-
All
-
Online
-
Filters
-
Gloucestershire
-
Online
-
Type of studies
-
+ Filters (1)
Classroom-based IT, Computing, Telecommunications Training in Gloucestershire
- Training
- Bristoland4 other venues
- Birmingham, London, Manchester, Newcastle-Upon-Tyne
- Intermediate
- Different dates available
...Learning Objectives Explain the process-based Information Security management system model for ISO 27001 Describe the role of internal auditor in the maintenance... Learn about: Work experience preferred, Basic grammar required...
- Training
- Gloucesterand6 other venues
- London, Leeds, Wilmslow, Reading, Southampton, Longford
- 3 Days
...customers and peers. to introduce test techniques as well as providing practical experience of some key techniques. to learn standard terminology...
Similar training and in other locations
- Training
- Online
- Beginner
- Different dates available
...Explain what subject access requests are and how they should be dealt with. Suitable for: This module is aimed at anyone within a work situation who handles personal... Learn about: Data Protection...
- Training
- Online
...(All Modules) Oracle Apps Techno-Functional Oracle Apps DBA Oracle Apps Finance Functional R12 OBIEE Oracle 11g Oracle DBA PL/SQL People...
- Training
- Online
- Beginner
- Different dates available
...of an organisation’s Confidentiality Statement and Information Security and Communication Policy and the consequences of failing to comply with them. This...
- Training
- Online
- Beginner
- Different dates available
...Module 15: Live Project work session on Telecom Domain. Business Requirement Document (BRD) review on Telecom Domain Functionality... Learn about: Resume Preparation, Interview Skills, Basic IT training...
- Training
- Distance Learning
...middleware and key applications. The Android SDK provides the tools and APIs necessary to begin developing applications on the Android platform using... Learn about: Object oriented Programming, Database training, Object oriented training...
- Training
- Distance Learning
...security agencies as well as organizations intent on pursuing any corrective action, litigation, or proof of guilt based on digital evidence...
- Training
- Online
...training in the whole Foundation and Practitioner syllabuses. It is professionally narrated and presented in manageable sections. You can ask an approved...
- Training
- Online
- 1 Day
...to the SunSystems reference data, ledgers and budgets is the only system to give you a single source of truth. take a look at the latest release of...
- Training
- Online
...Foreign currency valuation configuration Financial Statement version configuration (Creating Balance sheet and Profit and Loss account)...
- Training
- Online
...that makes SAP BusinessObjects products intuitive for non-technical users This BusinessObjects XI 3.0: Universe Design training session will enable...
- Training
- Online
- Beginner
- Different dates available
...Identify how children and young people use technology and the internet Outline the benefits and risks of children and young people using technology...
- Training
- Distance Learning
... Technologies - Discretionary versus Mandatory Access Control Models - Rule-based and Role-based Access Control CISSP Domain 3) Telecommunications and Network...
- Training
- Online
...Data Medium Exchange Recruitment Overview Customization of Recruitment Process Applicant’s Data Applicant’s Action Benefits Health Plans Insurance Plans...
- Training
- Online
- Beginner
...SAP EWM (Extended Warehouse Management) forms part of SAP Supply Chain Management and provides end-to-end support for supply chain processes... Learn about: POST PROCESSING FRAMEWORK (PPF), Configuring the Slotting Process, Outlining Storage Control...
- Training
- Online
- Intermediate
- 5 Days
... data in HDFS Define advanced Pig relations Use Pig to apply structure to unstructured Big Data Invoke a Pig User-Defined Function Compute Quantiles... Learn about: Big Data...
- Training
- Online
- Intermediate
- Different dates available
... computing and Data Analysis Cloud Benefits Deployment models Top cloud providers Advantages for different offerings Design consideration for IoT Solution... Learn about: Cloud Benefits, Tech stack...
- Training
- Online
- Intermediate
- Different dates available
...Course Outline Infrastructure Services First-hop redundancy protocols HSRP Configuration HSRP Version 2 - Configuration Cloud Computing QoS Access... Learn about: HSRP Version, Network Training...
- Training
- Online
- Beginner
- Different dates available
...EXIN's Cloud Computing Foundation is not only a technical cloud course, but focuses on the business and management side of cloud computing as well. This course also examines the auditing and service response within cloud computing, as well the delegation of IT responsibilities within an enviroment... Learn about: Business model, Security guard, Web Browser...