Enhance your professional skills in Health & Care with our Mandatory Refresher Training. Covering critical areas from First Aid to Mental Health, this training is designed to update and deepen your knowledge in Health Care settings. Ensure compliance and excellence in Care with our comprehensive course offerings. Learning Outcomes Administer effective First Aid as a Health Care professional. Apply specialised paediatric First Aid techniques in Care settings. Understand comprehensive Care Certificate standards for Health & Care. Advance in Health & Care with a Level 3 Diploma in Health & Social Care. Fulfill Duty of Care obligations with updated practices. Enhance communication within Health Care settings. Manage information securely and efficiently in Care environments. Implement robust infection control protocols in Health & Care. Promote equality and inclusion within Care settings. Adopt person-centred approaches to improve Care quality. Address mental health issues with confidence in Health Care. This Mandatory Refresher Training Bundle comes up with the following courses:Course 01: First Aid at Work Essentials of First Aid in Health & Care: Equip Health Care professionals with the skills necessary to respond to emergencies effectively. Course 02: Paediatric First Aid Specialised First Aid for Children: Focus on paediatric emergencies and preventative measures in Care settings. Course 03: Care Certificate Foundations of Professional Care: Standardized training fulfilling the Care Certificate requirements to ensure high-quality Health & Care services. Course 04: Level 3 Diploma in Health & Social Care Advanced Practices in Health & Care: Enhance your qualifications with advanced knowledge crucial for Health & Care professionals. Course 05: Duty of Care Ethical and Legal Practices in Care: Understand and apply Duty of Care to safeguard and promote the interests of those receiving Care. Course 06: Communication in Care Settings Effective Communication Techniques: Master communication skills to improve interactions and understanding within Health Care environments. Course 07: Information Handling in Care Settings Confidentiality and Data Management: Training on secure handling of information in compliance with Care standards. Course 08: Infection Prevention and Control in Care Settings Maintaining Safe Care Environments: Strategies to prevent and control infections, critical for patient and staff safety in Health Care settings. Course 09: Equality and Inclusion in Care Settings Promoting Diverse and Inclusive Care: Address and foster equality and inclusion practices within Health Care facilities. Course 10: Person Centred Approaches in Care Settings Individualized Care Strategies: Emphasize the importance of person-centred Care to enhance patient satisfaction and outcomes. Course 11: Mental Health Mental Health Awareness and Support: Equip staff with the skills to recognize and address mental health issues effectively in Health & Care settings.
Duration 5 Days 30 CPD hours This course is intended for This course is recommended for: ? System Administrators ? Patch Administrators ? SA Administrators ? Policy Setters ? IT Managers ? IT or Application Architects ? Data Center Managers ? Application Experts ? Operations Experts ? Deployment Specialists ? Application Deployment Manager Administrators ? QA Team Members and Managers ? Security Administrators ? Other technical personnel who are responsible for data center automation Overview After completing this course, you should be able to: ? Describe the Server Automation (SA) core architecture and key components of SA ? Integrate unmanaged servers into the SA managed environment and discover server information through SA ? Use the Operation System (OS) Provisioning feature of SA to automate the installation of OS onto servers ? Provision virtual servers and manage their server lifecycle through SA ? Create static and dynamic device groups to manage multiple servers as groups ? Manage packages as part of the software management feature in SA ? Use a policy-based management methodology to provision software and manage software updates ? Describe and use Application Deployment Manager (ADM) to manage an application lifecycle using SA ? Use the Application Configuration feature of SA to manage the values in configuration files on managed servers ? Manage patches on various OS platforms using a patch policy or software policy ? Use the Audit and Remediation feature of SA to ensure servers and applications are compliant with defined best practices or corporate policies ? Use the Compliance feature of SA to discover out-of-compliance servers in the managed environment and ensure that they are in compliance with corporate policies ? Use the Global Shell and Global File System (OGFS) features to explore and manage servers in an SA environment ? Create, manage, and execute scripts I SA to manage servers or server groups This five-day course provides the necessary foundation to manage the data center servers and application environment using HP Server Automation (SA) 10. The course covers the key components of SA and their functionality. Course Overview and Introduction to HP Server Automation ? Discuss the IT organization?s preference for automation ? Discuss the main features of HP SA ? Discuss the benefits of using SA ? Describe the distributed architecture of SA Exploring the Architecture and Interfaces ? Define an SA core ? Describe the functionality of each key component of SA ? Describe SA users ? Use the SA client to explore a managed server environment ? Describe the SA core architecture and key components ? Learn how to use the SA interfaces to explore the server environment Agent Functionality and Server Integration ? Differentiate the agent types ? Describe the SA agent functionality ? Specify the requirements for installing an SA agent onto an unmanaged server ? Install an agent onto an unmanaged server using the SA client and manual installation ? Troubleshoot agent installation and communication failures ? Explore the server inventory using the Device Explorer of the SA client ? Describe the Agent Tools feature within SA ? Integrate existing, unmanaged servers into the SA managed environment ? Summarize what server information is collected by the agent ? Explain the server module objects ? Explain agent extensions Provisioning Operating Systems (OS) Using OS Build Plans (OSBPs) ? Describe the Operating System (OS) provisioning feature within SA ? Describe the process of provisioning an OS on a server ? Define and run an OS Build Plan (OSBP) Dynamic Host Configuration Protocol (DHCP) Less or Static IP Provisioning ? Configure and run the Managed Boot Client(s) (MBC) ? Provision Operating Systems (OS) without using Dynamic Host Configuration Protocol (DHCP) (or by using Static IP) Managing Virtualization ? Describe the supported virtualization management features in SA ? Describe the process of provisioning virtual servers for VMware Enterprise Server Xi (VMware ESXi) and Solaris 10 ? Identify the relationship between the hypervisor and its virtual servers ? Manage the lifecycle of VMware Virtual Machines (VMs) ? Manage the lifecycle of Solaris zones ? Integrate with VMware Virtual Center using Virtualization Service (VS) Exploring Device Groups ? Explain device groups and their characteristics ? Describe the different types of device groups supported in SA ? Create static and dynamic device groups using the SA client Exploring Device Groups with Search Results ? Describe the different types of search in the SA client ? Discuss the process to save and retrieve search results ? Create device groups from search results ? Develop sample reports using advanced search Managing Packages ? Describe how to manage packages in SA ? Discuss the supported package types ? Explain how to organize the software library ? Import and export packages into the software repository ? Install and uninstall packages ? Manage Red Hat Package Manager (RPM) packages Software Management ? Describe the use of policy-based software management in SA ? Describe how to manage software policies in SA ? List the software management setup tasks ? Install and uninstall software using software policies ? Manage software updates using software policies Working with Application Deployment Manager (ADM) ? Describe the Application Deployment Manager (ADM) and its functions ? Manage the ADM ? Set permissions for ADM ? Define an application, a target, and a component ? Deploy an application ? Manage an Application Deployment job ? Describe the rollback and undeploy process ? Import and export Application Deployment data from SA Application Configuration Management ? Describe how application configurations are managed in SA ? Describe application configuration components ? Control values using an application configuration inheritance model ? Push application configuration values to servers Managing Patches ? Describe the patch management feature in SA ? View patch information ? Describe UNIX patch management tasks ? Install patches using patch policies on the Windows platform ? Identify Microsoft patch administration tasks ? Manage patches on Red Hat LINUX Working with Audits, Snapshots, and Remediation ? Describe the audit and remediation feature in SA ? Create and run audits ? Configure file audit rules ? Set audit rule exceptions ? View audit results and remediate the differences ? Describe how to use Business Service Automation Essentials (BSAE) Network to run compliance audits Enforcing Compliance ? Define server compliance concepts ? Describe the compliance management feature in SA ? Scan and view the compliance status of servers ? Remediate non-compliant servers Exploring Servers Using the Global Shell and Global File System ? Describe the Global Shell and Opsware Global File System (OGFS) features within SA ? Describe how Global Shell and OGFS features can be used to manage servers within the SA environment ? Describe how to navigate and filter data in the OGFS using the Global Shell ? Use the Remote Shell (ROSH) command to login to a managed server and execute shell scripts on a managed server ? Use the SA remote terminal feature to access and manage servers in the managed environment Scripting with SA ? Describe the script management and execution feature in SA ? Create scripts using the SA client ? Execute ad hoc or saved scripts ? View and download script results ? Describe PowerShell integration with SA ? Explain the Extensible Discovery server module ? Introduce Automation Platform eXtensions (APX) scripting Exploring Reports in SA ? Explain SA reports ? List the reports available in SA ? Generate an SA report ? Explain Business Service Automation (BSA) Essentials basics as a reporting tool OS Provisioning with OS Sequences ? Describe the OS Provisioning feature within SA ? Describe the process of provisioning an OS on a server ? Define and run an OS Sequence
Duration 1 Days 6 CPD hours This course is intended for This course is intended for Administrator, Database Administrator, End User, Network Administrator, and Systems Administrator. Overview Upon completion of this course, students will be able to Describe and determine database security requirements, Understand Oracle security solutions to help meet security requirements, Implement basic database security, Configure network security, and Discover basic security configuration issues. This Introduction to Oracle Database Security Ed 1 training teaches you how to use Oracle Database features to help meet the security, privacy and compliance requirements of your organization. Introduction Course Objectives Course Schedule Detective Security Controls Preventive Security Controls Your Learning Aids Basic Workshop Architecture Understanding Security Requirements Fundamental Data Security Requirements Security Risks Techniques to Enforce Security Choosing Security Solutions Database Access Control: Authentication Protecting Against Database Bypass with Encryption Protecting Sensitive Data Protecting against Application Bypass Detecting Threats Compliance Implementing Basic Database Security Database Security Checklist Reducing Administrative Effort Principle of Least Privilege Objects Protection Configuring Network Security Network Access Control Listener Security Listener Usage Control Manage fine-grained access to external network services Discovering Basic Configuration Issues Accessing Enterprise Manager Security Reports Using Various Security Reports
Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course are Application Consultants, Business Analysts, Business Process Owners/Team Leads/Power Users, Program/Project Managers, Technology Consultants, and Users. In this course, students will gain SAP Netweaver Business Warehouse knowledge necessary for successful implementation and administration within a heterogeneous SAP NetWeaver BW system landscape. Data Warehousing Describing Data Warehouse Systems Describing Data Warehouse Architecture Using the Data Warehousing Workbench Master Data Modeling in SAP BW Describing InfoObjects Creating Characteristic InfoObjects The Loading of Master Data from SAP Data Sources Describing Data Flow Modeling a Master Data Flow Loading a Master Data Flow Modeling with the Graphical Data Flow Tool Loading of Transaction Data from SAP DataSources Describing the Core InfoProviders Creating a Key Figure InfoObject Creating a DataStore Object (DSO) Loading Transaction Data into a Data Store Object Describing the Extended Star Schema of an InfoCube Creating InfoCubes Loading Transaction Data into an InfoCube Master Data Loading from Flat File Data Sources Loading Data From a Flat File Describing the Data Flow in Detail Describing the Data Loading Process in Detail InfoProviders in SAP BW Explaining the InfoProviders Used in SAP BW ? Introduction Creating MultiProviders Usage of SAP BI Content Using BI Content Query Performance Optimization Optimizing Query Performance Monitoring Performance Creating and Filling Aggregates The SAP BW Administration Describing Administrative Tasks and Tools Administrating the InfoCubes Administrating the DataStore Objects Creating Process Chains
Duration 2 Days 12 CPD hours This course is intended for This course is intended for system and network administrators or operators responsible for the installation, setup, configuration, and administration of the BIG-IQ system or management of BIG-IP devices and F5 products running on those devices. This course uses lectures and hands-on exercises to give participants real-time experience in configuring and using the BIG-IQ© product. Students are introduced to BIG-IQ, its interface, and its various functionality. We first look at administering and operating the BIG-IQ system itself, then detail how it is used to remotely manage BIG-IP devices running BIG-IP Local Traffic Manager (LTM). We then look configuring a BIG-IQ Data Collection Device (DCD) system and see how it is used for the remote storage and examination of BIG-IP log events and statistics. Module 1: BIG-IQ Overview BIG-IQ Centralized Management BIG-IQ Components BIG-IQ Core Functionality REST API BIG-IQ Data Collection Device (DCD) BIG-IP Cloud Edition (CE) Setting up the BIG-IQ System Module 2: Administering the BIG-IQ System Controlling Access to the BIG-IQ Creating, Authenticating, Configuring Users Backups Local Host Settings Configuring DNS, NTP, and SMTP Monitoring BIG-IQ, DCD, and BIG-IP Events with Alerts Monitoring BIG-IQ with iHealth Post Installation Issues; Licensing, Changing Management IP, Master Key, Restoring Backups Module 3: Managing BIG-IP LTM Devices BIG-IP LTM Device Discovery BIG-IP Device Backup Deploying to BIG-IP Devices Deployment and Deployment Logs Configuration Snapshots Managing BIG-IP Certificates Managing BIG-IP Licenses Monitoring BIG-IP Devices with iHealth Management of QKView Reports from Managed BIG-IP Devices Module 4: Setting Up the BIG-IQ Data Collection Device Custom Roles Types and Groups Setting up User Accounts with custom roles and privileges Managing BIG-IP DSC Discovery and management of BIG-IP Device Clusters (DSC) with BIG-IQ Administering BIG-IQ High Availability Configuration and management of BIG-IQ systems in a High Availability pair
Duration 1 Days 6 CPD hours This course is intended for This basic course is designed for system administrators, system architects, application developers, quality assurance specialists, and technical sales and marketing professionals. Overview After completing this course, you should be able to: Summarize current business drivers and the need for flexibility Describe enterprise messaging and the capabilities it must provide Identify the main ways that IBM© MQ can impact application design Describe the basic components of IBM© MQ Differentiate between point-to-point and IBM© MQ cluster connectivity Summarize queue manager and queue manager components administrative tasks Contrast the architectural role of IBM© MQ clusters and multiple instance queue managers Describe the security provisions of IBM© MQ and IBM© MQ Advanced Message Security Describe how IBM© MQ is used as part of the communications infrastructure to: Connect application environments, such as the World Wide Web, enterprise transaction systems, and database systems Manage the distribution of publisher information to appropriate subscribers Provide file transfer management with IBM© MQ Managed File Transfer Serve as a JMS provider Interface with WebSphere Application Server Store in-flight messages for IBM© Integration Bus Interact with z/OS applications Facilitate connectivity to mobile environments with IBM© MQ Telemetry Describe the options for deployment to the Cloud In this course, you learn about IBM© MQ V9 basic components and the path that messages follow when they are exchanged between applications. You also learn how IBM© MQ administrative responsibilities can include the management of topic-based publish/subscribe messaging, managed file transfer, and deployments to the cloud. Topics include an overview of the support that IBM© MQ provides for security, publish/subscribe, high availability, administration, logging, auditing, managed file transfer, MQTT, and cloud options. Course introductionIBM© MQ overviewIBM© MQ basicsMessaging styles, topologies, and architecture overviewSystem administration overviewSecurity overviewIntroduction to IBM© MQ Managed File TransferIntroduction to IBM© MQ Telemetry and IBM© MessageSightIntroduction to the IBM© MQ ApplianceExpanding the scope of IBM© MQCourse summary
Duration 5 Days 30 CPD hours This course is intended for This course is intended for Administrator, Database Administrator, Security Specialist, and Systems Administrator. Overview Upon successful completion of this course, students will be able to Enumerate Oracle auditing solutions to monitor database security requirements, Implement Oracle Audit Vault and Database Firewall, Configure Oracle Audit Vault and Database Firewall, Explain Oracle Compliance Framework, and Configure basic Compliance Framework rules. In the Oracle Database Security: Detective Controls course, students learn how they can use Oracle Database administration auditing features to meet the compliance requirements of their organization. IntroductionUsing Unified AuditUsing Fine-Grained AuditIntroduction to Oracle Audit Vault and Database Firewall (AVDF)Planning the Oracle Audit Vault and Database Firewall ImplementationInstalling the Audit Vault ServerConfiguring the Audit Vault ServerConfiguring Oracle AVDF and Deploying the Audit Vault AgentNetworking and Oracle AVDFInstalling a Database FirewallConfiguring Oracle AVDF and Deploying Database FirewallUsing Host MonitoringConfiguring High AvailabilityCreating Custom Collection Plug-insManaging the Audit Vault ServerManaging the Database FirewallsOverview of the Auditing and Reporting FeaturesPerforming Administrative TasksCreating Audit Policies for Oracle DatabasesCreating Database Firewall PoliciesOracle AVDF ReportsManaging Entitlements Additional course details: Nexus Humans Oracle Database Security - Detective Controls training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Oracle Database Security - Detective Controls course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for This course is intended for network engineers, network support personnel, reseller support personnel and anyone else needing a working knowledge of Network and Security Manager. Overview After successfully completing this course, you should be able to: Explain Network and Security Manager concepts and terminology. Set up and administer Network and Security Manager servers. Configure domains and administrators. Add devices using modeling and importing. Work with objects and templates. Configure policies. Perform routine device management tasks Work with logs and reports Configure VPNs with the VPN Manager tool This course discusses the basic operations of Network and Security Manager. Key topics include server and domain administration, device configuration, template creation and management, policy creation and management, logging, and report generation. Through demonstrations and hands-on labs, students gain experience in configuring, testing, and troubleshooting features of Network and Security Manager. Labs will be done on a ScreenOS platform Chapter 1: Course IntroductionChapter 2: Network and Security Manager Concepts Chapter 3: Server Administration Chapter 4: Domains and Administrators Chapter 5: Adding Devices Chapter 6: Abstraction Objects and TemplatesChapter 7: Abstraction Policies Chapter 8: Managing Devices Chapter 9: Logging, Reporting and Monitoring Chapter 10: Central ManagerChapter 11: Virtual Private Networks Additional course details: Nexus Humans Network and Security Manager Fundamentals training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Network and Security Manager Fundamentals course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for Cluster administrators (Junior systems administrators, junior cloud administrators) interested in deploying additional clusters to meet increasing demands from their organizations. Cluster engineers (Senior systems administrators, senior cloud administrators, cloud engineers) interested in the planning and design of OpenShift clusters to meet performance and reliability of different workloads and in creating work books for these installations. Site reliability engineers (SREs) interested in deploying test bed clusters to validate new settings, updates, customizations, operational procedures, and responses to incidents. Overview Validate infrastructure prerequisites for an OpenShift cluster. Run the OpenShift installer with custom settings. Describe and monitor each stage of the OpenShift installation process. Collect troubleshooting information during an ongoing installation, or after a failed installation. Complete the configuration of cluster services in a newly installed cluster. Installing OpenShift on a cloud, virtual, or physical infrastructure. Red Hat OpenShift Installation Lab (DO322) teaches essential skills for installing an OpenShift cluster in a range of environments, from proof of concept to production, and how to identify customizations that may be required because of the underlying cloud, virtual, or physical infrastructure. This course is based on Red Hat OpenShift Container Platform 4.6. 1 - Introduction to container technology Describe how software can run in containers orchestrated by Red Hat OpenShift Container Platform. 2 - Create containerized services Provision a server using container technology. 3 - Manage containers Manipulate prebuilt container images to create and manage containerized services. 4 - Manage container images Manage the life cycle of a container image from creation to deletion. 5 - Create custom container images Design and code a Dockerfile to build a custom container image. 6 - Deploy containerized applications on OpenShift Deploy single container applications on OpenShift Container Platform. 7 - Troubleshoot containerized applications Troubleshoot a containerized application deployed on OpenShift. 8 - Deploy and manage applications on an OpenShift cluster Use various application packaging methods to deploy applications to an OpenShift cluster, then manage their resources. 9 - Design containerized applications for OpenShift Select a containerization method for an application and create a container to run on an OpenShift cluster. 10 - Publish enterprise container images Create an enterprise registry and publish container images to it. 11 - Build applications Describe the OpenShift build process, then trigger and manage builds. 12 - Customize source-to-image (S2I) builds Customize an existing S2I base image and create a new one. 13 - Create applications from OpenShift templates Describe the elements of a template and create a multicontainer application template. 14 - Manage application deployments Monitor application health and implement various deployment methods for cloud-native applications. 15 - Perform comprehensive review Create and deploy cloudinative applications on OpenShift.
Duration 3 Days 18 CPD hours This course is intended for This course is for network managers, resellers, systems administrators, client security administrators, systems professionals, and consultants who are charged with the installation, configuration, and day-to-day management of Symantec Endpoint Protection in a variety of network environments, and who are responsible for troubleshooting and tuning the performance of this product in the enterprise environment. Overview At the completion of the course, you will be able to: Describe Symantec Endpoint Protection products, components, dependencies, and system hierarchy. Install and configure Symantec Endpoint Protection management and client components. Deploy Symantec Endpoint Protection Windows, Windows Embedded, Mac and Linux clients. Manage the client user interface. Manage content updates for Windows, Mac, and Linux. Perform server and database management. Configure replication and load balancing. Design a Symantec Endpoint Protection environment. This course is designed for the network, IT security, and systems administration professional tasked with architecting and implementing Symantec Endpoint Protection. Introduction Course overview The classroom lab environment Symantec Endpoint Protection Product Solution Why use Symantec Endpoint Protection? Symantec Endpoint Protection technologies Symantec Endpoint Protection services Symantec Endpoint Protection components Symantec Endpoint Protection policies and concepts Extending Symantec Endpoint Protection Installing the Symantec Endpoint Protection Manager Identifying system requirements Preparing servers for installation Installing and configuring the Symantec Endpoint Protection Manager Describing Symantec Endpoint Protection upgrades and version compatibility Configuring the Symantec Endpoint Protection Environment Starting and navigating the SEPM Describing policy types and components Console authentication Licensing the SEP environment Deploying Windows and Windows Embedded Clients Planning the client deployment Configuring client deployment package Deploying packages to clients Maintaining the client environment Upgrading Symantec Endpoint Protection clients Deploying Mac and Linux Clients Linux prerequisites Linux deployment Mac prerequisites Mac deployment Client and Policy Management Describing SEPM and client communications Administering clients Configuring groups Configuring locations Active Directory integration with SEP 12.1 Client configuration modes Configuring domains General client settings and Tamper Protection Configuring Content Updates for Windows Clients Introducing LiveUpdate Configuring the SEPM for LiveUpdate Configuring the LiveUpdate Settings and Content policies Configuring multiple group update providers (GUPs) Manually updating virus definitions Configuring Content Updates for Mac and Linux Clients Describing content update methods Configuring the LiveUpdate policy Configuring the SEPM as a reverse proxy Monitoring updates Performing Server and Database Management Managing SEPM servers Maintaining server security Communicating with other servers Managing administrators Managing the database Disaster recovery techniques Configuring Replication and Failover and Load Balancing About sites and replication How replication works Symantec Endpoint Protection replication scenarios Configuring replication Failover and load balancing Designing a Symantec Endpoint Environment Architecture components Architecture constraints Component placement Content delivery Determining client to SEPM ratios SEPM and database sizing best practices