• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

2379 Audit courses

Oracle Database - Deploy, Patch and Upgrade Workshop Ed 1

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course is intended for Data Warehouse Administrator, Database Administrator, Database Designer, Support Engineer, and Technical Administrator. Overview Upon successful completion of this course, students will be able to Install Oracle Grid Infrastructure for a Standalone Server, Configure ASMLIB and create ASM disk groups, Apply the latest patch set updates to the Grid Infrastructure software, Install Oracle Database software, Use Oracle Restart to manage components, Prepare the Linux operating system for Oracle software installation, Upgrade Oracle Database, Create a container database, Install Oracle Grid Infrastructure for an Independent Server, Create an Oracle Database using DBCA, and Install the latest patch set updates to the Oracle database software. This Oracle Database: Deploy, Patch and Upgrade Workshop gives you detailed information to help you install Oracle Database software. In this course, you will be introduced to Oracle Database Cloud Service. Oracle Database Overview Oracle Database Introduction Oracle Database Architecture Overview Oracle Database Instance Configurations Oracle Database Memory Structures Process Structures Database Storage Architecture Logical and Physical Database Structures Container and Pluggable Database Overview Installing Oracle Grid Infrastructure for a Standalone Server Overview of Oracle Grid Infrastructure for a Standalone Server System Requirements for Oracle Grid Infrastructure Configuring Storage for Oracle Automatic Storage Management (ASM) Installing Oracle Grid Infrastructure for a Standalone Server Upgrading Oracle Grid Infrastructure for a Standalone Server Installing Oracle Database Software Planning Your Installation System Requirements for Oracle Database Preparing the Operating System Using 4 KB Sector Disks Setting Environment Variables Checking the System Requirements Using the Oracle Universal Installer (OUI) Performing a Silent Mode Installation Creating an Oracle Database by Using DBCA Planning the Database Storage Structure Choosing non-CDB or CDB Types of Databases (based on workload) Choosing the Appropriate Character Set Understanding How Character Sets are Used Setting the NLS_LANG Initialization Parameter Using the Database Configuration Assistant (DBCA) Using Oracle Restart Oracle Restart Overview Oracle Restart Process startup Controlling Oracle Restart Choosing the Correct SRVCTL Utility Oracle Restart Configuration Using the SRVCTL Utility Obtaining Help for the SRVCTL Utility Starting Components by Using the SRVCTL Utility Introduction to Upgrading to Oracle Database Upgrade Methods Data Migration Methods Supported Releases for Direct Upgrade Overview of Upgrade Process Performing a Rolling Upgrade Upgrading a CBD Preparing to Upgrade to Oracle Database Developing a Test Plan Performance Testing Requirements for Databases Using Oracle Label Security or Oracle Database Vault Requirement for Databases Using Oracle Warehouse Builder Using the Pre-Upgrade Information Tool Backing Up the Database Installing the Oracle Database Software Preparing the New Oracle Home Upgrading to Oracle Database Upgrading by Using the Database Upgrade Assistant (DBUA) Manually Upgrading to Oracle Database Migrating a non-CDB to a CDB Performing Post-Upgrade Tasks Migrating to Unified Auditing Performing Post-Upgrade Tasks Following a Manual Upgrade Migrating Data by Using Oracle Data Pump Data Pump Overview Migrating by Using Data Pump Importing by Using a Network Link

Oracle Database - Deploy, Patch and Upgrade Workshop Ed 1
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Implementing Automation for Cisco Security Solutions v1.0 (SAUI)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Channel and Customer Engineers Network Engineer System Engineer Wireless Engineer Consulting Systems Engineer Technical Solutions Architect Network Admisnistrator Wireless Design Engineer Network Manager Channel SEs Sales Engineer Channel AMs Account Manager Overview Upon completing this course, students will be able to meet these objectives: Understand the overall architecture of the Cisco security solutions and how APIs help enable security Understand how to use Cisco Firepower APIs Understand how pxGrid APIs function and their benefits Understand what capabilities the Cisco Stealthwatch APIs offer and construct API requests to them for configuration changes and auditing purposes Understand the features and benefits of using Cisco Stealthwatch Cloud APIs Learn how to use the Cisco Umbrella Investigate API Understand the Functionality provided by Cisco AMP and its APIs Learn how to use Cisco Threat Grid APIs to analyze, search, and dispose of threats This course demonstrates the tools and the benefits of leveraging programmability and automation in Cisco Security Solutions, including Cisco Firepower Management Center, Cisco Firepower Threat Defense, Cisco ISE, Cisco pxGrid, Cisco Stealthwatch Enterprise, Cisco Stealthwatch Cloud, Cisco Umbrella, Cisco AMP, Cisco Threat grid, and Cisco Security Management Appliances. Students will learn how to use the API for each Cisco security solution and specific applications of when the API benefits IT security content. Introducing Cisco Security APIs Role of APIs in Cisco Security Solutions Cisco Firepower, Cisco ISE, Cisco pxGrid, and Cisco Stealthwatch APIs Use cases and security workflow Consuming Cisco Advanced Malware Protection APIs Cisco AMP overview Cisco AMP endpoint API Cisco AMP use cases and workflows Discovery 1: Query Cisco AMP endpoint APIs for verifying compliance Using Cisco ISE Introducing Cisco Identity services engine Cisco ISE use cases Cisco ISE APIs Using Cisco pxGrid APIs Cisco pxGrid overview WebSockets and STOMP messaging protocol Discovery 2: Use the REST API and Cisco pxGrid with Cisco Identity services engine Using Cisco Threat Grid APIs Cisco threat grid overview Cisco threat grid API Cisco threat grid use cases and workflows Discovery 3: Construct a Python script using the Cisco threat grid API Investigating Cisco Umbrella Security Data Programmatically Cisco Umbrella investigate API overview Cisco Umbrella investigate API: Details Discovery 4: Query security data with the Cisco Umbrella investigate API Exploring Cisco Umbrella Reporting and Enforcement APIs Cisco Umbrella reporting and enforcement APIs: Overview Cisco Umbrella reporting and enforcement APIs: Deep dive Discovery 5: Generate reports using the Cisco Umbrella reporting API Automating Security with Cisco Firepower APIs Review basic constructs of Firewall policy management Design policies for automation Cisco FMC APIs in depth Discovery 6: Explore the Cisco Firepower management center API Cisco FTD automation with ansible Discovery 7: Use ansible to automate Cisco Firepower threat defense configuration Cisco FDM API in depth Discovery 8: Automate Firewall policies using the Cisco Firepower device manager API Operationalizing Cisco Stealthwatch and Its API Capabilities Cisco Stealthwatch overview Cisco Stealthwatch APIs: Details Discovery 9: Automate alarm policies and create reports using the Cisco Stealthwatch APIs Using Cisco Stealthwatch Cloud APIs Cisco Stealthwatch Cloud overview Cisco Stealthwatch Cloud APIs: Deep dive Discovery 10: Construct a report using Cisco stealthwatch Cloud APIs Describing Cisco Security Management Appliance APIs Cisco SMA APIs overview Cisco SMA API Discovery 11: Construct reports using Cisco SMA APIs

Cisco Implementing Automation for Cisco Security Solutions v1.0 (SAUI)
Delivered OnlineFlexible Dates
Price on Enquiry

Managing Campus Networks with Aruba AirWave, Rev. 19.21

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Ideal candidates are Network Administrators who monitor and troubleshoot wireless networks, and Network and System Administrators responsible for installing and configuring network monitoring systems. Overview This hands-on course prepares you with the knowledge and experience required to install and use the AirWave Wireless Management Suite: AirWave Management Platform (AMP), RAPIDS, Visual RF, network health diagnostics, client troubleshooting, alerts and reporting.  In this course, you learn about AirWave?s capabilities in troubleshooting network health and client status via the various stages of association and authentication, as well as redundancy and master consoles for large networks. Introduction to AWMS Airwave Platform. Features and Benefits of AMP RAPIDS and Visual RF. Airwave products. Basic operations using AWMS Installing AWMS Installing AMP. Hardware requirements. Cent OS and AWMS software. Basic configuration steps. Upgrade AWMS software. Licensing AWMS. AWMS documentation Adding Device to AWMS Folders and Groups. Adding devices general process. Manually adding devices. Device discovery and managing device discovery. Moving a device to a folder. Troubleshooting IAP Organizaion and Groups Overview of IAP.Airwave integration. Golden configuration. IAP Organization options. IAP Whitelist Using Visual RF and Visual RF Plan Navigation. Setup. Heat-maps and location information. Import floorplan graphics. Plan deployments. Provision APs. Manage Visual RF performance Network Health Diagnostics page indicators. Network performance tabs. Source of issues. Network issues Troubleshooting Clients and Wireless Networks Searching for users and Diagnostics tab. Client issues. Network issues. AP issues. Switch/Controller issues. General Issues Rogue Detection and Using RAPIDS Why use RAPIDS. Threat Detection Methods. Rules. Classifications. IDS Events Report. New Rogue Devices Report. Visualization. PCI Compliance.WMS Offload Managing Administrative Access, Alerts, Triggers and Reporting Configure role-based administrative use access to the AMP system. Triggers. Alerts. Define and generate reports Scalability and Redundancy VM Redundancy. Failover for Redundancy. Master Console for large deployments. Multiple AMP Server deployments. Large Deployment example System Administration AMP Maintenance. Device Maintenance Wired Device Management Monitoring wired devices in AWMS. Wired device port and interface information. Wired device bandwith statistics and counters. Managing and configuring wired devices via AWMS templates AirWave Aruba Groups How AWMS configures devices. Using groups to control policies. Creating and controlling groups. Basic Group Design.Configuration Audits IAP Template Configuration Fetching a Template. Template Variables. Templates Configuration IAP GUI Configuration Golden configuration. GUI mode. GUI configuration Additional course details: Nexus Humans Managing Campus Networks with Aruba AirWave, Rev. 19.21 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Managing Campus Networks with Aruba AirWave, Rev. 19.21 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Managing Campus Networks with Aruba AirWave, Rev. 19.21
Delivered OnlineFlexible Dates
Price on Enquiry

Certified Information Privacy Professional (CIPP/US)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Data Protection Officers Data Protection Managers Auditors Legal Compliance Officers Security Manager Information Managers Anyone involved with data protection processes and programs Overview It will show the world that students know privacy laws and regulations and how to apply them, and that students know how to secure your place in the information economy. When students earn a CIPP credential, it means they've gained a foundational understanding of broad global concepts of privacy and data protection law and practice, including: jurisdictional laws, regulations and enforcement models; essential privacy concepts and principals; legal requirements for handling and transferring data and more. The Certified Information Privacy Professional/United States (CIPP/US) program, developed by the International Association of Privacy Professionals (IAPP) - the world?s largest comprehensive global information privacy community and resource, was the first professional certification ever to be offered in information privacy. The CIPP/US credential demonstrates a strong foundation in U.S. privacy laws and regulations and understanding of the legal requirements for the responsible transfer of sensitive personal data to/from the U.S., the EU and other jurisdictions.This course will provide you with a foundational understanding of broad global concepts of privacy and data protection law and practice, including: jurisdictional laws, regulations and enforcement models; essential privacy concepts and principals; legal requirements for handling and transferring data and more. Introduction to privacy Modern history of privacy Introduction to personal information Overview of data protection roles Summary of modern privacy frameworks Structure of U.S. law Structure and sources of U.S. law and relevant terms Governmental bodies having privacy and information security authority General Data Protection Regulation overview (GDPR) High-level overview of the GDPR Significance of the GDPR to U.S. organizations Roles and responsibilities outlined in the law California Consumer Privacy Act of 2018 (CCPA) High-level overview of the newly passed California Consumer Privacy Act of 2018 Scope Consumer rights Business obligations Enforcement Enforcement of U.S. privacy and security laws Distinguishing between criminal and civil liability Comparing federal and state authority Theories of legal liability Enforcement powers and responsibilities of government bodies, such as the FTC and state attorneys general Information management from a U.S. perspective Developing a privacy program Role of privacy professionals and accountability Employee training User preferences Managing vendors Data classification Federal versus state authority Differences between federal and state authority Preemption Healthcare Privacy laws in healthcare Major components of HIPAA Development of HITECH Privacy protections mandated by other significant healthcare laws Financial privacy Goals of financial privacy laws Key concepts of FCRA, FACTA and GLBA Red Flags Rule, Dodd-Frank and consumer protection laws Education Privacy rights and protections under FERPA Recent amendments provided by PPRA and NCLBA Telecommunications and marketing Rules and regulations of telecommunications entities Laws that govern marketing Addressing privacy in the digital advertising Law enforcement and privacy Privacy laws on intercepting communication Telecommunications industry and law enforcement Laws ensuring rights to financial privacy National security and privacy Rules and regulations on intercepting communication Evolution of the law Collaboration of government agencies and private companies to improve cybersecurity Civil litigation and privacy Privacy issues related to litigation Electronic discovery, redaction and protective orders U.S. discovery rules versus foreign laws Legal overview of workplace privacy Federal and state laws regulating and protecting employee privacy Federal laws prohibiting discrimination Privacy before, during and after employment Lifecycle of employee privacy Background screening Employee monitoring Investigating misconduct and termination Antidiscrimination laws ?Bring your own device? policies State data security laws State laws impacting data security Social Security number use regulation Laws governing data destruction Data breach notification laws Scope of state data breach notification law Nine elements of state data breach notification laws Major differences in state laws

Certified Information Privacy Professional (CIPP/US)
Delivered OnlineFlexible Dates
Price on Enquiry

Apple - Mac Final Cut Pro X - Level 101

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This class is designed for anyone looking to edit professional-quality video with Final Cut Pro X and who prefers hands-on and interactive instruction to best explore its functionality. Overview Start with basic video editing techniques and work all the way through Final Cut Pro's powerful advanced features. Students work with dramatic real-world media to learn the practical techniques used daily in editing projects. Final Cut Pro X is a revolutionary video editing application that makes it possible for beginners and professionals to achieve stunning results. This course teaches students to perform editing functions and becoming familiar with the user interface. Exploring the Final Cut Pro X Interface Following a Workflow Opening Final Cut Pro X Exploring the Interface Using Menus and Shortcuts Viewing and Sorting Events Skimming Clips and Changing Views Viewing and Creating Projects Working in the Project Library Viewing Projects in the Timeline Hiding and Quitting Final Cut Pro Importing Importing Media into an Event Importing Folders as Keyword Collections Analyzing and Correcting Imported Clips Importing from a Camera Importing from the Finder Importing from Other Applications Organizing Clips in an Event Using Metadata to Customize an Event Adding Keywords to Clips Assigning Multiple Keywords to Clips Applying Keywords to a Clip Range Rating, Sorting and Searching Clips Creating Smart Collections Building a Rough Cut Creating a New Project Screening and Marking Clips Appending Clips in the Timeline Viewing and Arranging Clips in the Magnetic Timeline Inserting Clips into the Primary Storyline Changing Edited Clips Connecting Clips to the Primary Storyline Closing your Project Finetuning a Rough CutAdding to the Primary Storyline Duplicating a Project Removing Clip Selections and Adding Gaps Understanding Trimming, Applying the Trim Tool Trimming with Precision Applying Transitions Preparing for Transitions Applying a Video Transition Using the Transitions Browser Modifying Transitions Changing Transition Parameters in the Inspector Adding Transitions to Other Storylines and Compound Clips Exploring Audio Transitions Working with Sound Monitoring and Adjusting Audio in the Timeline Adding Music and Sound Effects, Adjusting Levels in the Audio Inspector Creating Audio Fades Recording a Narration Track Correcting Problem Audio Working with Titles, Generators and Themes Using the Titles Browser Adding a Lower Third Modifying Titles Adding Bumpers and Credits Working with Video Generators Using Themes Retiming and Transforming Clips Understanding Motion Properties Retiming Clips Creating Holds and Variable Speed Segments Applying Preset Speed Effects Transforming an Image Cropping an Image Adding a Ken Burns Effect Creating Keyboard Shortcuts Applying Effects and Enhancing Color Applying Video Effects Modifying Effect Parameters Auditioning and Animating Effects Applying Audio Effects Enhancing Color in Final Cut Pro Exporting and Sharing Your Project Preparing a Project for Exporting and Sharing Detecting Audio Peaks Adjusting Video Levels for Broadcast Exporting Movie File Publishing a Project to Apple Devices Publishing a Project to Video Sharing Sites Exporting an Image from your Project Exporting for Blue-Ray Disc, DVD, or Disk Image Certification Exam Students can take an end user exam to earn Apple Certified Pro, Final Cut Pro X Level One status Additional course details: Nexus Humans Apple - Mac Final Cut Pro X - Level 101 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Apple - Mac Final Cut Pro X - Level 101 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Apple - Mac Final Cut Pro X - Level 101
Delivered OnlineFlexible Dates
Price on Enquiry

Architecting with Google Cloud: Design and Process

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Cloud Solutions Architects, Site Reliability Engineers, Systems Operations professionals, DevOps Engineers, IT managers. Individuals using Google Cloud Platform to create new solutions or to integrate existing systems, application environments, and infrastructure with the Google Cloud Platform. Overview Apply a tool set of questions, techniques and design considerations Define application requirements and express them objectively as KPIs, SLO's and SLI's Decompose application requirements to find the right microservice boundaries Leverage Google Cloud developer tools to set up modern, automated deployment pipelines Choose the appropriate Google Cloud Storage services based on application requirements Architect cloud and hybrid networks Implement reliable, scalable, resilient applications balancing key performance metrics with cost Choose the right Google Cloud deployment services for your applications Secure cloud applications, data and infrastructure Monitor service level objectives and costs using Stackdriver tools This course features a combination of lectures, design activities, and hands-on labs to show you how to use proven design patterns on Google Cloud to build highly reliable and efficient solutions and operate deployments that are highly available and cost-effective. This course was created for those who have already completed the Architecting with Google Compute Engine or Architecting with Google Kubernetes Engine course. Defining the Service Describe users in terms of roles and personas. Write qualitative requirements with user stories. Write quantitative requirements using key performance indicators (KPIs). Evaluate KPIs using SLOs and SLIs. Determine the quality of application requirements using SMART criteria. Microservice Design and Architecture Decompose monolithic applications into microservices. Recognize appropriate microservice boundaries. Architect stateful and stateless services to optimize scalability and reliability. Implement services using 12-factor best practices. Build loosely coupled services by implementing a well-designed REST architecture. Design consistent, standard RESTful service APIs. DevOps Automation Automate service deployment using CI/CD pipelines. Leverage Cloud Source Repositories for source and version control. Automate builds with Cloud Build and build triggers. Manage container images with Google Container Registry. Create infrastructure with code using Deployment Manager and Terraform. Choosing Storage Solutions Choose the appropriate Google Cloud data storage service based on use case, durability, availability, scalability and cost. Store binary data with Cloud Storage. Store relational data using Cloud SQL and Spanner. Store NoSQL data using Firestore and Cloud Bigtable. Cache data for fast access using Memorystore. Build a data warehouse using BigQuery. Google Cloud and Hybrid Network Architecture Design VPC networks to optimize for cost, security, and performance. Configure global and regional load balancers to provide access to services. Leverage Cloud CDN to provide lower latency and decrease network egress. Evaluate network architecture using the Cloud Network Intelligence Center. Connect networks using peering and VPNs. Create hybrid networks between Google Cloud and on-premises data centers using Cloud Interconnect. Deploying Applications to Google Cloud Choose the appropriate Google Cloud deployment service for your applications. Configure scalable, resilient infrastructure using Instance Templates and Groups. Orchestrate microservice deployments using Kubernetes and GKE. Leverage App Engine for a completely automated platform as a service (PaaS). Create serverless applications using Cloud Functions. Designing Reliable Systems Design services to meet requirements for availability, durability, and scalability. Implement fault-tolerant systems by avoiding single points of failure, correlated failures, and cascading failures. Avoid overload failures with the circuit breaker and truncated exponential backoff design patterns. Design resilient data storage with lazy deletion. Analyze disaster scenarios and plan for disaster recovery using cost/risk analysis. Security Design secure systems using best practices like separation of concerns, principle of least privilege, and regular audits. Leverage Cloud Security Command Center to help identify vulnerabilities. Simplify cloud governance using organizational policies and folders. Secure people using IAM roles, Identity-Aware Proxy, and Identity Platform. Manage the access and authorization of resources by machines and processes using service accounts. Secure networks with private IPs, firewalls, and Private Google Access. Mitigate DDoS attacks by leveraging Cloud DNS and Cloud Armor. Maintenance and Monitoring Manage new service versions using rolling updates, blue/green deployments, and canary releases. Forecast, monitor, and optimize service cost using the Google Cloud pricing calculator and billing reports and by analyzing billing data. Observe whether your services are meeting their SLOs using Cloud Monitoring and Dashboards. Use Uptime Checks to determine service availability. Respond to service outages using Cloud Monitoring Alerts. Additional course details: Nexus Humans Architecting with Google Cloud: Design and Process training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Architecting with Google Cloud: Design and Process course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Architecting with Google Cloud: Design and Process
Delivered OnlineFlexible Dates
Price on Enquiry

H&S for FM (In-House)

By The In House Training Company

This workshop has been designed to help managers understand their responsibilities and what they need to do to ensure compliance with current workplace legislation - including the fire safety and CDM regulations. The day will cover the legal background - including an appreciation of how safety legislation has evolved and why; the logic behind recent developments and the implications for staff and employers; key areas of current legislation; roles and responsibilities in health and safety management, including monitoring contractors and suppliers effectively; implementing sound health and safety policies and procedures; getting staff on board, and implementing effective systems. Also, recognising potential risks and hazards and developing strategies to minimise their impact in the workplace. This course will give participants an understanding of: The broader context of the key areas of health and safety regulation which apply to your organisation Existing health and safety practice and guide them in how to shape and implement an effective health and safety policy What they should do and the procedures to support it Potential areas of risk in the workplace - and how to take action to minimise the threat to staff safety How sound health and safety processes can contribute to business performance 1 Understanding the workplace legislation Overview of health and safety and workplace legislation Compliance, the role of the facilities manager, and who is accountable? Breakout session to discuss where we are now and to highlight issues of concern Applying required policies and procedures Developing and implementation/review of the safety policy Communicating with users, clients and contractors Health and safety manual 'Selling' health and safety 2 Key legislation - a practical working guide Asbestos Regulations Construction (Design and Management) Regulations 2007 / 2015 Control of Substances Hazardous to Health (COSHH) Regulations Disability Discrimination Act (DDA) Display Screen Equipment (DSE) Regulations 1992 Electricity at Work Regulations 1989 Fire Precautions (Workplace ) Regulations 2006 Health and Safety (Consultation with Employees) Regulations 1996 Health and Safety (First Aid) Regulations 1981 Health and Safety at Work etc. Act 1974 Management of Health and Safety at Work Regulations 1992 Manual Handling Operations Regulations 1992 Portable Appliance Testing (PAT) Provision and Use of Work Equipment Regulations 1992 REACH - Registration, Evaluation, Authorisation and restriction of Chemicals Reporting of Injuries, Diseases, and Dangerous Occurrences Regulations (RIDDOR) 1995 Waste Electrical and Electronic Equipment (WEEE) Regulations 2006 Work Equipment Regulations 3 Controlling contractors Understanding the Regulations Selecting and assessing contractors Understanding and setting accountability Why a method statement? How to apply a permit to work system Safe systems of work Round-table discussion to bring out issues from participants' own experience 4 Risk assessment Understanding your hazards Identifying specialist areas How to undertake these assessments Implementation of sound systems and processes Syndicate exercise identifying where assessments are needed and carrying out assessments 5 Keeping the work environment safe Sick building syndrome and legionella Asbestos Waste management Pest control Provisions for first aid Accident reporting and investigation At-work driver safety Security 6 Fire safety Understanding the Regulatory Reform Fire Safety Order Fire certificates The fire risk assessment Testing fire-fighting equipment? Emergency procedures Workshop to examine the procedures for dealing with different types of emergencies 7 Ergonomics programme Ergonomics - important or irrelevant? Are you complying with HSE regulations? Furniture and equipment Display screen equipment assessments Homeworking - your concern or not? Syndicate exercise to review what to do when relocating or refurbishing an office 8 Inspecting and auditing Role of Health and Safety Executive Inspectors - 'be prepared' FM role Staff/trade union involvement Independent audits Records and reports Communicating the results 9 Action plan Participants to list actions they need to take after the course

H&S for FM (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry

AWS Developing Serverless Solutions on AWS

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Developers who have some familiarity with serverless and experience with development in the AWS Cloud Overview In this course, you will learn to: Apply event-driven best practices to a serverless application design using appropriate AWS services Identify the challenges and trade-offs of transitioning to serverless development, and make recommendations that suit your development organization and environment Build serverless applications using patterns that connect AWS managed services together, and account for service characteristics, including service quotas, available integrations, invocation model, error handling, and event source payload Compare and contrast available options for writing infrastructure as code, including AWS CloudFormation, AWS Amplify, AWS Serverless Application Model (AWS SAM), and AWS Cloud Development Kit (AWS CDK) Apply best practices to writing Lambda functions inclusive of error handling, logging, environment re-use, using layers, statelessness, idempotency, and configuring concurrency and memory Apply best practices for building observability and monitoring into your serverless application Apply security best practices to serverless applications Identify key scaling considerations in a serverless application, and match each consideration to the methods, tools, or best practices to manage it Use AWS SAM, AWS CDK, and AWS developer tools to configure a CI/CD workflow, and automate deployment of a serverless application Create and actively maintain a list of serverless resources that will assist in your ongoing serverless development and engagement with the serverless community This course gives developers exposure to and practice with best practices for building serverless applications using AWS Lambda and other services in the AWS serverless platform. You will use AWS frameworks to deploy a serverless application in hands-on labs that progress from simpler to more complex topics. You will use AWS documentation throughout the course to develop authentic methods for learning and problem-solving beyond the classroom. Introduction Introduction to the application you will build Access to course resources (Student Guide, Lab Guide, and Online Course Supplement) Thinking Serverless Best practices for building modern serverless applications Event-driven design AWS services that support event-driven serverless applications API-Driven Development and Synchronous Event Sources Characteristics of standard request/response API-based web applications How Amazon API Gateway fits into serverless applications Try-it-out exercise: Set up an HTTP API endpoint integrated with a Lambda function High-level comparison of API types (REST/HTTP, WebSocket, GraphQL) Introduction to Authentication, Authorization, and Access Control Authentication vs. Authorization Options for authenticating to APIs using API Gateway Amazon Cognito in serverless applications Amazon Cognito user pools vs. federated identities Serverless Deployment Frameworks Overview of imperative vs. declarative programming for infrastructure as code Comparison of CloudFormation, AWS CDK, Amplify, and AWS SAM frameworks Features of AWS SAM and the AWS SAM CLI for local emulation and testing Using Amazon EventBridge and Amazon SNS to Decouple Components Development considerations when using asynchronous event sources Features and use cases of Amazon EventBridge Try-it-out exercise: Build a custom EventBridge bus and rule Comparison of use cases for Amazon Simple Notification Service (Amazon SNS) vs. EventBridge Try-it-out exercise: Configure an Amazon SNS topic with filtering Event-Driven Development Using Queues and Streams Development considerations when using polling event sources to trigger Lambda functions Distinctions between queues and streams as event sources for Lambda Selecting appropriate configurations when using Amazon Simple Queue Service (Amazon SQS) or Amazon Kinesis Data Streams as an event source for Lambda Try-it-out exercise: Configure an Amazon SQS queue with a dead-letter queue as a Lambda event source Writing Good Lambda Functions How the Lambda lifecycle influences your function code Best practices for your Lambda functions Configuring a function Function code, versions and aliases Try-it-out exercise: Configure and test a Lambda function Lambda error handling Handling partial failures with queues and streams Step Functions for Orchestration AWS Step Functions in serverless architectures Try-it-out exercise: Step Functions states The callback pattern Standard vs. Express Workflows Step Functions direct integrations Try-it-out exercise: Troubleshooting a Standard Step Functions workflow Observability and Monitoring The three pillars of observability Amazon CloudWatch Logs and Logs Insights Writing effective log files Try-it-out exercise: Interpreting logs Using AWS X-Ray for observability Try-it-out exercise: Enable X-Ray and interpret X-Ray traces CloudWatch metrics and embedded metrics format Try-it-out exercise: Metrics and alarms Try-it-out exercise: ServiceLens Serverless Application Security Security best practices for serverless applications Applying security at all layers API Gateway and application security Lambda and application security Protecting data in your serverless data stores Auditing and traceability Handling Scale in Serverless Applications Scaling considerations for serverless applications Using API Gateway to manage scale Lambda concurrency scaling How different event sources scale with Lambda Automating the Deployment Pipeline The importance of CI/CD in serverless applications Tools in a serverless pipeline AWS SAM features for serverless deployments Best practices for automation Course wrap-up Additional course details: Nexus Humans AWS Developing Serverless Solutions on AWS training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AWS Developing Serverless Solutions on AWS course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

AWS Developing Serverless Solutions on AWS
Delivered OnlineFlexible Dates
Price on Enquiry

Excel - Mastering Formulas and Functions

By Underscore Group

Ideal for those already using Excel but who really want to get to grips with formulas and functions. Course overview Duration: 1 day (6.5 hours) Our Excel Mastering Formulas and Functions course looks at how to confidently use formulas and functions within Excel. It looks at how to correctly construct formulas and explains how to build common formulas such as working with percentages. It investigates a range of built in Excel functions and shows you how to use the formula auditing tools to help when things go wrong.  This course is aimed at existing users of Excel who want to further their skills. Participants should be able to confidently create and amend worksheets. Objectives By the end of the course you will be able to: Construct Formulas Use a range of common Functions Work with absolute and relative references in formulas Create percentage calculations Use named ranges in formulas Use the XLOOKUP command Create formulas with date and use date functions Use formulas in conditional formatting Use a range of Count functions Use the formula auditing tools Content Formulas vs Functions Constructing formulas Using functions Common Excel functions Using the function wizard vs the formula bar Formulas in tables Absolute vs relative references in formulas Using absolute references in formulas Using partial absolute referencing Range Naming Naming ranges Using range names in formulas Single and multi-cell ranges Working with percentages Creating formulas with percentages Percentage breakdowns Percentage increases Formatting as a percentage Using Lookups Using XLOOKUP to insert information from other spreadsheets Calculating with dates Calculating with dates Using date functions Using formulas in conditional formatting Using conditional formulas Using functions in conditional formatting Count functions COUNT COUNTA COUNTBLANK Formula auditing Using the auditing facility Tracing how formulas are made up Tracing precedents and dependants Evaluating formulas Error checking Showing formulas on a sheet

Excel - Mastering Formulas and Functions
Delivered in Horsham or OnlineFlexible Dates
Price on Enquiry

Introduction to MongoDB for DBAs (TTDB4680)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This introductory-level course is for experienced DBAs who will be working with MongoDB. In order to gain the most from this course you should have: Prior practical experience in Database Administration Experience working with Linux and be comfortable working with command line Overview This skills-focused course is approximately 50% hands-on. Our engaging instructors and mentors are highly experienced practitioners who bring years of current 'on-the-job' experience into every classroom. Working in a hands-on learning environment, guided by our expert team, attendees will explore: The MongoDB Basic Architecture and Installation MongoDB administration User Management MongoDB security Indexes Backup & Recovery High Availability / Replication Diagnostics & Troubleshooting MongoDB is fast becoming the database of choice for big data applications, being one of the most popular and widely implemented NoSQL databases. Its scalability, robustness, and flexibility have made it extremely popular among business enterprises who use it to implement a variety of activities including social communications, analytics, content management, archiving and other activities. This has led to an increased demand for MongoDB administrators who have the skills to handle cross functional duties. Geared for experienced DBAs, MongoDB for DBAs is a three-day hands-on course that explores the concepts, architecture and pitfalls of managing a MongoDB installation. This course is targeted to the DBA who is familiar with the concepts and tasks of working with a Relational database and is not responsible for a NoSQL MongoDB database. You will learn the critical aspects of MongoDB and use it to solve data management challenges. You will learn to manage MongoDB effectively by gaining expertise in MongoDB administration tools, syntax, MongoDB installations, configurations, security, troubleshooting, backup, scaling and many other features. The focus of this course is on practical skills and applying the DBA existing database knowledge to a MongoDB installation. Introduction to MongoDB Basic Architecture and Installation Differentiate database categories Learn MongoDB design goals List MongoDB tools Describe JSON and BSON Understanding the basic concepts of a Database Database categories: What is NoSQL? Why NoSQL? Benefit over RDBMS Types of NoSQL Database, and NoSQL vs. SQL Comparison, ACID & Base Property CAP Theorem, implementing NoSQL and what is MongoDB? Graph Database Overview of MongoDB, Design Goals for MongoDB Server and Database, MongoDB tools Understanding the following: Collection, Documents and Key/Values, etc., Introduction to JSON and BSON documents Environment setup (live Handson) and using various MongoDB tools available in the MongoDB Package MongoDB Administration Take database backup and restore MongoDB© Export and import data from/ to a MongoDB© instance Check server status and DB status Monitor various resource utilization of a mongod instance Understand various optimization strategies Administration concepts in MongoDB Monitoring issues related to Database Monitoring at Server, Database, Collection level, and various Monitoring tools related to MongoDB Database Profiling, Locks, Memory Usage, No of connections, page fault etc., Backup and Recovery Methods for MongoDB Export and Import of Data to and from MongoDB Run time configuration of MongoDB Production notes/ best practices Data Managements in MongoDB (Capped Collections/ Expired data from TTL), TTL Collection Features GridFS Memory-Mapped Files Journaling Mechanics Storage Engines Power of 2-Sized Allocations No Padding Allocation Strategy Diagnosing Performance Issues Optimization Strategies for MongoDB Configure Tag Sets for Replica Set. Optimize Query Performance Monitoring Strategies for MongoDB . MongoDB Utilities MongoDB Commands MongoDB Management Service (MMS) Data Backup Strategies in MongoDB Copying Underlying Data Files Backup with MongoDump Fsync and Lock MongoDB Ops Manager Backup Software Security Strategies in MongoDB Authentication Implementation in MongoDB . Authentication in a Replica set Authentication on Sharded Clusters Authorization End-to-End Auditing for Compliance User Management Create a User Administrator. Add a User to a Database. Create/Assign User a Role. Verify/Modify a User Access/Privileges. Change a User?s Password MongoDB Security Knowing security concepts in MongoDB Understand how Authentication and Authorisation works Security Introduction Security Concepts Indexes Index Introduction, Index Concepts, Index Types Index Properties Index Creation and Indexing Reference Introduction to Aggregation Aggregation Approach to Aggregation sort Order Pipeline Operators and Indexes Text Indexes Aggregate Pipeline Stages Text Search MapReduce Index Creation Aggregation Operations Index Creation on Replica Set Remove, Modify, and Rebuild Indexes Listing Indexes Measure Index Use Control Index Use Index Use Reporting Geospatial Indexes MongoDB?s Geospatial Query Operators GeoWith Operator Backup & Recovery Import and Export MongoDB Data Restore and recovery of MongoDB(Including point in time Recovery) Restore a Replica Set from MongoDB Backups Recover Data after an Unexpected Shutdown Backup and Restore with Filesystem Snapshots Back Up and Restore with MongoDB Tools Backup and Restore Sharded Clusters High Availability (Replication ) Understand the concept of Replication in MongoDB© ? Create a production like Replica Set Introduction to Replication (High Availability), Concepts around Replication What is Replica Set and Master Slave Replication? Type of Replication in MongoDB How to setup a replicated cluster & managing replica sets etc., Master-Slave Replication Replica Set in MongoDB Automatic Failover Replica Set Members Write Concern Write Concern Levels Write Concern for a Replica Set Modify Default Write Concern Read Preference Read Preference Modes Blocking for Replication Tag Set Configure Tag Sets for Replica set. Replica Set Deployment Strategies . Replica Set Deployment Patterns Oplog File Replication State and Local Database, Replication Administration Diagnostics & Troubleshooting Troubleshoot slow queries Diagnose connectivity problems Understand diagnostic tools Learn common production issues Learn fixes and solutions. Additional course details: Nexus Humans Introduction to MongoDB for DBAs (TTDB4680) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Introduction to MongoDB for DBAs (TTDB4680) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Introduction to MongoDB for DBAs (TTDB4680)
Delivered OnlineFlexible Dates
Price on Enquiry