-
All
- Online
-
Filters
-
Midlothian/Edinburghshire
- Online
-
Type of studies
-
+ Filters
Application Development courses Midlothian/Edinburghshire
- Bachelor's degree
- Edinburgh
- 4 Years
...Practical networks 2 Option 2 Year 3 Security and forensic computing Networked services Practical networks Routing Optional: third year group project... Learn about: IT Development, Application Development, IT Security...
- Course
- Edinburgh
...URL rewriting, external resources Package and deploy your application Performance and Optimisation Performance optimisation and making an application production ready... Learn about: Application Development, Database training...
- Course
- Edinburgh
...Target group: Technical Team Leader, Software Developer Learning objective: The purpose of training is to acquire the ability to develop business desktop applications in Windows 8 with XAML and C#. During the course, students become familiar with the MSDN resources and tools to support... Learn about: Visual Studio, Team Leader, Microsoft .Net...
- Course
- Edinburgh
... of that to follow a different work-flow? Can you ensure that the development environment is identical for all developers/suppliers and that you can still produce identical builds like today in 10+ years from now? Can the YP help find out under what software licenses the packages you use are licensed? ... and... Learn about: Application Development...
Similar training online and classroom-based
- Course
- Online
- Different dates available
... understanding of the course content. We expand beyond the scope of the CompTIA certification exam SY0-501 objectives to allow for real life application. This course has been designed to align with the latest version of the CompTIA security exam. Master essential security technologies, tools, and tasks... Learn about: Architecture Design, Risk Management, Network Training...
- Course
- Online
- Intermediate
- Different dates available
- 12 Months
...Part 1 2.12 Securing Mobile Devices- Part 2 2.13 Securing Mobile Devices- Part 3 2.14 Securing Mobile Devices- Part 4 2.15 Secure Protocols... Learn about: Application Development, Risk Management, IT risk...
Questions & Answers
Add your question
Our advisors and other users will be able to reply to you