• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

80 Apple courses in Blyth delivered Live Online

VMware Workspace ONE: Deploy and Manage plus UEM Troubleshooting Fast Track [V22.x]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Workspace ONE UEM operators and administrators, account managers, solutions architects, solutions engineers, sales engineers, and consultants. Overview By the end of the course, you should be able to meet the following objectives: Explain and apply the fundamental techniques for launching and maintaining an intelligence-driven, multiplatform endpoint management solution with Workspace ONE UEM Outline the components of Workspace ONE UEM Explain the general features and functionality enabled with Workspace ONE UEM Summarize basic Workspace ONE administrative functions Explain and deploy common Workspace ONE integrations Securely deploy configurations to Workspace ONE UEM managed devices Onboard device endpoints into Workspace ONE UEM Summarize alternative management methodologies for rugged devices Discuss strategies to maintain environment and device fleet health Configure and deploy applications to Workspace ONE UEM managed devices Analyze Workspace ONE UEM deployments Enable email access on devices Integrate Workspace ONE UEM with content repositories and corporate file shares Explain the general features and functionality that Workspace ONE Access enables Demonstrate how to integrate Workspace ONE UEM with Workspace ONE Access Summarize and implement Workspace ONE productivity services into the digital workspace environment Explain the methods of enabling mobile single sign-on for endpoints managed in the digital workspace Configure Workspace ONE Access to support SAML 2.0 for federated authentication across the workforce Summarize basic troubleshooting methodologies Outline common troubleshooting techniques in the Workspace ONE UEM console Outline common troubleshooting techniques when integrating enterprise solutions in the Workspace ONE UEM console Summarize common troubleshooting strategies for Workspace ONE UEM managed devices Outline common application management troubleshooting techniques in the Workspace ONE UEM console Summarize common troubleshooting techniques for email management in the Workspace ONE UEM console Explain common troubleshooting approaches for the VMware Unified Access Gateway™ platform and individual edge services Outline useful troubleshooting tools, such as the Self-Service Portal and VMware Workspace ONE Assist™ In this extended five-day course, you learn how to apply the fundamental techniques for launching and maintaining an intelligence-driven, multiplatform endpoint management solution with VMware Workspace ONE© UEM. Through a combination of hands-on labs, simulations, and interactive lectures, you will configure and manage the endpoint life cycle. After the course, you will have the foundational knowledge necessary to implement Workspace ONE UEM effectively.In addition, you learn how to apply the fundamental techniques for integrating VMware Workspace ONE© Access? with Workspace ONE UEM to distribute business-critical applications securely from any device and configure access management controls. You will learn how Workspace ONE uses various authentication methods and protocols to determine user access permissions and enable single sign-on, and you will leave with an understanding of the fundamental principles of identity and access management.Finally, you learn to investigate, analyze, and determine issues that might occur with the different components of Workspace ONE UEM. Troubleshooting is the backbone of service maintenance and management. By understanding how to effectively troubleshoot product issues, administrators can understand how product services communicate and function, in turn optimizing service and software health management. Course Introduction Introductions and course logistics Course objectives Online resources and references Platform Architecture Summarize the features and functionality of Workspace ONE UEM Outline the benefits of leveraging Workspace ONE UEM Recognize the core and productivity components that make up the Workspace ONE UEM platform Summarize high availability and disaster recovery for Workspace ONE Solution Administration Navigate and customize the Workspace ONE UEM console Summarize the hierarchical management structure Explain the features and functions of Workspace ONE Hub Services Outline account options and permissions Enterprise Integrations Outline the process and needs to integrate with directory services Explain certificate authentication and practical implementation with Workspace ONE Explain the benefits of integrating an email SMTP service into the Workspace ONE UEM console Describe VMware Dynamic Environment Manager? and its architecture Onboarding Outline the prerequisite configurations in the Workspace ONE UEM environment for onboarding devices for management Outline the steps for setting up autodiscovery in the Workspace ONE UEM console Enroll an endpoint through the VMware Workspace ONE© Intelligent Hub app Summarize platform onboarding options Managing Endpoints Explain the differences between device and user profiles Describe policy management options for Windows and macOS Describe the functions and benefits of using compliance policies Explain the use cases for Freestyle Orchestrator Describe the capabilities that sensors and scripts enable Alternative Management Methods Describe the function and benefits of device staging Configure product provisioning in the Workspace ONE UEM console Understand the benefits of deploying a VMware Workspace ONE© Launcher? configuration to Android devices List the system and device requirements for Linux device management in Workspace ONE UEM Applications Describe the features, benefits, and capabilities of application management in Workspace ONE UEM Understand and configure deployment settings for public, internal, and paid applications in the Workspace ONE UEM console Describe the benefits of using Apple Business Manager content integration Describe the benefits of using server-to-client software distribution List the functions and benefits of VMware Workspace ONE© SDK Device Email List the email clients supported by Workspace ONE UEM Configure an Exchange Active Sync profile in the Workspace ONE UEM console Configure VMware Workspace ONE© Boxer settings Summarize the available email infrastructure integration models and describe their workflows Configure email compliance policies and notifications services Content Sharing Describe the benefits of using Content Gateway and the Content Gateway workflows Describe the benefits of integrating content repositories with Workspace ONE UEM Configure a repository in the Workspace ONE UEM console Maintenance Manage endpoints from the Device List View and the Device Details View pages Analyze endpoint deployment and compliance data from the Monitor Overview page Workspace ONE Access Summarize the benefits of Workspace ONE Access Outline the core features and functions that Workspace ONE Access enables Navigate the Workspace ONE Access console Explain the functions of directory integration with Workspace ONE Access Explain the various types of authentication protocols enabled by Workspace ONE Access Integrating Workspace ONE UEM and Workspace ONE Access Explain the rationale for integrating Workspace ONE UEM and Workspace ONE Access Outline the process of connecting Workspace ONE UEM and Workspace ONE Access Explain the integrations workflow Summarize the key features of an integrated solution Productivity Integrations Identify the functions enabled by Unified Access Gateway Outline the purpose of the VMware AirWatch© Secure Email Gateway? edge service Explain the features enabled by the VMware Workspace ONE© Tunnel? edge service Summarize the capabilities enabled by the Content Gateway edge service SAML 2.0 Authentication Outline authentication methods supported by Workspace ONE Access Summarize the main properties of the SAML protocol Summarize the SAML authentication workflow Explain the application single sign-on authentication workflow with SAML Mobile Single Sign-On Describe the concept of mobile single sign-on Outline mobile single sign-on workflows Intelligence and Automation Summarize the features of VMware Workspace ONE© Intelligence? Outline the benefits of using Workspace ONE Intelligence Fundamentals of Troubleshooting Workspace ONE UEM Outline software troubleshooting logic and support methods Summarize the main process flows for the Workspace ONE UEM components Explain the importance of Workspace ONE UEM process flows for troubleshooting Identify different Workspace ONE UEM log files Workspace ONE UEM Console Troubleshooting Outline the best practices for troubleshooting Workspace ONE UEM console issues Identify common issues related to group management and assignment Outline common issues related to Workspace ONE UEM console roles and system settings Understand how analytic events can be used to identity platform errors Summarize the steps for collecting and analyzing Workspace ONE UEM console logs Integration Troubleshooting Outline the common enterprise integrations in Workspace ONE UEM Outline common troubleshooting techniques for the VMware AirWatch© Cloud Connector? Troubleshoot issues related to Directory Services integration Identify directory user and groups synchronization issues Troubleshoot issues related to certificate authority integration Explain Workspace ONE Access integration and Workspace ONE Intelligent Hub troubleshooting techniques Endpoint Troubleshooting Compare the endpoint connection topologies in Workspace ONE UEM Outline useful tools and resources for endpoint troubleshooting Summarize the best practices for device enrollment troubleshooting Explain device connectivity troubleshooting techniques Understand how to identify and resolve profile-related issues Identify common compliance policy issues and potential root causes Application Troubleshooting Explain the different scoping questions for troubleshooting applications Review application management configurations Summarize the general tools and resources for application troubleshooting Describe the general logic of troubleshooting public applications Understand internal application issues and potential causes Explain purchased application troubleshooting techniques Unified Access Gateway And Edge Services Troubleshooting Review Unified Access Gateway architecture and edge service workflows Understand Unified Access Gateway general configurations Explain how to utilize Unified Access Gateway related troubleshooting tools and resources Identify

VMware Workspace ONE: Deploy and Manage plus UEM Troubleshooting Fast Track [V22.x]
Delivered OnlineFlexible Dates
Price on Enquiry

Introduction to Java programming

5.0(3)

By Systems & Network Training

Java training course description A comprehensive introduction of the Java language and environment. It is important to note that the course will assume that the delegates are already familiar with the C language as this enables more advanced features of the Java language to be covered in the course. The course will also give an overview of areas related to programming in Java. What will you learn Describe the Java architecture. Write Java applets and applications. Debug Java programs. Examine existing code and determine its function. Use multimedia extensions, the awt, multithreading, exceptions within Java Java training course details Who will benefit: Those wishing to program in Java. Prerequisites: Complete C programming Duration 5 days Java training course contents Review of UNIX fundamentals What is Java? What Java is, history of Java, reasons for success. The Java Virtual Machine, Bytecodes, getting up and running with Java, Java resources. Simple Java applications. C features in Java Java data structures, Java flow control, differences from C, arrays, strings and packages. OO features in Java Java classes and objects, inheritance, overloading, packages. Differences from C++. Java applets Applications vs. applets, HTML, the applet tag, applet methods, life cycle, testing and debugging. Multimedia applets Images, sounds, fonts, colours and animation. Java products The JDK in detail, other development environments. Javabeans and JDBC overviews. Abstract Window Toolkit JFC and Swing versus AWT. Event handling (JDK 1.1), GUIs, panels, buttons, lists, scrollbars, text areas, frames… Exception handling and multithreading Handling exceptions. Starting, pausing, stopping threads, producers, consumers, monitoring. More standard classes Java file I/O, Streams, The system class. The networking model, java.net classes. Security and Java Types of attack, the security manager, craplets, securing the network. Integrating legacy code with Java

Introduction to Java programming
Delivered in Internationally or OnlineFlexible Dates
£3,697

Advanced Java programming

5.0(3)

By Systems & Network Training

Advanced Java training course description A tour of the more advanced features of Java following on from the Introduction to Java course. JDBC and JavaBeans are covered in separate courses. What will you learn Use Java to implement OOA/D. Use within Java programs - Internationalisation - Object serialisation - Reflection - RMI - Swing - JAR files Write Servlets and Java Server Pages Advanced Java training course details Who will benefit: Those wishing to program in Java. Prerequisites: Introduction to Java programming Duration 5 days Advanced Java training course contents What you should already know OO features in Java Static initialisers, object destruction, finalisation, constructor chaining, shadowing, Abstract classes and interfaces, inner classes, nested classes, member classes, local classes, anonymous classes. Internationalisation Locales, Unicode, local customs, localising messages. Object Serialisation Simple and custom serialisation, class versioning. Reflection Obtaining class and member information. RMI Restrictions, RMI architecture, Stubs, skeletons, rmic, the registry server, The RMI API. Swing An overview, examples, comparison vs. AWT, data transfer cut & paste. Servlets Servlet API, Java Web server, The servlet life cycle, chaining servlets, Hybrid servlets. JAR files and signed applet JAR files and signed applet

Advanced Java programming
Delivered in Internationally or OnlineFlexible Dates
£3,697

WORKSHOP: Working as a Psychologist Expert Witness specialising in Trauma and Memory: From Instruction to Cross Examination

By London Trauma Specialists

WORKSHOP: Working as a Psychologist Expert Witness specialising in Trauma and Memory: From Instruction to Cross Examination An online practical workshop for Clinical, Counselling and Forensic Psychologists, guiding you through the process of working as an Expert Witness.

WORKSHOP: Working as a Psychologist Expert Witness specialising in Trauma and Memory: From Instruction to Cross Examination
Delivered OnlineJoin Waitlist
£150

Security+

5.0(3)

By Systems & Network Training

Security+ training course description A hands on course aimed at getting delegates successfully through the CompTia Security+ examination. What will you learn Explain general security concepts. Describe the security concepts in communications. Describe how to secure an infrastructure. Recognise the role of cryptography. Describe operational/organisational security. Security+ training course details Who will benefit: Those wishing to pass the Security+ exam. Prerequisites: TCP/IP foundation for engineers Duration 5 days Security+ training course contents General security concepts Non-essential services and protocols. Access control: MAC, DAC, RBAC. Security attacks: DOS, DDOS, back doors, spoofing, man in the middle, replay, hijacking, weak keys, social engineering, mathematical, password guessing, brute force, dictionary, software exploitation. Authentication: Kerberos, CHAP, certificates, usernames/ passwords, tokens, biometrics. Malicious code: Viruses, trojan horses, logic bombs, worms. Auditing, logging, scanning. Communication security Remote access: 802.1x, VPNs, L2TP, PPTP, IPsec, RADIUS, TACACS, SSH. Email: S/MIME, PGP, spam, hoaxes. Internet: SSL, TLS, HTTPS, IM, packet sniffing, privacy, Javascript, ActiveX, buffer overflows, cookies, signed applets, CGI, SMTP relay. LDAP. sftp, anon ftp, file sharing, sniffing, 8.3 names. Wireless: WTLS, 802.11, 802.11x, WEP/WAP. Infrastructure security Firewalls, routers, switches, wireless, modems, RAS, PBX, VPN, IDS, networking monitoring, workstations, servers, mobile devices. Media security: Coax, UTP, STP, fibre. Removable media. Topologies: Security zones, DMZ, Intranet, Extranet, VLANs, NAT, Tunnelling. IDS: Active/ passive, network/host based, honey pots, incident response. Security baselines: Hardening OS/NOS, networks and applications. Cryptography basics Integrity, confidentiality, access control, authentication, non-repudiation. Standards and protocols. Hashing, symmetric, asymmetric. PKI: Certificates, policies, practice statements, revocation, trust models. Key management and certificate lifecycles. Storage: h/w, s/w, private key protection. Escrow, expiration, revocation, suspension, recovery, destruction, key usage. Operational/Organisation security Physical security: Access control, social engineering, environment. Disaster recovery: Backups, secure disaster recovery plans. Business continuity: Utilities, high availability, backups. Security policies: AU, due care, privacy, separation of duties, need to know, password management, SLAs, disposal, destruction, HR policies. Incident response policy. Privilege management: Users, groups, roles, single sign on, centralised/decentralised. Auditing. Forensics: Chain of custody, preserving and collecting evidence. Identifying risks: Assets, risks, threats, vulnerabilities. Role of education/training. Security documentation.

Security+
Delivered in Internationally or OnlineFlexible Dates
£2,797

DOG TRAINING

5.0(84)

By Cheshire Dog Services Ltd

Having a dog is a joyful experience but an untrained dog will put stress and anxiety on the whole family. At Cheshire Dog Services, we want to help you enjoy your dog so are happy to provide one to one training sessions for you and your dog. Having trained many different breeds from Chihuahua’s & Yorkies – Lab’s & Spaniels to Rottweiler’s & German Shepherds, I am well versed in handling most problems in any breed. I am also a member of The Guild of Dog Trainers who acknowledge the needs of dog owners & their aim of a well behaved dog. The Guild fully understands the expectation society places on dog owners & additionally the laws which affect them all. We live in an artificial environment, which can often pose many dangers to dogs. We invite pets into our home then punish or blame them for acting up like animals do. It’s our responsibility to teach our dogs what the social boundaries are and how to live in a human environment. Even though they become trusted family members, we need to remember that fundamentally they are animals and as beautiful and loving as they are, training is key to avoid behavioral problems that will inevitably crop up. Have you ever noticed when a trainer handles a students’ dog in class – the dog performs amazingly well? The dog then goes back to his owner and forgets all that was taught. This is all down to how you handle your dog. How you are able to read the smallest changes in their body language and posture and make the confident and correct adjustments according to what is required. As a dog trainer with many years worth of experience, my aim is to pass on my skills and as much knowledge as is possible to all of my valued clients. When you and I work together, your dog will learn FASTER! You will enjoy a better-behaved dog in a shorter period of time whilst still being actively involved in the process of teaching your dog. As your dog learns the necessary concepts with me, you will experience the benefit of reducing your own frustration within your own training sessions at home. I help both you and your dog come together towards a common goal of a happy life together. Puppy 1-2-1’s Pups are never too young to learn, their Mums teach them many things in the first 7/8 weeks before we take them into our lives. We need to continue to educate the pup so they know the boundaries we expect in order for them to fit into our human ways and for you to fully enjoy these wonderful creatures. Much can be done BEFORE they have had all their inoculations and are ready to walk outside. The key to effective training is teaching your pup that whenever he does something wrong, you immediately redirect him to what you expect and then reward for getting it right. Most of all, puppy training needs to be upbeat, consistent and rewarding with regular sessions practiced and integrated into your daily routine. What I’ll cover with you at your home are: Shaping behaviour Crating Basic obedience controls of Sit, down, stand, focus & wait. Recall set up, the most important command for all dogs without a doubt! The best type of equipment use to help with training, whistles for recall, training lines, reward pouches etc. Interactive play used to build bonds and value in you as the owner/handler through ball tugs, tugs and ropes. How to teach the pup to “leave it” Advice on leads, harnesses, treats, socialising, lead control Answer any questions you may have resulting to your puppy Adolescent and mature dogs 1-2-1’s Adolescence in dogs is reached by month 7-8 & the dog becomes fully mature by month 18. We’ll cover the following in our sessions or can focus on a specific need if requiredat’s r Obedience Heel-work so your dog walks nicely by your side and doesn’t pull. Wait / Stay commands for both obedience and safety Interactive play and bond building to aid recall Recall development is essential for all dogs big and small. “Leave it” command so the dog ignores what its told to leave Focus will allow a higher level of obedience. I believe positive reinforcement training is the best way to create a happy and confident dog who understands what is expected of them. I teach owners how to establish boundaries at home and employ problem behaviour prevention strategies from early puppyhood onwards. Training and behaviour problems are resolved without the punishment-based techniques that commonly result in fear, aggression, or deterioration of the bond between dog and owner. Instead I utilise positive methods based on well-established learning theories and behavioural science that are humane, practical and effective. I teach marker-based training, either with a clicker or word, combined with rewards of all kinds (e.g., food, toys, play, and praise). All my training sessions reflect a comprehensive understanding of the dog’s natural behaviour, and take into respect learning abilities as well as the dog’s mental and physical developmental stages. In my classes, I strive to create a relaxed and enjoyable learning experience as I believe that the human part of the equation needs as much support and understanding as the canine component. Most people learn more quickly when not subjected to criticisms and negative feedback and therefore, a positive approach to the training of the people is an integral part of all our classes. Please contact us for prices (they vary depending on what’s required)

DOG TRAINING
Delivered OnlineFlexible Dates
Price on Enquiry

1:1 Science-based Relationship and Dating Coaching FOR WOMEN

By Single To Couple Consulting

Are you tired of “rocky” relationships, bad dates or feeling lonely? Most of us have learned the hard way, the cost of getting a relationship wrong can be enormous. The rewards of getting it right are immeasurable! That is why, as a certified Relationship & Dating Coach, I help clients avoid the pitfalls and find lasting happiness. So, do you really want to do it right this time around? Take charge of your love lfie today and book a free confidential 30-minute introductory session.

1:1 Science-based Relationship and Dating Coaching FOR WOMEN
Delivered OnlineFlexible Dates
FREE

HTML5 - Content Authoring Fundamentals

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is designed as an introduction to HTML and CSS for those who want to learn to develop standards-compliant web content, with a focus on current HTML5 and CSS3 standards. This course can be taught on Microsoft© Windows©, Apple© Mac OS© X, or Linux©, and supports developers who work in any of those environments. HTML5 is one of the most integral and evolving web technologies that enables a user to structure content and present it on the web.This course lays the foundation for mastering this popular web publishing technology. Authoring Content in HTML Web Development Standards Create an HTML Page Apply HTML Attributes Embedding and Linking Content Embed Content within an HTML Page Link HTML Pages Create Image Maps Formatting Content with CSS Apply Style Sheets to HTML Use CSS to Create Multiple Column Layouts Authoring Complex Content Structures Author Table Content Construct and Format Forms Testing and Publishing HTML Content Identify and Correct Structural and Compatibility Problems Make HTML Content Accessible Publish and Deploy Web Content Additional course details: Nexus Humans HTML5 - Content Authoring Fundamentals training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the HTML5 - Content Authoring Fundamentals course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

HTML5 - Content Authoring Fundamentals
Delivered OnlineFlexible Dates
£395

1:1 Science-based Relationship and Dating Coaching FOR MEN

By Single To Couple Consulting

Are you tired of “rocky” relationships, bad dates or feeling lonely? Most of us have learned the hard way, the cost of getting a relationship wrong can be enormous. The rewards of getting it right are immeasurable! That is why, as a certified Relationship & Dating Coach, I help clients avoid the pitfalls and find lasting happiness. So, do you really want to do it right this time around? Take charge of your love lfie today and book a free confidential 30-minute introductory session.

1:1 Science-based Relationship and Dating Coaching FOR MEN
Delivered OnlineFlexible Dates
FREE

Mac Integration Basics

By Nexus Human

Duration 1 Days 6 CPD hours Companies are increasingly integrating Mac computers into Windows or other standards-based network environments. This Mac Integration Basics course examines how to best use a Mac(s) in an organization that predominantly functions with a Microsoft Windows operating system and Windows Servers. This course is also ideal for users who need to replace a Windows computer with a Mac and for IT professionals who support Mac users Directory Services Connecting a Mac to a Directory Server Using Network Account File Sharing Connecting to File Servers Turning on Personal File Sharing Email, Contacts, and Calendars Managing Internet Accounts Preferences Connecting to an Exchange Server Connecting Mail to Non-Windows Servers Adding Accounts in Mail, Contacts, and Calendars Security Built-in Security Features Creating Strong Passwords Using Two-factor Authentication Setting a Firmware Password Locking a Mac Screen Creating User Accounts Disabling Automatic Login Protecting Start-up Disk Files Ensuring that the Apps you Download are Safe Providing Network Security Printing Connecting to a Local Printer Setting up a Wireless Printer Sharing your Printer Setting up a Printer Shared by a Mac and a PC via SMB or CIFS Setting up an IP Printer Specifying Printer Features Printing from a Network Printer Instant Messaging iMessage Jabber Configuring Messages Adding Accounts Chatting on a local network with Bonjour Moving and Backing Up Content Moving Content Backing up Data with Time Machine Running Windows on a Mac Running Windows Natively or Virtually Using Office Using Cross-platform Apps Using Cross-platform Files

Mac Integration Basics
Delivered OnlineFlexible Dates
Price on Enquiry