• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1075 Accounts courses in Cardiff delivered Online

Webinar Marketing Course Online

By Lead Academy

From this course, you will have a thorough understanding of Webinar Marketing, where you will learn how to plan, promote and host engaging webinars that captivate your audience and drive your business forward. This Course At A Glance Understand webinar replay Know product purchase during the webinar Learn joint venture partner email sequences Understand how webinar sales can transform your business Know how to put your webinar essentials in place Master the essential pages for your webinar funnel Learn how to set up your webinar delivery platform Understand joint venture partner email sequences Discover webinar marketing email sequences to your list Understand emails 1 to 4 confirmation and indoctrination emails Webinar Marketing Course Overview This extensive course is beneficial for those who want to have a broader purview on webinar sales funnel breakthrough, how webinar sales funnel can impact your business and essential elements of a marketing funnel. You will learn how to put your webinar essentials in place, the essential pages for your webinar funnel, and how to set up your webinar delivery platform. This online course will help you understand the marketing and registration process. By the end of the course, you will have a broad knowledge of webinar marketing, the essential components of the marketing funnel, the essential pages for your webinar funnel. Who should take this course? This online course is perfect for those who want to have a thorough understanding of webinar marketing, how to set up your webinar delivery platform, and learn webinar registration. It is ideal for those who want to pursue their career in webinar marketing. Entry Requirements There are no academic entry requirements for this webinar marketing course, and it is open to students of all academic backgrounds. However, you are required to have a laptop/desktop/tablet or smartphone and a good internet connection. Assessment Method This webinar marketing course assesses learners through multiple-choice questions (MCQs). Upon successful completion of the modules, learners must answer MCQs to complete the assessment procedure. Through the MCQs, it is measured how much a learner could grasp from each section. In the assessment pass mark is 60%. Course Curriculum Introduction: Why Webinars can Transform Your Business 1.1 Why Webinar Sales Funnels can Transform Your Business 1.2 Webinar Sales Funnel Breakthrough The Essential Components of a Marketing Funnel 2.1 What is a Funnel 2.2 Component Pages in a Funnel 2.3 15 Essential Components of an Internet Marketing Funnel Putting Your Webinar Essentials in Place 3.1 Getting Started Webinar Essentials 3.2 The Essential Components of a High Converting Webinar 3.3 Product Selection Setting Up Links and Affiliate Accounts Lecture 3.4 Setting Up Your Email Platform Lecture The Essential Pages for Your Webinar Funnel 4.1 The Essential Pages You Will Need to Create Lecture 4.2 How to Create Your Webinar Registration Page Lecture 4.3 Funnel Diagram Part 1 and 2 4.4 How to Create Your Webinar Registration Confirmation Page Lecture 4.5 Funnel Diagram Part 3 How to Set Up Your Webinar Delivery Platform 5.1 How to Set Up Your Webinar Lecture 5.2 Webinar Delivery How to Record or Deliver Your Webinar Lecture 5.3 Funnel Diagram Parts 4 and 5 Webinar Marketing and Registration 6.1 Webinar Marketing Timetable Lecture 6.2 Webinar Marketing and Registration Lecture 6.3 Types of Prospects Lecture Joint Venture Partner Email Sequences 7.1 JV Partner Email Sequence Lecture 7.2 Funnel Diagram Part 6 Your Webinar Marketing Email Sequences to Your List 8.1 Email Marketing Sequence Your List Lecture 8.2 Funnel Diagram Part 7 8.3 Registration and Indoctrination Email Sequence Lecture 8.4 Advanced Training for Online Courses Masterclass Indoctrination Video 1 8.5 Indoctrination Video 2 The Truth About Online Courses 8.6 Active Campaign Webinar Automation Lecture 8.7 UTM Tracking and Pretty Links Lecture 8.8 Funnel Diagram Part 8 Emails 1 to 4 Confirmation and Indoctrination Emails 9.1 Emails 1 to 4 Registration and Indoctrination Lecture Registrant Reminder Emails 10.1 Registrant Reminder Emails Lecture 10.2 Funnel Diagram Part 9 JV Partner Reminder Emails 11.1 JV Partner Reminder Emails Lecture 11.2 Funnel Diagram Part 10 Product Purchase During the Webinar 12.1 Product Purchase During The Webinar Lecture Webinar Replay 13.1 Webinar Replay Lecture Replay and Cart Closing Emails 14.2 Funnel Diagram Part 11 JV Partner Replay Emails 15.1 JV Partner Replay Emails Lecture 15.2 Funnel Diagram Part 12 Course Summary and Wrap Up 16.1 Webinar Marketing Funnel Course Summary and Wrap Up Supplementary Resources Supplementary Resources - Webinar Marketing Recognised Accreditation CPD Certification Service This course is accredited by continuing professional development (CPD). CPD UK is globally recognised by employers, professional organisations, and academic institutions, thus a certificate from CPD Certification Service creates value towards your professional goal and achievement. CPD certificates are accepted by thousands of professional bodies and government regulators here in the UK and around the world. Many organisations look for employees with CPD requirements, which means, that by doing this course, you would be a potential candidate in your respective field. Quality Licence Scheme Endorsed The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries. It will give you a competitive advantage in your career, making you stand out from all other applicants and employees.     Certificate of Achievement Endorsed Certificate from Quality Licence Scheme After successfully passing the MCQ exam you will be eligible to order the Endorsed Certificate by Quality Licence Scheme. The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries. It will give you a competitive advantage in your career, making you stand out from all other applicants and employees. There is a Quality Licence Scheme endorsement fee to obtain an endorsed certificate which is £65. Certificate of Achievement from Lead Academy After successfully passing the MCQ exam you will be eligible to order your certificate of achievement as proof of your new skill. The certificate of achievement is an official credential that confirms that you successfully finished a course with Lead Academy. Certificate can be obtained in PDF version at a cost of £12, and there is an additional fee to obtain a printed copy certificate which is £35. FAQs Is CPD a recognised qualification in the UK? CPD is globally recognised by employers, professional organisations and academic intuitions, thus a certificate from CPD Certification Service creates value towards your professional goal and achievement. CPD-certified certificates are accepted by thousands of professional bodies and government regulators here in the UK and around the world. Are QLS courses recognised? Although QLS courses are not subject to Ofqual regulation, they must adhere to an extremely high level that is set and regulated independently across the globe. A course that has been approved by the Quality Licence Scheme simply indicates that it has been examined and evaluated in terms of quality and fulfils the predetermined quality standards. When will I receive my certificate? For CPD accredited PDF certificate it will take 24 hours, however for the hardcopy CPD certificate takes 5-7 business days and for the Quality License Scheme certificate it will take 7-9 business days. Can I pay by invoice? Yes, you can pay via Invoice or Purchase Order, please contact us at info@lead-academy.org for invoice payment. Can I pay via instalment? Yes, you can pay via instalments at checkout. How to take online classes from home? Our platform provides easy and comfortable access for all learners; all you need is a stable internet connection and a device such as a laptop, desktop PC, tablet, or mobile phone. The learning site is accessible 24/7, allowing you to take the course at your own pace while relaxing in the privacy of your home or workplace. Does age matter in online learning? No, there is no age limit for online learning. Online learning is accessible to people of all ages and requires no age-specific criteria to pursue a course of interest. As opposed to degrees pursued at university, online courses are designed to break the barriers of age limitation that aim to limit the learner's ability to learn new things, diversify their skills, and expand their horizons. When I will get the login details for my course? After successfully purchasing the course, you will receive an email within 24 hours with the login details of your course. Kindly check your inbox, junk or spam folder, or you can contact our client success team via info@lead-academy.org

Webinar Marketing Course Online
Delivered Online On Demand
£25

Cisco Securing Cloud Deployments with Cisco Technologies v1.0 (SECCLD)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is open to engineers, administrators, and security-minded users of public, private, and hybrid cloud infrastructures responsible for implementing security in cloud environments: Security architects Cloud architects Security engineers Cloud engineers System engineers Cisco integrators and partners Overview After taking this course, you should be able to: Contrast the various cloud service and deployment models. Implement the Cisco Security Solution for SaaS using Cisco Cloudlock Micro Services. Deploy cloud security solutions using Cisco AMP for Endpoints, Cisco Umbrella, and Cisco Cloud Email Security. Define Cisco cloud security solutions for protection and visibility using Cisco virtual appliances and Cisco Stealthwatch Cloud. Describe the network as a sensor and enforcer using Cisco Identity Services Engine (ISE), Cisco Stealthwatch Enterprise, and Cisco TrustSec. Implement Cisco Firepower NGFW Virtual (NGFWv) and Cisco Stealthwatch Cloud to provide protection and visibility in AWS environments. Explain how to protect the cloud management infrastructure by using specific examples, defined best practices, and AWS reporting capabilities. This course shows you how to implement Cisco© cloud security solutions to secure access to the cloud, workloads in the cloud, and software as a service (SaaS) user accounts, applications, and data. This course covers usage of Cisco Cloudlock, Cisco Umbrella?, Cisco Cloud Email Security, Cisco Advanced Malware Protection (AMP) for Endpoints, Cisco Stealthwatch© Cloud and Enterprise, Cisco Firepower© NGFW (next-generation firewall), and more. Introducing the Cloud and Cloud Security Describe the Evolution of Cloud Computing Explain the Cloud Service Models Explore the Security Responsibilities Within the Infrastructure as a Service (IaaS) Service Model Explore the Security Responsibilities Within the Platform as a Service (PaaS) Service Model Explore the Security Responsibilities Within the SaaS Service Model Describe Cloud Deployment Models Describe Cloud Security Basics Implementing the Cisco Security Solution for SaaS Access Control Explore Security Challenges for Customers Using SaaS Describe User and Entity Behavior Analytics, Data Loss Prevention (DLP), and Apps Firewall Describe Cloud Access Security Broker (CASB) Describe Cisco CloudLock as the CASB Describe OAuth and OAuth Attacks Deploying Cisco Cloud-Based Security Solutions for Endpoints and Content Security Describe Cisco Cloud Security Solutions for Endpoints Describe AMP for Endpoints Architecture Describe Cisco Umbrella Describe Cisco Cloud Email Security Design Comprehensive Endpoint Security Introducing Cisco Security Solutions for Cloud Protection and Visibility Describe Network Function Virtualization (NFV) Describe Cisco Secure Architectures for Enterprises (Cisco SAFE) Describe Cisco NGFWv/Cisco Firepower Management Center Virtual Describe Cisco ASAv Describe Cisco Services Router 1000V Describe Cisco Stealthwatch Cloud Describe Cisco Tetration Cloud Zero-Trust Model Describing the Network as the Sensor and Enforcer Describe Cisco Stealthwatch Enterprise Describe Cisco ISE Functions and Personas Describe Cisco TrustSec Describe Cisco Stealthwatch and Cisco ISE Integration Describe Cisco Encrypted Traffic Analytics (ETA) Implementing Cisco Security Solutions in AWS Explain AWS Security Offerings Describe AWS Elastic Compute Cloud (EC2) and Virtual Private Cloud (VPC) Discover Cisco Security Solutions in AWS Explain Cisco Stealthwatch Cloud in AWS Describing Cloud Security Management Describe Cloud Management and APIs Explain API Protection Illustrate an API Example: Integrate to ISE Using pxGrid Identify SecDevOps Best Practices Illustrate a Cisco Cloud Security Management Tool Example: Cisco Defense Orchestrator Illustrate a Cisco Cloud Security Management Tool Example: Cisco CloudCenter? Describe Cisco Application Centric Infrastructure (ACI) Describe AWS Reporting Tools Additional course details: Nexus Humans Cisco Securing Cloud Deployments with Cisco Technologies v1.0 (SECCLD) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Securing Cloud Deployments with Cisco Technologies v1.0 (SECCLD) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Securing Cloud Deployments with Cisco Technologies v1.0 (SECCLD)
Delivered OnlineFlexible Dates
Price on Enquiry

70-417 - Upgrading Your Skills to MCSA Windows Server 2012

4.3(43)

By John Academy

Description: The 70-417 - Upgrading Your Skills to MCSA Windows Server 2012 course provides all the essential topics and skills that you need to know for MCSA Windows Server. The course will upgrade your skills to MCSA Windows Server 2012. Throughout the course, you will learn how to install and configure servers, configure server roles, features and Hyper-V, install and administer Active Directory, configure network services and access, configure a network policy server infrastructure, and deploy, manage, and maintain servers. The course will also show you how to configure and manage Active Directory, group policy and high availability, configure file and storage solutions, implement business continuity and disaster recovery, configure network services, identity and access solutions. If you pass the exam, you will be qualified as a Microsoft Certified Solutions Associate (MCSA) in Windows Server 2012. The purpose of the course is to prepare you for the Exam. Assessment: At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not. Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. Certification: After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. Who is this Course for? 70-417 - Upgrading Your Skills to MCSA Windows Server 2012 is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. Requirements Our 70-417 - Upgrading Your Skills to MCSA Windows Server 2012 is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Install and Configure Servers Install and Configure Servers FREE 00:17:00 Features with Windows Server 2012 00:11:00 Installing Windows 2012 Enterprise 00:09:00 Windows Server Installation 00:12:00 Introduction to Server Manager 00:07:00 Post Server Installation Tasks 00:11:00 Configure Server Roles and Features Configure Server Roles and Features 00:08:00 Add Roles Server Manager 00:16:00 Event Viewer 00:04:00 Best Practice Analyzer 00:06:00 Administrative Tools Available 00:08:00 Delegation of Domain Administration 00:09:00 Advanced Services 00:11:00 Introduction to PowerShell 00:16:00 Installing Server Core 00:07:00 PowerShell 00:11:00 Server Core Tools 00:16:00 Recover from Closing Command Prompt 00:01:00 Netsh-Firewall 00:04:00 Sconfig on Server Core 00:08:00 PowerShell Examples for User Management 00:12:00 Configure Hyper-V Configure Hyper-V 00:12:00 Enable Remote Management 00:05:00 Remote Desktop 00:08:00 Server Groups 00:01:00 Virtualization 00:17:00 Create a VM 00:07:00 Hyper-V Settings 00:03:00 Virtual Hard Disk 00:17:00 Managing VHD's 00:12:00 Virtual Networks 00:08:00 Hyper-V Network Settings33 00:06:00 Creating Network Adapters66 00:02:00 Considerations for VM Network Configuration 00:12:00 Install and Administer Active Directory Install and Administer Active Directory 00:48:00 Overview of Domain Controllers 00:19:00 Best Practices - FSMO and GC 00:25:00 RODC 00:11:00 Install Domain Controllers 00:31:00 Active Directory Management Tools 00:20:00 Groups 00:39:00 Delegate Management of Active Directory Objects 00:11:00 Deploy, Manage, and Maintain Servers Deploy, Manage, and Maintain Servers 00:32:00 Types of Images 00:43:00 Unattended Installations 00:18:00 WSUS 00:40:00 Monitoring Servers 01:30:00 Configure Network Services and Access Configure Network Services and Access 00:40:00 How DNS Forwarding Works 00:21:00 Zone Transfers 00:24:00 DNS Caching 00:04:00 Configure a Network Policy Server Infrastructure Configure a Network Policy Server Infrastructure 00:46:00 VPN Access ss 00:37:00 Components of Network Policy 00:07:00 Direct Access Features 00:18:00 Troubleshooting Tools 00:29:00 Certificates 00:03:00 Configure and Manage Active Directory Configure and Manage Active Directory 01:02:00 Managed Service Accounts 00:16:00 Create Account Policies and User Rights Assignments 00:40:00 Maintain Active Directory Domain Services 00:42:00 Configure and Manage Group Policy Configure and Manage Group Policy 00:22:00 Windows Client Policy Processing 00:08:00 Starter GPO's 00:30:00 Group Policy Links 00:20:00 Other Group Policy Options 01:07:00 Configure and Manage High Availability Configure and Manage High Availability 00:36:00 Server 2012 Failover Clustering 00:19:00 Quorum Definitions 00:20:00 Multi-Site Failover Cluster 00:10:00 Management Tools 00:11:00 Configure File and Storage Solutions Configure File and Storage Solutions 00:17:00 Discretionary Access Control 00:10:00 Creating Claims 00:19:00 File Classification 00:34:00 iSCSI 00:35:00 Implement Business Continuity and Disaster Recovery Implement Business Continuity and Disaster Recovery 00:15:00 Backup Types 00:16:00 System Restore 00:26:00 Windows RE 00:17:00 Configure Network Services Configure Network Services 00:20:00 Super Scopes and Multinetting 00:21:00 DNS Solutions s 00:23:00 DNS Cache Locking 00:26:00 IPAM (IP Address Management) 00:13:00 IPAM Abilities s 00:10:00 GPO Provisioning 00:29:00 Configure Identity and Access Solutions Configure Identity and Access Solutions 00:13:00 Web Services 00:09:00 C AD FS Components 00:16:00 Mock Exam Mock Exam- 70-417 - Upgrading Your Skills to MCSA Windows Server 2012 00:20:00 Final Exam Final Exam- 70-417 - Upgrading Your Skills to MCSA Windows Server 2012 00:20:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

70-417 - Upgrading Your Skills to MCSA Windows Server 2012
Delivered Online On Demand29 hours
£24

SwiftUI and Node.js Full Stack - Build Twitter - iOS 16

By Packt

Do you want to create outstanding apps with SwiftUI? Moreover, are you eager to build up your professional portfolio and show up in your next job interview with confidence? This complete iOS application development course is designed to teach you how to become an advanced multiplatform app developer using Apple's native user interface framework: SwiftUI.

SwiftUI and Node.js Full Stack - Build Twitter - iOS 16
Delivered Online On Demand21 hours 13 minutes
£59.99

Oracle 12c Administration II

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is for all Oracle Professionals. Specifically Database Administrators, Web Server Administrators, System Administrators, CIOs and other IT Management Professionals. Overview Upon successful completion of this course, students will be able to perform many of the day-to-day administration tasks required of an Oracle database administrator. This course introduces many of the powerful capabilities of the Oracle database. In this course, students will learn about day-to-day administration tasks. It will also address administration sub-specialties. Introduction: Managing the Database Instance The Database Management Tools EM Database Express EM Cloud Control SQL Developer Database Administrator Introduction: Database Architecture Review Database Instance Configurations Memory Structures Process Structures Storage Architecture Introduction: Starting & Stopping Databse Services Start & Stop the Database Listener ABOUT DATABASE STARTUP/SHUTDOWN SYSOPER SYSDBA DATABASE STATE & STAGES STARTUP WITH EM CLOUD CONTROL STARTUP WITH SQL*PLUS SHUTDOWN WITH EM CLOUD CONTROL SHUTDOWN WITH SQL*PLUS USING MS WINDOWS SERVICES Introduction: Oracle Network Environment Oracle Net Services Architecture ORACLE NET CONFIGURATION ASSISTANT ORACLE NET MANAGER USING EM CLOUD CONTROL ADVANCED NETWORK COMPRESSION TROUBLESHOOTING NETWORK PROBLEMS Introduction: Diagnostics & Oracle Support About Database Diagnostics Fault Diagnosability Infrastructure DATABASE INSTANCE HEALTH SNAPSHOT THE SUPPORT WORKBENCH PROACTIVE DATABASE HEALTH CHECKS PACKAGE DIAGNOSTIC DATA WORKING WITH THE KNOWLEDGE BASE Storage: Tablespace Management Starter Tablespaces CREATE TABLESPACE WITH EM CC CREATE TABLESPACE WITH SQL MANAGE TABLESPACES WITH EM CC MANAGE TABLESPACES WITH EM DE MANAGE TABLESPACES WITH SQL DROP TABLESPACE ALTER TABLESPACE Storage: Advanced Tablespace Management Managing Temporary Tablespaces TEMP TABLESPACE GROUPS WITH EM TEMP TABLESPACE GROUPS WITH SQL DEFAULT PERMANENT TABLESPACES BIGFILE TABLESPACES MANAGING THE SYSAUX TABLESPACE Storage: Data Files & Temp Files Management Manage Data Files with EM ACCESS METADATA WITH SQL MANAGE DATA FILES WITH SQL MANAGE TEMP FILES ORACLE-MANAGED FILES (OMF) Storage: UNDO Data & UNDO Tablespaces About UNDO Space Management GUARANTEE UNDO RETENTION MONITOR UNDO SPACE WITH SQL USE THE EM UNDO ADVISOR Security & Schemas: Security Overview & Database Privileges Database Security Principles DATABASE SYSTEM PRIVILEGES DATABASE OBJECT PRIVILEGES SUPER ADMINISTRATOR ROLES PRIVILEGE ANALYSIS Security & Schemas: User Security Create & Manage User Accounts MANAGE USERS WITH EM MANAGE USERS WITH SQL CREATE USER ALTER USER DROP USER GRANT & REVOKE PRIVILEGES RESOURCE LIMITS VIA PROFILES ALTER PROFILE DROP PROFILE PASSWORD MANAGEMENT VIA PROFILES ROLE-BASED SECURITY MANAGEMENT ALTER USER...DEFAULT ROLE SET ROLE DELEGATING PRIVILEGE AUTHORIZATION WITH ADMIN OPTION & System Privileges WITH GRANT OPTION & Object Privileges PRINCIPLE OF LEAST PRIVILEGE CHECKLIST Security & Schemas: Database Auditing Auditing Database Activity Traditional Auditing Unified Auditing Create Audit Policy Security & Schemas: SQL Loader Loader Concepts Loader From the Command Line control File Options Load Methods Loader Express Mode Loader From EM Security & Schemas: Export & Import Manage Directory Objects The Data Pump Architecture Data Pump Export Data Pump Import Data Pump Dictionary Views Using the EM CC Interface Performance & Availability: Managing Performance & SQL Tuning Management Advisory Framework Performance Monitoring & AWR The SQL Tuning Advisor Monitoring Exceptions with Metrics Performance & Availability: Data Concurrency About System & User Locks Monitor & Manage User Locks Moitor Locks with Data Dictionary Manage Locks with EM Performance & Availability: Backup & Recovery Concepts Backup & Recovery Structures Managing REDO Data Configuring for Recoverability Instance Recovery Recoverability Checklist Additional course details: Nexus Humans Oracle 12c Administration II training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Oracle 12c Administration II course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Oracle 12c Administration II
Delivered OnlineFlexible Dates
Price on Enquiry

Legal Secretary Complete Guide

By IOMH - Institute of Mental Health

Overview This Legal Secretary course will unlock your full potential and will show you how to excel in a career in Legal Secretary. So upskill now and reach your full potential. Everything you need to get started in Legal Secretary is available in this course. Learning and progressing are the hallmarks of personal development. This Legal Secretary will quickly teach you the must-have skills needed to start in the relevant industry. In This Mental Health Course, You Will: Learn strategies to boost your workplace efficiency. Hone your Legal Secretary skills to help you advance your career. Acquire a comprehensive understanding of various Legal Secretary topics and tips from industry experts. Learn in-demand Legal Secretary skills that are in high demand among UK employers, which will help you to kickstart your career. This Legal Secretary course covers everything you must know to stand against the tough competition in the Legal Secretary field.  The future is truly yours to seize with this Legal Secretary. Enrol today and complete the course to achieve a Legal Secretary certificate that can change your professional career forever. Additional Perks of Buying a Course From Institute of Mental Health Study online - whenever and wherever you want. One-to-one support from a dedicated tutor throughout your course. Certificate immediately upon course completion 100% Money back guarantee Exclusive discounts on your next course purchase from Institute of Mental Health Enrolling in the Legal Secretary course can assist you in getting into your desired career quicker than you ever imagined. So without further ado, start now. Process of Evaluation After studying the Legal Secretary course, your skills and knowledge will be tested with a MCQ exam or assignment. You must get a score of 60% to pass the test and get your certificate.  Certificate of Achievement Upon successfully completing the Legal Secretary course, you will get your CPD accredited digital certificate immediately. And you can also claim the hardcopy certificate completely free of charge. All you have to do is pay a shipping charge of just £3.99. Who Is This Course for? This Legal Secretary is suitable for anyone aspiring to start a career in Legal Secretary; even if you are new to this and have no prior knowledge on Legal Secretary, this course is going to be very easy for you to understand.  And if you are already working in the Legal Secretary field, this course will be a great source of knowledge for you to improve your existing skills and take them to the next level.  Taking this Legal Secretary course is a win-win for you in all aspects.  This course has been developed with maximum flexibility and accessibility, making it ideal for people who don't have the time to devote to traditional education. Requirements This Legal Secretary course has no prerequisite.  You don't need any educational qualification or experience to enrol in the Legal Secretary course. Do note: you must be at least 16 years old to enrol. Any internet-connected device, such as a computer, tablet, or smartphone, can access this online Legal Secretary course. Moreover, this course allows you to learn at your own pace while developing transferable and marketable skills. Course Curriculum Legal Secretary Module 01: Introduction to Legal Secretary 00:25:00 Module 02: English Law & Legal Systems 00:35:00 Module 03: The Legal Workplace & Professionals 00:47:00 Module 04: Law of Contract & Law of Tort 00:31:00 Module 05: Wills, Probate and Estate Law Practice 00:17:00 Module 06: Property Law & Conveyancing Practice 00:21:00 Module 07: Family Law and Insurance Practice 00:26:00 Module 08: Professional Writings and Documents 00:30:00 Module 09: Document Proofreading and Editing 00:07:00 Module 10: Meeting Management & Minute Taking 01:09:00 Module 11: Customer Service and Telephone Handling Skills 00:23:00 Module 12: Data Management and Record-Keeping 00:16:00 Module 13: Other Essential Skills for Secretarial Role 00:22:00 Module 14: Professional Conduct and Ethics 00:24:00 Microsoft Word Essentials New Word Document and Templates 00:02:00 Tabs, Ribbons and Groups 00:03:00 Zoom and Rulers in Word 00:02:00 Editing the Word Document 00:03:00 Insert Pictures with Word 00:05:00 Insert Shape and Text Box in Word 00:02:00 Review Tab in Word 00:03:00 Layout in Word 00:02:00 File Options in Word 00:02:00 Closing and Reopening in Word 00:01:00 Microsoft Powerpoint Essentials New PowerPoint Presentation and Templates 00:02:00 Tabs Ribbons and Groups in PowerPoint 00:03:00 First Slide and Designing the Slide 00:02:00 Home Tab and Updates in PowerPoint 00:02:00 Buttons in PowerPoint 00:01:00 Inserting Pictures in PowerPoint 00:04:00 Presentation Mode 00:01:00 Animations Tab 00:05:00 File Options in Word 00:02:00 Closing and Reopening in Word 00:01:00 Microsoft Outlook Essentials Setting Up Outlook with Accounts 00:03:00 Tabs, Ribbons and Groups in Outlook 00:03:00 Navigation Bar in Outlook 00:01:00 Organizing Outlook with Favorites and Folders 00:03:00 Additional Options inside Outlook Tabs 00:01:00 Reading, Writing and Receiving Emails 00:08:00 Attaching Items in Outlook Mails 00:03:00 The View Tab in Outlook 00:02:00 Create a Rule to move emails to a folder 00:04:00 Insert a screen shot from Excel 00:02:00 Microsoft Excel - Top 50 Keyboard Shortcuts Formatting Excel Keyboard Shortcuts 00:02:00 Table Excel Keyboard Shortcuts 00:02:00 Editing Excel Keyboard Shortcuts 00:05:00 Formula Excel Keyboard Shortcuts 00:03:00 Workbook Excel Keyboard Shortcuts 00:02:00 Handy Excel Shortcuts Keyboard Shortcuts 00:05:00

Legal Secretary Complete Guide
Delivered Online On Demand8 hours 10 minutes
£11.99

JNCIA Practicum and Exam Preparation

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This program is designed for students who have attended successfully the IJOS and JRE courses (prior to April 1, 2017) or the IJOS course (since April 3, 2017) and are working toward JNCIA-JUNOS certification. Overview The objectives for this course follow the requirements for the current JNCIA-JUNOS. At the end of this course, the successful student will be able to: Identify the concepts and functionality of various fundamental elements of networking Identify the concepts, benefits and functionality of the core elements of the Junos OS Identify the concepts, operation and functionality of the Junos user interfaces Identify the main elements for configuring Junos devices Describe how to configure basic components of a Junos device Identify methods of monitoring and maintaining Junos devices Describe monitoring and maintenance procedures for a Junos device Identify basic routing concepts and functionality for Junos devices Describe how to configure and monitor basic routing elements for a Junos device Identify the concepts and functionality of routing policy and firewall filters on Junos devices Describe how to configure and monitor routing policies and firewall filters on a Junos device Apply knowledge of Junos operating system configuration, operations, and functionality to real-world scenarios This intense, two-day program is designed to prepare attendees who have previously taken the Introduction to the Junos Operating System (IJOS) course for taking the certification exam while simultaneously gaining insight into real-world applications Session 1: Practice Labs Guided practice labs to reintroduce the lab environment Session 2: Real-World Scenario Labs Labs that emulate real-world application of JNCIA-level knowledge, configurations, operations, and functionality. These labs will challenge students to complete scenario-based problems to accomplish specific network goals. Session 3: Networking Fundamentals Collision domains and broadcast domains Function of routers and switches Optical network fundamentals ? SONET/SDH, OTN Ethernet networks Layer 2 addressing, including address resolution IPv4 and IPv6 fundamentals Layer 3 / IP addressing, including subnet masks Subnetting and supernetting Decimal to binary conversion Longest match routing Connection-oriented vs. connectionless protocols Session 4: Junos OS Fundamentals Junos device portfolio ? product families, general functionality Software architecture Control and forwarding planes Routing Engine and Packet Forwarding Engine Protocol daemons Transit traffic processing Exception traffic Session 5: User Interfaces CLI functionality CLI modes CLI navigation CLI Help Filtering output Active vs. candidate configuration Reverting to previous configurations Modifying, managing, and saving configuration files Viewing, comparing, and loading configuration files J-Web ? core/common functionality Session 6: Junos Configuration Basics Initial configuration User accounts Login classes User authentication methods Interface types and properties Configuration groups Additional initial configuration elements ? NTP, SNMP, syslog, etc. Configuration archival Logging and tracing Rescue configuration Session 7: Operational Monitoring and Maintenance Show commands Monitor commands Interface statistics and errors Network tools ? ping, traceroute, telnet, SSH, etc. Real-time performance monitoring (RPM) Junos OS installation Software upgrades Powering on and shutting down Junos devices Root password recovery Session 8: Routing Fundamentals Packet forwarding concepts Routing tables Routing vs. forwarding tables Route preference Routing instances Static routing Advantages of / use cases for dynamic routing protocols Session 9: Routing Policy and Firewall Filters Default routing policies Import and export policies Routing policy flow Effect of policies on routes and routing tables Policy structure and terms Policy match criteria, match types, and actions Firewall filter concepts Firewall filter concepts Filter match criteria and actions Effect of filters on packets Unicast reverse-path-forwarding (RPF) Session 10: JNCIA-JUNOS Certification Exam The exam voucher is included in the price of the course DWWTC is a certified PearsonVUE Testing Center' Additional course details: Nexus Humans JNCIA Practicum and Exam Preparation training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the JNCIA Practicum and Exam Preparation course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

JNCIA Practicum and Exam Preparation
Delivered OnlineFlexible Dates
Price on Enquiry

Security in Google Cloud

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This class is intended for the following job roles: [Cloud] information security analysts, architects, and engineers Information security/cybersecurity specialists Cloud infrastructure architects Additionally, the course is intended for Google and partner field personnel who work with customers in those job roles. The course should also be useful to developers of cloud applications Overview This course teaches participants the following skills: Understanding the Google approach to security Managing administrative identities using Cloud Identity. Implementing least privilege administrative access using Google Cloud Resource Manager, Cloud IAM. Implementing IP traffic controls using VPC firewalls and Cloud Armor Implementing Identity Aware Proxy Analyzing changes to the configuration or metadata of resources with GCP audit logs Scanning for and redact sensitive data with the Data Loss Prevention API Scanning a GCP deployment with Forseti Remediating important types of vulnerabilities, especially in public access to data and VMs This course gives participants broad study of security controls and techniques on Google Cloud Platform. Through lectures, demonstrations, and hands-on labs, participants explore and deploy the components of a secure Google Cloud solution. Participants also learn mitigation techniques for attacks at many points in a Google Cloud-based infrastructure, including Distributed Denial-of-Service attacks, phishing attacks, and threats involving content classification and use. Foundations of GCP Security Google Cloud's approach to security The shared security responsibility model Threats mitigated by Google and by GCP Access Transparency Cloud Identity Cloud Identity Syncing with Microsoft Active Directory Choosing between Google authentication and SAML-based SSO GCP best practices Identity and Access Management GCP Resource Manager: projects, folders, and organizations GCP IAM roles, including custom roles GCP IAM policies, including organization policies GCP IAM best practices Configuring Google Virtual Private Cloud for Isolation and Security Configuring VPC firewalls (both ingress and egress rules) Load balancing and SSL policies Private Google API access SSL proxy use Best practices for structuring VPC networks Best security practices for VPNs Security considerations for interconnect and peering options Available security products from partners Monitoring, Logging, Auditing, and Scanning Stackdriver monitoring and logging VPC flow logs Cloud audit logging Deploying and Using Forseti Securing Compute Engine: techniques and best practices Compute Engine service accounts, default and customer-defined IAM roles for VMs API scopes for VMs Managing SSH keys for Linux VMs Managing RDP logins for Windows VMs Organization policy controls: trusted images, public IP address, disabling serial port Encrypting VM images with customer-managed encryption keys and with customer-supplied encryption keys Finding and remediating public access to VMs VM best practices Encrypting VM disks with customer-supplied encryption keys Securing cloud data: techniques and best practices Cloud Storage and IAM permissions Cloud Storage and ACLs Auditing cloud data, including finding and remediating publicly accessible data Signed Cloud Storage URLs Signed policy documents Encrypting Cloud Storage objects with customer-managed encryption keys and with customer-supplied encryption keys Best practices, including deleting archived versions of objects after key rotation BigQuery authorized views BigQuery IAM roles Best practices, including preferring IAM permissions over ACLs Protecting against Distributed Denial of Service Attacks: techniques and best practices How DDoS attacks work Mitigations: GCLB, Cloud CDN, autoscaling, VPC ingress and egress firewalls, Cloud Armor Types of complementary partner products Application Security: techniques and best practices Types of application security vulnerabilities DoS protections in App Engine and Cloud Functions Cloud Security Scanner Threat: Identity and Oauth phishing Identity Aware Proxy Content-related vulnerabilities: techniques and best practices Threat: Ransomware Mitigations: Backups, IAM, Data Loss Prevention API Threats: Data misuse, privacy violations, sensitive/restricted/unacceptable content Mitigations: Classifying content using Cloud ML APIs; scanning and redacting data using Data Loss Prevention API Additional course details: Nexus Humans Security in Google Cloud training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Security in Google Cloud course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Security in Google Cloud
Delivered OnlineFlexible Dates
Price on Enquiry

Symantec Client Management Suite 7.6 - Administration

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is for IT administrators who will be maintaining and installing software, taking inventory of computers, distributing software updates to computers or remotely managing computers. Overview Upon completion of this course, students will be able to: Discover and import computer and user resources that you want to manage. Deploy the Symantec Management Agent and plug-ins. Gather hardware, software and operating system inventory from managed computers. Maintain a software catalog containing software components. Deliver software to managed computers. Meter software on managed computers. Distribute software updates to managed computers. Remotely manage computers. Analyze gathered data using predefined reports. This hands-on course teaches students the underlying components and concepts of the Symantec Management Platform along with the Symantec Management Console that is used by CMS to perform its management functions. Introduction Course overview The classroom lab environment Understanding the Symantec Client Management Suite Symantec Client Management Suite demonstration Learning about the Symantec Client Management Suite Symantec Management Platform components used by CMS Symantec Management Platform concepts used by CMS How the platform and CMS work The Symantec Management Console Accessing the Symantec Management Console Getting to know the Symantec Management Console Getting to know the enhanced console views Symantec Management Platform Basics Importing computer resources from Active Directory Discover computer resources using Network Discovery Grouping resources Applying CMS policies to resource targets Deploying the Symantec Management Agent Installing the Symantec Management Agent - push method Installing the Symantec Management Agent - pull method Installing solution plug-ins for the Symantec Management Agent Working with the Symantec Management Agent GUI Working with the Symantec Management Agent health settings Gathering Inventory from Managed Computers Introducing Inventory Solution Creating and configuring inventory policies Using inventory tasks Other Inventory Solution capabilities Introducing inventory reports Managing the Software Catalog Preparing the Software Management Framework to support the Software Catalog Populating the Software Catalog with software components Working with software component resources Creating and configuring software products Delivering Software to Managed Computers Choosing a method to deliver software Understanding the software blade of the enhanced console view Managing software deliveries with tasks Installing software using a managed software delivery policy Introducing software management reports Managing Software with Application Metering Understanding Application Metering Tracking software usage on managed computers Metering software with Application Metering policies Application metering reports Managing Organizational Views and Organizational Groups Learning about organizational views and groups Creating custom organizational views and group Managing organizational views and groups Managing Resource Filters and Resource Targets More about resource filters Managing and working with existing filters Creating and modifying filters More about resource targets Working with targets Managing Software Updates on Windows Computers Introducing Patch Management Solution for Windows Preparing your environment for Patch Management Distributing software updates Patch Management Solution reports Managing Virtualized Software Introducing Symantec Workspace Virtualization Installing the Symantec Workspace Virtualization agent Using CMS to deliver virtualized software Remotely Managing Computers Introducing Symantec Remote Access Connector Overview or Real-Time System Manger Remote management reports Managing Policies Getting to know policies Understanding user-based policies Understanding maintenance windows Configuring automation policies Managing shared schedules Managing Jobs and Tasks Overview of task management Creating and scheduling tasks and jobs Overview of Deployment Solution Introducing Deployment Solution Configuring Deployment Solution Creating and managing deployment jobs and tasks Deployment Solution imaging Reporting Introducing reports Using and creating standard reports Configuring and using IT Analytics Solution Site Management Introducing site management Managing sites, subnets and site servers Reviewing site server plug-ins to the Symantec Management Agent Configuring site services Security Learning about security Managing user accounts, security roles, and privileges Managing permissions Additional course details: Nexus Humans Symantec Client Management Suite 7.6 - Administration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Symantec Client Management Suite 7.6 - Administration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Symantec Client Management Suite 7.6 - Administration
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Configuring and Operating Cisco EPN Manager v4.0 (EPNM100)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Cisco integrators and partners Network operators Network administrators Optical network administrators System administrators System integrators and professional services Overview After taking this course, you should be able to: Describe Cisco EPN Manager's features and navigate the Cisco EPN Manager's user interface Understand the network inventory, topologies, and circuits Manage dashboards, alarms, and events Create and interpret reports Distinguish the system requirements for Cisco EPN Manager, and procedures for new installations, upgrades, licensing, and high availability Manage device groups and virtual domains Establish user accounts and their role-based access to EPN Manager's features and devices Configure and combine devices Perform backups and restores Manage data retention, purging, and software updates Monitor system health and performance Update and manage software images Archive, review, and restore configuration files Configure Quality of Service (QoS) actions and policies Configure devices using templates Perform compliance audits Configure monitoring policies Provision Carrier Ethernet services Provision Multiprotocol Label Switching (MPLS) Traffic Engineering (TE) services Provision Circuit Emulation (CEM) services Provision an Optical Channel Network Connection (OCHNC) circuit Provision an Optical Channel Client Connection (OCHCC) circuit Provision an optical Media Channel Group with an OCHCC circuit Describe how Cisco EPN Manager can work with Cisco Network Services Orchestrator (NSO) to provide automated service provisioning The Configuring and Operating Cisco EPN Manager (EPNM100) v4.0 course shows you how to create efficient and agile network management through automated device operations, fast provisioning install, network configuration, dashboard management, and device management using Cisco¸ Evolved Programmable Network (EPN) Manager. Through a combination of lessons and hands-on labs, you will learn to maximize the benefits of the Cisco EPN Manager as a simplified, flexible, and cost-effective end-to-end lifecycle management solution for network provisioning, and network assurance management for today?s converging packet and optical multilayer networks. Exploring Cisco EPN Manager Cisco EPN Manager Overview Cisco EPN Manager Key Features Viewing Devices and Inventory Device Types View Devices Viewing Network Topologies and Circuits Topology Map Basics Change Information Displayed Using Dashboards Dashboards Overview Customize Dashboards Managing Alarms and Events Alarms and Events Overview View Alarms and Events Generating Reports Report Fundamentals Create and Schedule Reports Performing Basic Administration Installation Basics Perform Server Setup Adding Devices Device Management Fundamentals Add a Device Manually Add User-Defined Fields Backup and Restoring Backup Fundamentals Schedule a Backup Performing System Maintenance Software Updates Data Retention and Purging Software Image Management (SWIM) Software Image Management Fundamentals Setting Up Software Image Management Configuration Management Configuration Management Fundamentals Archive Setup Configuring QoS QoS Basics Create a Classification Profile Configuring Devices with Templates Device Configuration Methods Template Basics Performing Compliance Management Compliance Audit Basics Compliance Policy Basics Monitoring with Policies Monitoring Policy Fundamentals Edit a Monitoring Policy Circuit and Video Conferencing (VC) Fundamentals Circuit Provisioning Basics Supported Service Types Provisioning Carrier Ethernet Services Provision a Carrier Ethernet Service Verify a Service Provisioning Cisco MPLS Traffic Engineering Services Cisco MPLS TE Service Basics Provision a Cisco MPLS TE Service Provisioning Circuit Emulation Services Circuit Emulation Services Basics Provision a CEM Service Provisioning an OCHNC Circuit OCHNC Circuit Basics Set Up Devices for Circuit Provisioning an Optical OCHCC Circuit OCHCC Circuit Basics Set Up Devices for Circuit Provisioning a Media Channel Group with an OCHCC Circuit Media Channel Group with OCHCC Basics Provision a Media Channel Group Introducing Cisco EPN Manager with Cisco NSO Cisco EPN Manager with Cisco NSO Basics For More Information Additional course details: Nexus Humans Cisco Configuring and Operating Cisco EPN Manager v4.0 (EPNM100) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Configuring and Operating Cisco EPN Manager v4.0 (EPNM100) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Configuring and Operating Cisco EPN Manager v4.0 (EPNM100)
Delivered OnlineFlexible Dates
Price on Enquiry