Đề cương khóa học
Macros
- Ghi lại và chỉnh sửa macros
- Gán macros cho biểu mẫu, thanh công cụ, phím tắt
VBA Môi trường
- Trình soạn thảo Visual Basic và các tùy chọn của nó
- Management thành phần
- Phím tắt
- Tối ưu hóa môi trường
Giới thiệu về lập trình thủ tục
- Thủ tục: Hàm Sub
- Kiểu dữ liệu
- Câu lệnh if ... then ... elseif ... else ... end if
- Câu lệnh Case
- Vòng lặp for ... loop while, until
- Vòng lặp for ... next
- Hướng dẫn vòng lặp break (exit)
- Xử lý mảng
Chuỗi được trích dẫn
- Kết hợp các chuỗi được trích dẫn (concat)
- Chuyển đổi sang các loại khác (ngầm định và tường minh)
- Các tính năng xử lý chuỗi được trích dẫn
Visual Basic
- Tải xuống và tải lên dữ liệu vào bảng tính (Cells, Range)
- Tải xuống và tải lên dữ liệu cho người dùng (InputBox, MsgBox)
- Khai báo biến
- Phạm vi và thời gian tồn tại của biến
- Các toán tử và độ ưu tiên của chúng
- Các mô-đun tùy chọn
- Tạo các hàm của riêng bạn và sử dụng chúng trong một bảng tính
- Đối tượng, lớp, phương thức và thuộc tính
- Bảo mật mã
- Bảo mật mã giả mạo và xem trước
Gỡ lỗi
- Xử lý từng bước
- Cửa sổ Locals
- Cửa sổ Immediate
- Bẫy - Watches
- Call Stack
Xử lý lỗi
- Các loại lỗi và cách tránh
- Bắt và xử lý lỗi thời gian chạy
- Cấu trúc: On Error Resume Next, On Error GoTo
Excel Mô hình đối tượng
- Đối tượng Application
- Đối tượng Workbook và bộ sưu tập Workbooks
- Đối tượng Worksheet và Bộ sưu tập Worksheets
- Đối tượng ThisWorkbook, ActiveWorkbook, ActiveCell
- Đối tượng Selection
- Bộ sưu tập Range
- Đối tượng Cells
- Hiển thị dữ liệu trên thanh trạng thái
- Tối ưu hóa bằng cách sử dụng ScreenUpdating
- Đo thời gian bằng phương thức Timer
Xử lý sự kiện trong VBA
- Sự kiện là gì?
- Phản hồi một sự kiện và tạo trình xử lý sự kiện
- Kích hoạt Trình xử lý sự kiện
- Dịch vụ các sự kiện thường xuyên xảy ra
VBA Biểu mẫu
- Tạo biểu mẫu của riêng bạn
- Gọi một biểu mẫu từ mã
- Sử dụng các biểu mẫu trong bảng tính
Yêu cầu
- Khả năng làm việc với bảng tính, kiến thức cơ bản (tham chiếu, phạm vi, bảng tính, ...)
- Không yêu cầu kiến thức nền tảng VBA để tạo macro hoặc VBA code
Đối tượng
- Chuyên viên phân tích dữ liệu
Đánh giá (5)
scope of materialPhases of Software DevelopmentThe Software Development Life Cycle (SDLC) is a process used by software engineers to design, develop, and test high-quality software. The SDLC aims to produce high-quality software that meets or exceeds customer expectations, reaches completion within times and cost estimates. This course will cover the following phases:1. Planning - Defining project scope and objectives - Identifying deliverables and creating a project plan - Setting up a project timeline - Establishing a project budget - Identifying risks and creating a risk management plan2. Analysis - Gathering and documenting requirements - Creating use cases and user stories - Identifying constraints and assumptions - Creating a system architecture diagram3. Design - Creating a detailed design document - Designing the database schema - Designing the user interface - Designing the software architecture4. Implementation - Writing code according to the design document - Integrating different software modules - Conducting code reviews - Ensuring code quality and maintainability5. Testing - Developing test cases - Conducting unit testing, integration testing, system testing, and acceptance testing - Identifying and fixing bugs - Ensuring software meets quality standards6. Deployment - Preparing for deployment - Deploying the software to the production environment - Monitoring the software post-deployment - Gathering user feedback7. Maintenance - Providing ongoing support - Fixing bugs and implementing enhancements - Updating documentation - Ensuring software remains up-to-date and secureIntroduction to Agile MethodologiesAgile methodologies focus on iterative development, where requirements and solutions evolve through collaboration between self-organizing cross-functional teams. This course will introduce the following Agile frameworks:1. Scrum - Roles: Product Owner, Scrum Master, Development Team - Artifacts: Product Backlog, Sprint Backlog, Increment - Events: Sprint, Sprint Planning, Daily Scrum, Sprint Review, Sprint Retrospective2. Kanban - Visualizing work with Kanban boards - Limiting work in progress (WIP) - Continuous delivery and improvement3. Extreme Programming (XP) - Pair programming - Test-driven development (TDD) - Continuous integration4. Lean Software Development - Eliminating waste - Amplifying learning - Deciding as late as possible - Delivering as fast as possible - Empowering the team - Building integrity in - Seeing the wholeIntroduction to DevOpsDevOps is a set of practices that combines software development (Dev) and IT operations (Ops) to shorten the systems development life cycle and provide continuous delivery with high software quality. This course will cover the following topics:1. Continuous Integration (CI) - Automating the integration of code changes - Building and testing automatically - Ensuring code quality2. Continuous Delivery (CD) - Automating the release process - Ensuring software can be released to production at any time - Reducing the time between committing a change to the codebase and the change being placed into production3. Infrastructure as Code (IaC) - Managing and provisioning computing infrastructure through machine-readable definition files - Versioning infrastructure code - Automating infrastructure deployment4. Configuration Management - Ensuring consistency across environments - Automating configuration tasks - Managing configuration changes5. Monitoring and Logging - Collecting and analyzing system metrics - Monitoring application performance - Logging events and errors6. Containerization and Orchestration - Using containers to package software and its dependencies - Orchestrating containers with Kubernetes - Ensuring scalability and reliability7. Cloud Computing - Leveraging cloud services for scalability and flexibility - Managing cloud resources - Ensuring cloud security8. Security in DevOps - Integrating security into the DevOps pipeline - Automating security testing - Ensuring compliance with security standards9. Collaboration and Communication - Fostering a culture of collaboration - Using tools for effective communication - Ensuring transparency and accountabilityIntroduction to Microservices ArchitectureMicroservices architecture is an architectural style that structures an application as a collection of loosely coupled services. This course will cover the following topics:1. Principles of Microservices - Single Responsibility Principle - Decentralized Data Management - Autonomous Services - Technology Heterogeneity2. Designing Microservices - Identifying service boundaries - Designing service interfaces - Ensuring service independence - Managing service communication3. Building Microservices - Choosing the right technology stack - Implementing service discovery - Ensuring service resilience - Monitoring and logging microservices4. Deploying Microservices - Using containerization for deployment - Orchestrating microservices with Kubernetes - Ensuring scalability and reliability5. Securing Microservices - Implementing authentication and authorization - Securing service communication - Ensuring data privacy and integrity6. Managing Microservices - Monitoring microservices performance - Managing service dependencies - Ensuring service availability7. Tools and Technologies for Microservices - API Gateways - Service Meshes - Distributed Tracing - Event-Driven ArchitectureIntroduction to KubernetesKubernetes is an open-source platform designed to automate deploying, scaling, and operating application containers. This course will cover the following topics:1. Introduction to Kubernetes - Overview of Kubernetes architecture - Understanding Kubernetes objects - Deploying applications with Kubernetes2. Kubernetes Cluster Setup - Setting up a Kubernetes cluster - Configuring cluster components - Managing cluster resources3. Kubernetes Networking - Understanding Kubernetes networking model - Configuring network policies - Ensuring network security4. Kubernetes Storage - Managing storage in Kubernetes - Configuring persistent volumes - Ensuring data durability5. Kubernetes Security - Implementing security best practices - Managing Kubernetes secrets - Ensuring compliance with security standards6. Kubernetes Monitoring and Logging - Monitoring Kubernetes clusters - Collecting and analyzing logs - Ensuring system reliability7. Kubernetes Automation - Automating Kubernetes operations - Using Kubernetes operators - Ensuring consistency across environments8. Kubernetes Scaling - Scaling Kubernetes applications - Managing resource allocation - Ensuring application performance9. Kubernetes Upgrades and Rollbacks - Upgrading Kubernetes clusters - Managing rollbacks - Ensuring minimal downtimeIntroduction to DockerDocker is a platform that allows developers to package applications and their dependencies into a standardized unit called a container. This course will cover the following topics:1. Introduction to Docker - Overview of Docker architecture - Understanding Docker containers - Deploying applications with Docker2. Docker Installation and Setup - Installing Docker on various platforms - Configuring Docker settings - Managing Docker containers3. Docker Images and Containers - Creating and managing Docker images - Building Docker containers - Ensuring container security4. Docker Networking - Configuring Docker networking - Managing network policies - Ensuring network security5. Docker Storage - Managing storage in Docker - Configuring volumes - Ensuring data durability6. Docker Compose - Managing multi-container Docker applications - Configuring Docker Compose files - Ensuring application consistency7. Docker Swarm - Setting up Docker Swarm clusters - Managing Swarm services - Ensuring scalability and reliability8. Docker Security - Implementing security best practices - Managing Docker secrets - Ensuring compliance with security standards9. Docker Monitoring and Logging - Monitoring Docker containers - Collecting and analyzing logs - Ensuring system reliability10. Docker Automation - Automating Docker operations - Using Docker plugins - Ensuring consistency across environmentsIntroduction to Cloud ComputingCloud computing is a model for delivering Information Technology services where resources (e.g., servers and storage) are retrieved from the internet through web-based tools and applications, rather than a direct connection to a server. This course will cover the following topics:1. Introduction to Cloud Computing - Overview of cloud computing models - Understanding cloud service providers - Identifying cloud deployment models2. Cloud Service Models - Infrastructure as a Service (IaaS) - Platform as a Service (PaaS) - Software as a Service (SaaS)3. Cloud Deployment Models - Public Cloud - Private Cloud - Hybrid Cloud - Multi-Cloud4. Cloud Security - Implementing security best practices - Managing cloud security - Ensuring compliance with security standards5. Cloud Monitoring and Logging - Monitoring cloud resources - Collecting and analyzing logs - Ensuring system reliability6. Cloud Automation - Automating cloud operations - Using cloud automation tools - Ensuring consistency across environments7. Cloud Scaling - Scaling cloud applications - Managing resource allocation - Ensuring application performance8. Cloud Upgrades and Rollbacks - Upgrading cloud services - Managing rollbacks - Ensuring minimal downtime9. Cloud Migration - Planning cloud migration - Executing cloud migration - Ensuring data integrity and securityIntroduction to Artificial IntelligenceArtificial Intelligence (AI) is a broad field of computer science dedicated to creating smart machines capable of performing tasks that typically require human intelligence. This course will cover the following topics:1. Introduction to AI - Overview of AI concepts - Understanding AI applications - Identifying AI technologies2. Machine Learning - Supervised Learning - Unsupervised Learning - Reinforcement Learning3. Deep Learning - Neural Networks - Convolutional Neural Networks (CNNs) - Recurrent Neural Networks (RNNs)4. Natural Language Processing (NLP) - Text Analysis - Sentiment Analysis - Machine Translation5. Computer Vision - Image Recognition - Object Detection - Facial Recognition6. Robotics - Autonomous Robots - Robotics in Industry - Robotics in Healthcare7. AI Ethics - Ethical considerations in AI - Bias in AI - Privacy and Security in AI8. AI Tools and Frameworks - TensorFlow - PyTorch - Scikit-Learn9. AI in Business - AI applications in business - AI for customer service - AI for data analysis10. AI Trends and Future - Emerging trends in AI - Future of AI - AI research and developmentIntroduction to BlockchainBlockchain is a decentralized, distributed ledger technology that records transactions on multiple computers in a way that ensures the records cannot be altered retroactively. This course will cover the following topics:1. Introduction to Blockchain - Overview of blockchain technology - Understanding blockchain applications - Identifying blockchain platforms2. Blockchain Basics - Blockchain architecture - Consensus mechanisms - Smart contracts3. Cryptocurrencies - Bitcoin - Ethereum - Other cryptocurrencies4. Blockchain in Finance - Blockchain for banking - Blockchain for payments - Blockchain for insurance5. Blockchain in Supply Chain - Blockchain for supply chain management - Blockchain for logistics - Blockchain for inventory management6. Blockchain Security - Implementing security best practices - Managing blockchain security - Ensuring compliance with security standards7. Blockchain Monitoring and Logging - Monitoring blockchain networks - Collecting and analyzing logs - Ensuring system reliability8. Blockchain Automation - Automating blockchain operations - Using blockchain automation tools - Ensuring consistency across environments9. Blockchain Scaling - Scaling blockchain applications - Managing resource allocation - Ensuring application performance10. Blockchain Upgrades and Rollbacks - Upgrading blockchain services - Managing rollbacks - Ensuring minimal downtimeIntroduction to Internet of Things (IoT)The Internet of Things (IoT) refers to the network of physical objects embedded with sensors, software, and other technologies to connect and exchange data with other devices and systems over the internet. This course will cover the following topics:1. Introduction to IoT - Overview of IoT concepts - Understanding IoT applications - Identifying IoT technologies2. IoT Devices and Sensors - Types of IoT devices - Types of IoT sensors - IoT device management3. IoT Connectivity - IoT communication protocols - IoT network types - IoT security in connectivity4. IoT Data Management - Collecting and storing IoT data - Analyzing IoT data - Ensuring data security and privacy5. IoT in Smart Homes - Smart home devices - Smart home automation - Smart home security6. IoT in Smart Cities - Smart city infrastructure - Smart city services - Smart city security7. IoT in Healthcare - IoT in medical devices - IoT in patient monitoring - IoT in healthcare management8. IoT in Industry - IoT in manufacturing - IoT in logistics - IoT in supply chain management9. IoT Security - Implementing security best practices - Managing IoT security - Ensuring compliance with security standards10. IoT Monitoring and Logging - Monitoring IoT devices - Collecting and analyzing logs - Ensuring system reliabilityIntroduction to CybersecurityCybersecurity is the practice of protecting systems, networks, and programs from digital attacks. This course will cover the following topics:1. Introduction to Cybersecurity - Overview of cybersecurity concepts - Understanding cybersecurity threats - Identifying cybersecurity technologies2. Network Security - Protecting network infrastructure - Implementing firewall and intrusion detection systems - Ensuring network security3. Application Security - Securing software applications - Identifying and mitigating application vulnerabilities - Ensuring application security4. Information Security - Protecting sensitive data - Implementing encryption and access controls - Ensuring data security5. Identity and Access Management (IAM) - Managing user identities - Implementing access controls - Ensuring compliance with security standards6. Security Monitoring and Logging - Monitoring security events - Collecting and analyzing logs - Ensuring system security7. Incident Response - Preparing for security incidents - Responding to security incidents - Ensuring minimal impact8. Disaster Recovery - Planning for disaster recovery - Implementing disaster recovery solutions - Ensuring business continuity9. Cybersecurity Compliance - Understanding regulatory requirements - Implementing compliance measures - Ensuring compliance with security standards10. Cybersecurity Trends and Future - Emerging trends in cybersecurity - Future of cybersecurity - Cybersecurity research and developmentIntroduction to Quantum ComputingQuantum computing is a type of computation that harnesses the principles of quantum mechanics to potentially solve problems that are intractable for classical computers. This course will cover the following topics:1. Introduction to Quantum Computing - Overview of quantum computing concepts - Understanding quantum computing applications - Identifying quantum computing technologies2. Quantum Mechanics Basics - Quantum bits (qubits) - Superposition and entanglement - Quantum gates and circuits3. Quantum Algorithms - Shor's algorithm - Grover's algorithm - Quantum Fourier Transform4. Quantum Hardware - Quantum processors - Quantum error correction - Quantum computing platforms5. Quantum Software - Quantum programming languages - Quantum development kits - Quantum simulators6. Quantum Cryptography - Quantum key distribution - Quantum-resistant algorithms - Ensuring quantum security7. Quantum Computing in Industry - Quantum computing in finance - Quantum computing in healthcare - Quantum computing in logistics8. Quantum Computing Challenges - Quantum decoherence - Quantum error rates - Scalability of quantum systems9. Quantum Computing Trends and Future - Emerging trends in quantum computing - Future of quantum computing - Quantum computing research and development10. Quantum Computing Ethics - Ethical considerations in quantum computing - Privacy and security in quantum computing - Impact of quantum computing on society
Marcin - Instytut Energetyki- Panstwowy Instytut Badawczy
Khóa học - Visual Basic for Applications (VBA) w Excel - wstęp do programowania
Dịch thuật bằng máy
A lot of exercise. Trainer doesn't need to have support for his course. He has really great knowledge for his subject.
Quentin Demeyere
Khóa học - Visual Basic for Applications (VBA) in Excel - Introduction to programming
Dịch thuật bằng máy
It was really nice of the trainer that he took a lot of time to answer our questions and helped us improve or gave us hints on how to improve some macros we were already using without fully understanding the code.
David Trieu - CD Projekt SA
Khóa học - Visual Basic for Applications (VBA) in Excel - Introduction to programming
Dịch thuật bằng máy
I genuinely enjoyed the short exercises.
Mateusz Podsiadlo
Khóa học - Visual Basic for Applications (VBA) in Excel - Introduction to programming
Dịch thuật bằng máy
Training agenda was well thought out.
Przemek Zalasinski
Khóa học - Visual Basic for Applications (VBA) in Excel - Introduction to programming
Dịch thuật bằng máy