app, and then manage and distribute it. It will also show you how to provide the best app navigation, and build the best UI using themes, icons, images, personalization, different form factors, and controls. AUTOMATE A BUSINESS PROCESS USING POWER AUTOMATE * This module introduces you to Power Automate, teaches you how to build workflows, and how to administer flows. CREATE A BUSINESS PROCESS FLOW IN POWER AUTOMATE * This module introduces you to creating business process flows in Power Automate INTRODUCTION TO DEVELOPING WITH POWER PLATFORM * This module is the first step in learning about platform, tools, and the ecosystem of the Power Platform EXTENDING THE POWER PLATFORM USER EXPERIENCE MODEL DRIVEN APPS * This module describes how to create client scripting, perform common actions with client script, and automate business process flow with client scrip. Learn about what client script can do, rules, and maintaining scripts. Discover when to use client script as well as when not to use client script. CREATE COMPONENTS WITH POWER APPS COMPONENT FRAMEWORK * This module describes how to get started with Power Apps Component Framework with an introductory module on the core concepts and components. Then it shows you how to build a component and work with advanced Power Apps Component Framework features. EXTENDING THE POWER PLATFORM COMMON DATA SERVICE * This module looks at the tools and resources needed for extending the Power Platform. We'll start with looking at the SDKs, the extensibility model, and event framework. This learning path also covers when to use plug-ins. Configuration of plug-ins as well as registering and deploying plug-ins. INTEGRATE WITH POWER PLATFORM AND COMMON DATA SERVICE * This module describes how to integrate with Common Data Service using code by learning about Common Data Service API. Get an in-depth overview of options available with Common Data Service to integrate data and events to Azure. EXTEND POWER APPS PORTALS * This module describes how to transform a content portal into a full web app interacting with Common Data Service. We will also cover the options available to customizers and developers to extend the portal functionality and integrate with Office 365, Power Platform, and Azure components. ADDITIONAL COURSE DETAILS: Nexus Humans PL-400T00 Microsoft Power Platform Developer training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the PL-400T00 Microsoft Power Platform Developer course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

PL-400T00 Microsoft Power Platform Developer
Delivered Online6 days, Jul 29th, 13:00 + 3 more
£2975

Microsoft PowerPoint for the Business User

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is intended for people who use PowerPoint for their business communication needs. Overview To ensure your success in this course, you should have end-user skills with any current version of Windows, including being able to open and close applications, navigate basic file structures, and manage files and folders. This course is intended for those who wish to take advantage of the application for high quality business presentations and reports. PRESENTATIONS * Create Attractive Presentations from Existing PowerPoint Templates * Creating Presentations Quickly using Outline to build a Structure * Incorporating and reusing slides from other presentations into your own TEMPLATES AND CUSTOMIZATION * Using Slide Layouts * Using the Slide Master * Creating Custom Slide Layout WORKING WITH CHARTS AND TABLES * Create and Modify Tables * Create Charts and Graphs * Copying Charts into PowerPoint * Link Vs Embed ADD VISUAL ELEMENTS TO A PRESENTATION * Create and Modify Shapes * Add Images * Create SmartArt to Make Easily Modifiable graphics * Use SmartArt to Give Dull Text a More Visual Appeal WORKING WITH MEDIA AND ANIMATION * Add Audio to A Presentation * Add Video to A Presentation * Add and Customize Animations * Add and Customize Transitions PREPARING TO PRESENT * Add Notes to A Presentation * Presenter View And Slide Show Controls * Create A Custom Slide Show * Saving and Sharing the Presentation * Printing Options and Handouts ADDITIONAL COURSE DETAILS: Nexus Humans Microsoft PowerPoint for the Business User training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Microsoft PowerPoint for the Business User course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Microsoft PowerPoint for the Business User
Delivered OnlineTwo days, Jul 23rd, 08:30 + 2 more
£197

SC-100T00 Microsoft Cybersecurity Architect

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is for experienced cloud security engineers who have taken a previous certification in the security, compliance and identity portfolio. Specifically, students should have advanced experience and knowledge in a wide range of security engineering areas, including identity and access, platform protection, security operations, securing data, and securing applications. They should also have experience with hybrid and cloud implementations. Beginning students should instead take the course SC-900: Microsoft Security, Compliance, and Identity Fundamentals. This is an advanced, expert-level course. Although not required to attend, students are strongly encouraged to have taken and passed another associate level certification in the security, compliance and identity portfolio (such as AZ-500, SC-200 or SC-300) before attending this class. This course prepares students with the expertise to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Governance Risk Compliance (GRC), security operations (SecOps), and data and applications. Students will also learn how to design and architect solutions using zero trust principles and specify security requirements for cloud infrastructure in different service models (SaaS, PaaS, IaaS). Prerequisites Highly recommended to have attended and passed one of the associate level certifications in the security, compliance and identity portfolio (such as AZ-500T00 Microsoft Azure Security Technologies, SC-200T00: Microsoft Security Operations Analyst, or SC-300T00: Microsoft Identity and Access Administrator.) Advanced experience and knowledge in identity and access, platform protection, security operations, securing data and securing applications. Experience with hybrid and cloud implementations. 1 - INTRODUCTION TO ZERO TRUST AND BEST PRACTICE FRAMEWORKS * Zero Trust initiatives * Zero Trust technology pillars part 1 * Zero Trust technology pillars part 2 2 - DESIGN SOLUTIONS THAT ALIGN WITH THE CLOUD ADOPTION FRAMEWORK (CAF) AND WELL-ARCHITECTED FRAMEWORK (WAF) * Define a security strategy * Cloud Adoption Framework secure methodology * Design security with Azure Landing Zones * The Well-Architected Framework security pillar 3 - DESIGN SOLUTIONS THAT ALIGN WITH THE MICROSOFT CYBERSECURITY REFERENCE ARCHITECTURE (MCRA) AND MICROSOFT CLOUD SECURITY BENCHMARK (MCSB) * Design solutions with best practices for capabilities and controls * Design solutions with best practices for attack protection 4 - DESIGN A RESILIENCY STRATEGY FOR COMMON CYBERTHREATS LIKE RANSOMWARE * Common cyberthreats and attack patterns * Support business resiliency * Ransomware protection * Configurations for secure backup and restore * Security updates 5 - CASE STUDY: DESIGN SOLUTIONS THAT ALIGN WITH SECURITY BEST PRACTICES AND PRIORITIES * Case study description * Case study answers * Conceptual walkthrough * Technical walkthrough 6 - DESIGN SOLUTIONS FOR REGULATORY COMPLIANCE * Translate compliance requirements into a security solution * Address compliance requirements with Microsoft Purview * Address privacy requirements with Microsoft Priva * Address security and compliance requirements with Azure policy * Evaluate infrastructure compliance with Defender for Cloud 7 - DESIGN SOLUTIONS FOR IDENTITY AND ACCESS MANAGEMENT * Design cloud, hybrid and multicloud access strategies (including Azure AD) * Design a solution for external identities * Design modern authentication and authorization strategies * Align conditional access and Zero Trust * Specify requirements to secure Active Directory Domain Services (AD DS) * Design a solution to manage secrets, keys, and certificates 8 - DESIGN SOLUTIONS FOR SECURING PRIVILEGED ACCESS * The enterprise access model * Design identity governance solutions * Design a solution to secure tenant administration * Design a solution for cloud infrastructure entitlement management (CIEM) * Design a solution for privileged access workstations and bastion services 9 - DESIGN SOLUTIONS FOR SECURITY OPERATIONS * Design security operations capabilities in hybrid and multicloud environments * Design centralized logging and auditing * Design security information and event management (SIEM) solutions * Design solutions for detection and response * Design a solution for security orchestration, automation, and response (SOAR) * Design security workflows * Design threat detection coverage 10 - CASE STUDY: DESIGN SECURITY OPERATIONS, IDENTITY AND COMPLIANCE CAPABILITIES * Case study description * Case study answers * Conceptual walkthrough * Technical walkthrough 11 - DESIGN SOLUTIONS FOR SECURING MICROSOFT 365 * Evaluate security posture for collaboration and productivity workloads * Design a Microsoft 365 Defender solution * Design configurations and operational practices for Microsoft 365 12 - DESIGN SOLUTIONS FOR SECURING APPLICATIONS * Design and implement standards to secure application development * Evaluate security posture of existing application portfolios * Evaluate application threats with threat modeling * Design security lifecycle strategy for applications * Secure access for workload identities * Design a solution for API management and security * Design a solution for secure access to applications 13 - DESIGN SOLUTIONS FOR SECURING AN ORGANIZATION'S DATA * Design a solution for data discovery and classification using Microsoft Purview * Design a solution for data protection * Design data security for Azure workloads * Design security for Azure Storage * Design a security solution with Microsoft Defender for SQL and Microsoft Defender for Storage 14 - CASE STUDY: DESIGN SECURITY SOLUTIONS FOR APPLICATIONS AND DATA * Case study description * Case study answers * Conceptual walkthrough * Technical walkthrough 15 - SPECIFY REQUIREMENTS FOR SECURING SAAS, PAAS, AND IAAS SERVICES * Specify security baselines for SaaS, PaaS, and IaaS services * Specify security requirements for web workloads * Specify security requirements for containers and container orchestration 16 - DESIGN SOLUTIONS FOR SECURITY POSTURE MANAGEMENT IN HYBRID AND MULTICLOUD ENVIRONMENTS * Evaluate security posture by using Microsoft Cloud Security Benchmark * Design integrated posture management and workload protection * Evaluate security posture by using Microsoft Defender for Cloud * Posture evaluation with Microsoft Defender for Cloud secure score * Design cloud workload protection with Microsoft Defender for Cloud * Integrate hybrid and multicloud environments with Azure Arc * Design a solution for external attack surface management 17 - DESIGN SOLUTIONS FOR SECURING SERVER AND CLIENT ENDPOINTS * Specify server security requirements * Specify requirements for mobile devices and clients * Specify internet of things (IoT) and embedded device security requirements * Secure operational technology (OT) and industrial control systems (ICS) with Microsoft Defender for IoT * Specify security baselines for server and client endpoints * Design a solution for secure remote access 18 - DESIGN SOLUTIONS FOR NETWORK SECURITY * Design solutions for network segmentation * Design solutions for traffic filtering with network security groups * Design solutions for network posture management * Design solutions for network monitoring 19 - CASE STUDY: DESIGN SECURITY SOLUTIONS FOR INFRASTRUCTURE * Case study description * Case study answers * Conceptual walkthrough * Technical walkthrough ADDITIONAL COURSE DETAILS: Nexus Humans SC-100T00 Microsoft Cybersecurity Architect training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SC-100T00 Microsoft Cybersecurity Architect course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

SC-100T00 Microsoft Cybersecurity Architect
Delivered Online5 days, Jul 29th, 13:00 + 1 more
£2380

INTRODUCTION TO LEARNING LEATHER CRAFT SKILLS

5.0(52)

By The London Leather Workshop

– LEATHER CRAFT WORKSHOP- INTRODUCTION TO LEARNING LEATHER CRAFT SKILLS ONE TEACHER, SIX STUDENTS WERE? AT OUR LONDON STUDIOhttps://www.thelondonleatherworkshop.com/contact-us/ WHEN? PLEASE SELECT YOUR PREFERRED DATE(S) THROUGH THE BUTTON BELOW COST: ONE MEETING OF 6.5 HOURS £169.50 COURSE MATERIALS INCLUDED (WORTH £20) LEVEL: BEGINNERS AND BEGINNERS WITH SOME PREVIOUS EXPERIENCE LEARN LEATHER CRAFT TECHNIQUES: WHAT IS THIS COURSE ABOUT? THIS IS A THEORETICAL AND PRACTICAL INTRODUCTORY GROUP TUITION DURING WHICH YOU WILL BE TAUGHT COMMON, ESSENTIAL LEATHER CRAFTING AND BASIC SEWING TECHNIQUES. YOU WILL BE TAUGHT HOW TO CORRECTLY USE HAND TOOLS, HOW TO HAND SEW LEATHER AND UNDERSTAND THE MOST COMMON FINISHING TECHNIQUES USED IN BAG AND ACCESSORY MAKING. YOU WILL LEARN ABOUT DIFFERENT TYPES OF LEATHER AND UNDERSTAND HOW TO SELECT THE CORRECT TYPE OF MATERIAL(S) FOR YOUR PROJECT. YOU WILL RECEIVE AN OVERVIEW OF THE TECHNICAL ASPECTS OF WORKING WITH LEATHER AND CONSTRUCTING BAGS AND ACCESSORIES SUCH AS PREPARING, MARKING, CUTTING, GLUING, REINFORCING, DEBOSSING AND MORE. YOU WILL PRODUCE YOUR OWN SAMPLES OF WORK TO TAKE HOME WITH YOU. YOU WILL RECEIVE RELEVANT, USEFUL AND INFORMATIVE HANDOUTS AS WELL AS LISTS OF LEATHER AND TOOL SUPPLIERS. THIS IS A PROFESSIONAL COURSE DELIVERED BY A PROTOTYPE MAKER AND MANUFACTURER, WITH THE AIM OF PROVIDING AN OVERVIEW AND HANDS-ON EXPERIENCE ON MORE COMMON LEATHER WORKING PRACTICES.   AT THE END OF THE TUITION YOU WILL HAVE: – GAINED AN UNDERSTANDING OF LEATHER TYPES AND TANNING METHODS – UNDERSTOOD WHAT IT MEANS TO WORK WITH DIFFERENT LEATHER TYPES AND THICKNESSES AND HAVE THE ABILITY TO SOURCE AND SELECT THE CORRECT TOOLS AND MATERIALS FOR YOUR PROJECTS. – GAINED CONFIDENCE IN USING SPECIFIC TOOLS FOR PREPARING, MARKING, FINISHING AND CUTTING LEATHER. – UNDERSTOOD AND PRACTICED LEATHER CRAFT TECHNIQUES SUCH AS BEVELING AND BURNISHING TECHNIQUES – LEARNT BASIC LEATHER HAND SEWING TECHNIQUES WHAT WILL BE TAUGHT? BELOW IS A LIST OF TOPICS COVERED DURING THE CLASSES: – UNDERSTANDING LEATHER: OVERVIEWS ON TYPES OF LEATHER, TANNING, FINISHINGS AND BEST USE – VEGAN LEATHERS: AN OVERVIEW ON DIFFERENT TYPES AND FEATURES – UNDERSTANDING THE IMPORTANCE OF CHOOSING THE RIGHT MATERIALS FOR YOUR PROJECT AND THE RIGHT TOOLS FOR YOUR MATERIALS – LEATHER PREPARING, PATTERN PLACEMENT AND MARKING ON LEATHER – CUTTING COMPLEX SHAPES USING A VARIETY OF TOOLS – USING LEATHER PUNCHES – UNDERSTANDING THE USE OF SKIVING, BEVELING AND GROOVING – FINISHING LEATHER EDGES: PAINTING VS BURNISHING – USING VARIOUS LEATHER GLUES AND TAPES – UNDERSTAND THE USE OF REINFORCEMENTS, FUSINGS AND STABILISERS TO BACK LEATHER – TO LEARN BASIC LEATHER HAND SEWING TECHNIQUES – TO UNDERSTAND THE TOOLS AND MATERIALS USED IN SADDLE STITCHING – PROTOTYPING AND MANUFACTURING LEATHER GOODS: MENTIONS OF DIFFERENT WORKING METHODS, MACHINES AND TOOLS   IMPORTANT TO KNOW: WE WILL ALWAYS TRY TO COVER AS MUCH ON THE SYLLABUS AS POSSIBLE AND DEPENDING ON YOUR ABILITY AND PREVIOUS EXPERIENCE, WE MIGHT NOT BE ABLE TO COMPLETE THE PROGRAM OR WE MIGHT INSTEAD BE ABLE TO TEACH YOU ADDITIONAL TECHNIQUES RELATING TO THE ABOVE LISTED TOPICS, SUCH AS: – UNDERSTANDING FITTINGS, CLOSURE TYPES, FASTENING TECHNIQUES AND TOOLS: SAM BROWNS, MAGNETS, POP BUTTONS, EYELETS, ETC – SEW AND FINISH SIMPLE ZIPS STYLES, HANDLES AND STRAPS – UNDERSTANDING OPTIONS AND THE CONSTRUCTION OF HOW TO LINE BAGS AND ACCESSORIES INCLUDED IN THE COURSE: YOU WILL BE PROVIDED WITH USEFUL DIGITAL AND PAPER HANDOUTS WHICH CONTAIN: – A LIST OF TOOLS AND MATERIALS USED DURING THE LESSON(S), INCLUDING A DESCRIPTION OF WHAT THEY ARE AND HOW THEY ARE USED – A LIST OF RECOMMENDED SUPPLIERS FOR BOTH LEATHER AND FITTINGS (PHYSICALLY IN LONDON AND ONLINE) – A GLOSSARY CONTAINING INFORMATION ABOUT LEATHER TYPES AND CHARACTERISTICS WHAT ARE THE ENTRY REQUIREMENTS? THIS COURSE IS SUITABLE FOR TOTAL BEGINNERS, BEGINNERS WITH SOME EXPERIENCE AND INTERMEDIATE. YOU SHOULD BE ABLE TO USE MEASUREMENTS AND UNDERSTAND VERBAL AND WRITTEN ENGLISH INSTRUCTIONS.   ARE THERE ANY OTHER COSTS? IS THERE ANYTHING I NEED TO BRING? MATERIALS ARE INCLUDED. FEEL FREE TO BRING A NOTEPAD, IF YOU WOULD LIKE TO TAKE SOME NOTES, WE WILL PROVIDE THE REST. HOW LONG IS THIS TUITION?: THIS TUITION WILL REQUIRE UP TO 6.5 HOURS TO COMPLETE. WE AIM TO PROVIDE CUSTOMISED AND HIGH QUALITY TUITION SERVICES AND BY ONLY ALLOWING UP TO 6 STUDENTS AT A TIME, WE ARE ABLE TO FOCUS ON EACH PERSON NEEDS AND INTERESTS. AS EVERY STUDENT HAS A DIFFERENT LEVEL OF ABILITY AND PREVIOUS EXPERIENCE, THIS COURSE MIGHT LEAD SOME STUDENTS TO COMPLETE THE CORE ASPECTS OF THE LESSON IN A SHORTER TIME FRAME THAN OTHERS. STUDENTS WHO COMPLETE THE COURSE EARLY WILL BE WELCOME TO STAY AND USE THE STUDIO FACILITIES TO EXERCISE ON THE TOPICS OF THE LESSON.

INTRODUCTION TO LEARNING LEATHER CRAFT SKILLS
Delivered In-Person in London6 hours 30 minutes, Jul 23rd, 09:00
£169.5

55265 Microsoft© PowerApps

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This class has something for everything, from beginners who wish to customise their data entry forms in SharePoint right up to advanced users who need to use advanced formulas to deliver more bespoke actions to their apps. Overview After taking this course, students will be able to: - Understand when to use PowerApp. - Describe the components of PowerApps and their correct use. - Create PowerApps from existing data sources. - Brand PowerApps. - Customize PowerApps beyond just using the automated wizards. - Connect to a range of data sources from Excel to Azure SQL. - Understand the difference between canvas apps and model-driven apps. - Integrate PowerApps with other Office 365 systems ? including Teams and SharePoint Online. - Administer and Maintain PowerApps Students will be taught how to design, test and publish new apps that work with a variety of data sources. We will take users through a selection of well-crafted lessons to help them build new applications for their business. 1 - AN INTRODUCTION TO POWERAPPS * What is PowerApps? * The benefits of apps * How to get PowerApps * Canvas Apps and Model-Driven Apps * License Options and Costs * Discover PowerApps with Templates * Lab 1: Introduction to PowerApps 2 - GETTING STARTED WITH POWERAPPS * Building a new app from a data source * Add, edit and remove controls * Intro to Formulas * Testing an app * App Settings * Publish and Share Apps * Version History and Restore * PowerApps Mobile App * Lab 1: Getting Started 3 - BRANDING AND MEDIA * Less is more * Duplicate Screens * Fonts * Screen Colours and Matching Colours * Screen Backgrounds * Buttons and Icons * Hide on Timer * Size and Alignment by reference * Show and Hide on Timer * Lab 1: Branding and Media 4 - POWERAPPS CONTROLS * Text Controls for Data Entry and Display * Controls ? Drop downs, combo box, date picker, radio button and more * Forms ? Add and edit data in underlying data sources quickly * Charts ? present information in pie, line and bar charts * Lab 1: Build Apps from Blank 5 - DATA SOURCES AND LOGIC * Data Storage and Services * How do I decide which database to use? * Connect to on-premises data - Gateway * What is Delegation? * Specific Data Examples * Displaying Data * Lab 1: Data Source and Logic 6 - MODEL-DRIVEN APPS * What is a model-driven app? * Where will my data be stored? * How do create a model-driven app * Canvas vs model-driven summary * Lab 1: Model-Driven App 7 - POWERAPP INTEGRATION * Embed PowerApps in Teams * Embed PowerApps in SharePoint Online * Start a Flow from a PowerApp * Lab 1: PowerApp Integration 8 - ADMINISTRATION AND MAINTENANCE OF POWERAPPS * Identify which users have been using PowerApps * Reuse an app in another location (move from testing or development to production) * Review app usage * Prevent a user from using PowerApps * Manage environments * Lab 1: Administration and Maintenance ADDITIONAL COURSE DETAILS: Nexus Humans 55265 Microsoft PowerApps training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the 55265 Microsoft PowerApps course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

55265 Microsoft© PowerApps
Delivered Online3 days, Aug 1st, 13:00 + 3 more
£1190

CompTIA IT Fundamentals+

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course will prepare participants to take the FC0-U61 exam to obtain the IT Fundamentals+ certification and help participants learn some of the basic principles and techniques of providing PC, mobile, applications, and network support. Overview On course completion, participants will be able to: - Set up a computer workstation and use basic software applications. - Explain the functions and types of devices used within a computer system. - Apply basic computer maintenance and support principles. - Describe some principles of software and database development. - Configure computers and mobile devices to connect to home networks and to the Internet. - Identify security issues affecting the use of computers and networks. This course will prepare participants to take the FC0-U61 exam to obtain the IT Fundamentals+ certification and help participants learn some of the basic principles and techniques of providing PC, mobile, applications, and network support. 1 - IDENTIFYING COMPUTER HARDWARE * Identify Types of Computing Devices * Identify Internal Computer Components * Common Computer Connector Types * Identify Common Peripheral Devices 2 - IDENTIFYING COMPUTER SOFTWARE * Compare Functions and Features of Common Operating Systems * Identify Application Software 3 - SETTING UP A BASIC WORKSTATION * Connect Hardware * Install and Configure Operating Systems * Install and Configure Applications * Configure Accessibility Options 4 - CONFIGURING NETWORK ACCESS * Network Connection Types * Install and Configure a SOHO Router * Network and Alternative Technologies * Sharing and Storage Methods 5 - WORKING WITH FILES, FOLDERS, AND APPLICATIONS * Create Files * Navigate a File Structure * Manage Files and Folders * Compress and Extract Files * Create Screen Captures 6 - CONFIGURING AND USING WIRELESS DEVICES * Configuring Wireless Devices * Use Wireless Devices 7 - SECURING COMPUTING DEVICES * Identify Security Threats * Apply Security Best Practices * Perform Secure Web Browsing 8 - SUPPORTING COMPUTERS AND USERS * Environmental and Safety Concepts * Back Up and Restore Data * Manage Software * Implement Basic Support Measures ADDITIONAL COURSE DETAILS: Nexus Humans CompTIA IT Fundamentals Plus Certification (ITF Plus) (Exam FCO-U61) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CompTIA IT Fundamentals Plus Certification (ITF Plus) (Exam FCO-U61) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CompTIA IT Fundamentals+
Delivered Online6 days, Aug 5th, 13:00 + 1 more
£2475

DP-300T00 Administering Microsoft Azure SQL Solutions

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for The audience for this course is data professionals managing data and databases who want to learn about administering the data platform technologies that are available on Microsoft Azure. This course is also valuable for data architects and application developers who need to understand what technologies are available for the data platform with Azure and how to work with those technologies through applications. This course provides students with the knowledge and skills to administer a SQL Server database infrastructure for cloud, on-premises and hybrid relational databases and who work with the Microsoft PaaS relational database offerings. Additionally, it will be of use to individuals who develop applications that deliver content from SQL-based relational databases. Prerequisites In addition to their professional experience, students who take this training should have technical knowledge equivalent to the following courses: AZ-900T00 Microsoft Azure Fundamentals DP-900T00 Microsoft Azure Data Fundamentals 1 - PREPARE TO MAINTAIN SQL DATABASES ON AZURE * Describe Microsoft Intelligent Data Platform roles * Understand SQL Server in an Azure virtual machine * Design Azure SQL Database for cloud-native applications * Explore Azure SQL Database Managed Instance 2 - DEPLOY IAAS SOLUTIONS WITH AZURE SQL * Explain IaaS options to deploy SQL Server in Azure * Understand hybrid scenarios * Explore performance and security * Explain high availability and disaster recovery options 3 - DEPLOY PAAS SOLUTIONS WITH AZURE SQL * Explain PaaS options for deploying SQL Server in Azure * Explore single SQL database * Deploy SQL database elastic pool * Understand SQL database hyperscale * Examine SQL managed instance * Describe SQL Edge 4 - EVALUATE STRATEGIES FOR MIGRATING TO AZURE SQL * Understand compatibility level * Understand Azure preview features * Describe Azure database migration options 5 - MIGRATE SQL WORKLOADS TO AZURE SQL DATABASES * Choose the right SQL Server Instance option in Azure * Migrate SQL Server to Azure SQL Database offline * Migrate SQL Server to Azure SQL Database online * Load and move data to Azure SQL Database 6 - MIGRATE SQL WORKLOADS TO AZURE MANAGED INSTANCES * Evaluate migration scenarios to SQL Database Managed Instance * Migrate to SQL Database Managed Instance * Load and Move data to SQL Database Managed Instance 7 - CONFIGURE DATABASE AUTHENTICATION AND AUTHORIZATION * Describe Active Directory and Azure Active Directory * Describe authentication and identities * Describe Security Principals * Describe database and object permissions * Identify authentication and authorization failures 8 - PROTECT DATA IN-TRANSIT AND AT REST * Explore Transparent Data Encryption * Configure server and database firewall rules * Explain object encryption and secure enclaves * Enable encrypted connections * Describe SQL injection * Understand Azure Key Vault 9 - IMPLEMENT COMPLIANCE CONTROLS FOR SENSITIVE DATA * Explore data classification * Explore server and database audit * Implement Dynamic Data Masking * Implement Row Level security * Understand Microsoft Defender for SQL * Explore Azure SQL Database Ledger * Implement Azure Purview 10 - DESCRIBE PERFORMANCE MONITORING * Describe performance monitoring tools * Describe critical performance metrics * Establish baseline metrics * Explore extended events * Describe Azure SQL Insights * Explore Query Performance Insight 11 - CONFIGURE SQL SERVER RESOURCES FOR OPTIMAL PERFORMANCE * Explain how to optimize Azure storage for SQL Server virtual machines * Describe virtual machine resizing * Optimize database storage * Control SQL Server resources 12 - CONFIGURE DATABASES FOR OPTIMAL PERFORMANCE * Explore database maintenance checks * Describe database scoped configuration options * Describe automatic tuning * Describe intelligent query processing 13 - EXPLORE QUERY PERFORMANCE OPTIMIZATION * Understand query plans * Explain estimated and actual query plans * Describe dynamic management views and functions * Explore Query Store * Identify problematic query plans * Describe blocking and locking 14 - EVALUATE PERFORMANCE IMPROVEMENTS * Describe wait statistics * Tune and maintain indexes * Understand query hints 15 - EXPLORE PERFORMANCE-BASED DESIGN * Describe normalization * Choose appropriate data types * Design indexes 16 - AUTOMATE DEPLOYMENT OF DATABASE RESOURCES * Describe deployment models in Azure * Automate deployment by using Azure Resource Manager templates and Bicep * Automate deployment by using PowerShell * Automate deployment by using Azure CLI 17 - CREATE AND MANAGE SQL AGENT JOBS * Create a SQL Server maintenance plan * Describe task status notifications 18 - MANAGE AZURE PAAS TASKS USING AUTOMATION * Explore Elastic jobs * Understand Azure Automation * Build an automation runbook * Automate database workflows by using Logic Apps * Monitor automated tasks 19 - DESCRIBE HIGH AVAILABILITY AND DISASTER RECOVERY STRATEGIES * Describe recovery time objective and recovery point objective * Explore high availability and disaster recovery options * Describe Azure high availability and disaster recovery features for Azure Virtual Machines * Describe high availability and disaster recovery options for PaaS deployments * Explore an IaaS high availability and disaster recovery solution * Describe hybrid solutions 20 - EXPLORE IAAS AND PAAS SOLUTIONS FOR HIGH AVAILABILITY AND DISASTER RECOVERY * Describe failover clusters in Windows Server * Configure Always-on availability groups * Describe temporal tables in Azure SQL Database * Describe active geo-replication for Azure SQL Database * Explore auto-failover groups for Azure SQL Database and Azure SQL Managed Instance 21 - BACK UP AND RESTORE DATABASES * Back up and restore SQL Server running on Azure virtual machines * Back up a SQL Server virtual machine * Back up and restore a database using Azure SQL Database ADDITIONAL COURSE DETAILS: Nexus Humans DP-300T00: Administering Microsoft Azure SQL Solutions training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the DP-300T00: Administering Microsoft Azure SQL Solutions course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

DP-300T00 Administering Microsoft Azure SQL Solutions
Delivered Online5 days, Aug 5th, 13:00 + 2 more
£2380

Venepuncture & Cannulation

4.8(47)

By EF Training & Consultancy Ltd

Venepuncture and cannulation course Venepuncture training for healthcare professionals Cannulation skills development Intravenous access techniques Blood sample collection training Infection control in venepuncture Hands-on venepuncture practice Cannula insertion training Nursing revalidation hours CPD accredited course Healthcare professional skills development Venepuncture and cannulation procedures Venepuncture certification program Intravenous catheter insertion Best practices in venepuncture Patient assessment for venepuncture Troubleshooting venepuncture complications Venepuncture and cannulation simulation Real-life venepuncture scenarios Healthcare career advancement with venepuncture skills

Venepuncture & Cannulation
Delivered In-Person in LondonFull day, Jul 30th, 08:30
£150