-
All
-
Online
-
Filters
Computing courses Exeter
- Course
- Exeter
... for success in the current and future computing and computer systems sector We believe the future of research lies in breaking down traditional barriers between academic disciplines so the bigger problems of the 21st century can be considered from human as well as physical perspectives. We have a number... Learn about: IT Development...
- BTEC
- Exeterand604 other venues
- Aberdeen, Abergavenny Aberystwyth, Abingdon, Aldershot, Alford (Lincs), Alloa, Alnwick, Alton, Amesbury, Ammanford, Andover ...
- 3 Days
...supervisors who are employed by large and small companies and operators in the door supervision sector. Edexcel Level 2 BTEC Award in Door Supervision... Learn about: Security Management, Computing College, Edexcel Level 2...
- Course
- Exeter
...Discriminant Analysis Suppose that several variates are observed on individuals from two identified groups. The technique of discriminant analysis involves...
- Course
- Exeter
...(Correlated Observations) Pairwise Comparisons (Correlated Observations) Exercises Power Introduction Factors Affecting Power Why power matters Exercises... Learn about: Confidence Training...
- Course
- Exeter
...(Correlated Observations) Pairwise Comparisons (Correlated Observations) Exercises Power Introduction Factors Affecting Power Why power matters Exercises... Learn about: Confidence Training, IT Law, MS Excel...
Similar training online and classroom-based
- Vocational qualification
- Online
- Different dates available
.... Professionals working with Exin Cloud technologies who need to achieve the vendor certification. My Training Academy's EXIN's Cloud Computing Foundation course is designed to help learners pass the EXIN Cloud Computing exam. The great thing about our EXIN's Cloud Computing Foundation course is that... Learn about: Computer Science, IT Systems, Network Training...
- Course
- Online
- Different dates available
- 11h
... incidents. After completing the course, you will be able to analyse threats, secure design computing and network environments. You will also learn the system of proactively defend networks, and able to respond or investigate cybersecurity incidents. To sum up, the course explains the anatomy of cyber... Learn about: Network Training, IT risk, Risk Management...
Questions & Answers
Add your question
Our advisors and other users will be able to reply to you