This 1 day course is designed for the end user who is using or will use Office 365. This course will provide delegates with the knowledge and skills to efficiently use Office 365 on a day-to-day basis. The course is designed with real world scenarios in mind. Delegates will learn how to use Outlook Online, Skype for Business, OneDrive for Business, SharePoint Online, and OneNote. At the end of this course delegates will be able to effectively navigate Office 365 and make use of all of the features of Office 365 Office 365 Overview Introducing Cloud Computing Identify and Outline the Component Products in Office 365 including Outlook Web App, Office Online Apps, OneDrive and Skype for Business Navigating around Office 365 Customising the Office 365 Nav Bar Updating your Profile in Office 365 Using the Outlook Online Application Overview of Outlook Online Working with Email and Folders Outlook People and IM Contacts Using the Calendar Shared Calendars Outlook Tasks in the Web App Setting Outlook Options, Signatures, Automatic Replies and Rules Using Skype for Business Overview of Skype for Business Viewing and Setting Presence Status Using Instant Messages in Business Understanding the Interactive Contact Card in Microsoft Office Applications Integration with Outlook Using Skype for Business for Online Presentations including Content Sharing, Polls and a Virtual Whiteboard Working with OneDrive for Business What is OneDrive for Business? Navigating around OneDrive Accessing Content in OneDrive Using the Office Online Apps Sharing Documents and Collaborating Connecting Microsoft Office to OneDrive Creating Office Documents and Saving Directly to OneDrive Using Groups and Delve Introduction to Groups Collaborating using Groups Getting to Content using Delve Requirements Requirements Before attending this course, students must have: Basic understanding of Microsoft Office Basic understanding of Microsoft Windows Operating systems
UNIX shell programming training course description This course has been designed as a follow on course for the XML primer course. The course looks at the use of XSLT in the transforming and styling XML documents. What will you learn Read shell scripts. Write shell scripts. Use different types of quotes. Recognise the role of shell scripts within the UNIX system. UNIX shell programming training course details Who will benefit: Programmers developing programs under UNIX. Anyone working with XML. Administrators Support personnel who wish to find out more about the workings of UNIX or write simple utility programs. Prerequisites: UNIX fundamentals Some programming experience would be useful although not essential. Duration 2 days UNIX shell programming training course contents Review of UNIX fundamentals Basic shell scripts What does the shell do? How are commands executed? Different shells. What is a shell script? Comments, creating shell scripts. Variables Setting variables, using variables, set, scope, export, sourcing, environmental variables, read. Positional parameters 0 to $9, $#, $* and others. shift parameter substitution. Control statements The test command, The if statement, while loops, for loops, The case statement, Special characters, Redirection of errors, here documents, quoting. Arithmetic in shell scripts The expr command. System shell scripts Screen handling The terminfo database The tput comand Avanced issues (optional session) Shell functions, getopts, xargs, debugging shell scripts, portability issues. Extras in the Korn shell. Optimising shell scripts The time command, performance tips.
Cyber security training course description This cyber security course focusses on the network side of security. Technologies rather than specific products are studied focussing around the protection of networks using firewalls and VPNs. What will you learn Describe: - Basic security attacks - RADIUS - SSL - VPNs Deploy firewalls and secure networks Explain how the various technologies involved in an IP VPN work. Describe and implement: - L2TP - IPsec - SSL - MPLS, L3, VPNs. Cyber security training course details Who will benefit: Anyone working in the security field. Prerequisites: TCP/IP foundation for engineers Duration 5 days Cyber security training course contents Security review Denial of service, DDOS, data manipulation, data theft, data destruction, security checklists, incident response. Security exploits IP spoofing, SYN attacks, hijacking, reflectors and amplification, keeping up to date with new threats. Hands on port scanning, use a 'hacking' tool. Client and Server security Windows, Linux, Log files, syslogd, accounts, data security. Hands on Server hardening. Firewall introduction What is a firewall? Firewall benefits, concepts. HAnds on launching various attacks on a target. Firewall types Packet filtering, SPI, Proxy, Personal. Software firewalls, hardware firewalls. Firewall products. Hands on Simple personal firewall configuration. Packet filtering firewalls Things to filter in the IP header, stateless vs. stateful filtering. ACLs. Advantages of packet filtering. Hands on Configuring packet filtering firewalls. Stateful packet filtering Stateful algorithms, packet-by-packet inspection, application content filtering, tracks, special handling (fragments, IP options), sessions with TCP and UDP. Firewall hacking detection: SYN attacks, SSL, SSH interception. Hands on SPI firewalls. Proxy firewalls Circuit level, application level, SOCKS. Proxy firewall plusses and minuses. Hands on Proxy firewalls. Firewall architectures Small office, enterprise, service provider, what is a DMZ? DMZ architectures, bastion hosts, multi DMZ. Virtual firewalls, transparent firewalls. Dual firewall design, high availability, load balancing, VRRP. Hands on Resilient firewall architecture. Testing firewalls Configuration checklist, testing procedure, monitoring firewalls, logging, syslog. Hands on Testing firewalls. Encryption Encryption keys, Encryption strengths, Secret key vs Public key, algorithms, systems, SSL, SSH, Public Key Infrastructures. Hands on Password cracking. Authentication Types of authentication, Securid, Biometrics, PGP, Digital certificates, X.509 v3, Certificate authorities, CRLs, RADIUS. Hands on Using certificates. VPN overview What is a VPN? What is an IP VPN? VPNs vs. Private Data Networks, Internet VPNs, Intranet VPNs, Remote access VPNs, Site to site VPNs, VPN benefits and disadvantages. VPN Tunnelling VPN components, VPN tunnels, tunnel sources, tunnel end points, tunnelling topologies, tunnelling protocols, which tunnelling protocol? Requirements of tunnels. L2TP Overview, components, how it works, security, packet authentication, L2TP/IPsec, L2TP/PPP, L2 vs L3 tunnelling. Hands on Implementing a L2TP tunnel. IPsec AH, HMAC, ESP, transport and tunnel modes, Security Association, encryption and authentication algorithms, manual vs automated key exchange, NAT and other issues. Hands on Implementing an IPsec VPN. SSL VPNs Layer 4 VPNs, advantages, disadvantages. SSL. TLS. TLS negotiation, TLS authentication. TLS and certificates. Hands on Implementing a SSL VPN. MPLS VPNs Introduction to MPLS, why use MPLS, Headers, architecture, label switching, LDP, MPLS VPNs, L2 versus L3 VPNs. Point to point versus multipoint MPLS VPNs. MBGP and VRFs and their use in MPLS VPNs. Hands on Implementing a MPLS L3 VPN. Penetration testing Hacking webservers, web applications, Wireless networks and mobile platforms. Concepts, threats, methodology. Hands on Hacking tools and countermeasures.
Copper cabling systems training course description A hands on training course covering installation, termination and testing of copper cables in an internal environment. The course covers all copper cabling but hands on sessions focus on unshielded Twisted Pair. What will you learn Recognise different copper cables and when to use them. Install and terminate UTP cables. Test and certify UTP cables. Copper cabling systems training course details Who will benefit: Professional cable installers. Prerequisites: None Duration 2 days Copper cabling systems training course contents Communications principles Use of cables in data networks, Use of cables in telephone networks, conductors and insulators, current, resistance, voltage and Ohms law. Copper cabling per cabling Coaxial versus twisted pair. UTP and STP. Cat 5, 5e, 6 and 7. Straight through, cross over, others. Hands on: Building a simple network. Cable termination Cable termination Preparing cables for termination, termination techniques, termination tools. Wiring standards, colour codes. Hands on: Making your own cables and using them in the simple network. Cable architectures Structure cabling system components, topologies, horizontal wiring, vertical wiring, telecomms rooms, server rooms. Hubs, switches and routers implications. Trunking. Cabling documentation, symbols and abbreviations. Hands on: punch blocks, testing continuity. Cable installation Site surveys: pathways and spaces, support structures, distance limitations. Recommended installation practices, laying and setup, retrofits. Health and safety factors, fire and building codes. Hands on: Performing a site survey, installing cable with floor boxes. Testing Basic testing, volt meters, tone set, Cat 5 testers, Cat 5e testers, Cat 6 testers. Certifying performance, Cat 5, 5e and 6 performance parameters. External factors. Common faults. Hands on: Testing an installation, troubleshooting faults. Other aspects Telephony cables, shielded cables. Hands on: installing telephone cable, testing continuity.
NPORS Report of Thorough Examination (N019)
About this Training Course Materials Management is an essential link in the Supply Chain process. It takes an even bigger significance in the Upstream industry when the cost of a rupture in equipment or stock can be tremendous, without even considering the cost of the equipment itself. The downside may result in the accumulation of out-of-commission materials which leads to business inefficiency. What does it take to maintain efficient Materials Management? This 3 full-day course will explain more in detail. This course can also be offered through Virtual Instructor Led Training (VILT) format. Training Objectives At the end of this course, participants will be able to: Understand the importance of an efficient Materials Management in the Supply Chain process Examine the control and validation of Stock processes Understand the role of the Duet and work within the Stock Duet in materials management Learn about the key factors in Stock optimisation Target Audience This course will benefit all personnel involved in Supply Chain including Stock Controllers, Cost Controllers, Buyers, Logisticians and those from the technical department such as Technical Administrators and members of the duet. Course Level Basic or Foundation Trainer Your expert course leader has 25 years of experience in management positions in Contracting, Procurement and Logistics, mainly in the Oil & Gas Industry. He was a Lecturer for IFP Training for 5 years. During his Oil & Gas industry experience, he has worked on major Oil and Gas development projects like the Yadana project in Myanmar, Akpo project in Nigeria and YLNG in Yemen. His international experience allows him to adapt very easily and integrate the multicultural specificities of the Oil & Gas industry in his teaching. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations
This first aid course is designed for people who have a specific interest or responsibility at work or in voluntary and community activities, such as a first aider, in being able to provide basic life support (BLS) when dealing with an emergency situation that may involve the use of an automated external defibrillator (AED).
Basic Life Support (BLS) and Safe use of AED training
CCNP training course description The Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR) v1.2 course provides the knowledge and skills needed to configure, troubleshoot, and manage enterprise wired and wireless networks. You'll learn to implement security principles within an enterprise network and how to overlay network design using solutions such as SDAccess and SD-WAN. Course content includes 3 days of self-study material. This course helps you prepare for the 350-401 Implementing Cisco Enterprise Network Core Technologies (ENCOR) exam What will you learn Configure, troubleshoot, and manage enterprise wired and wireless networks Implement security principles within an enterprise network Prepare you prepare to take the 350-401 Implementing Cisco Enterprise Network Core Technologies (ENCOR) exam CCNP training course details Who will benefit: Mid-level network engineers, Network administrators, Network support technicians, Help desk technicians. Prerequisites: Implementation of Enterprise LAN networks. Basic understanding of Enterprise routing and wireless connectivity, and Python scripting Duration 5 days CCNP training course content Cisco Enterprise Network Architecture: Access, distribution, core in the hierarchical network. Cisco Switching Paths: Switching mechanisms, TCAM, CAM, process switching, fast switching, and CEF. Implementing Campus LAN Connectivity: Troubleshoot L2 connectivity using VLANs and trunkingBuilding Redundant Switched Topology: STP Implementing Layer 2 Port Aggregation Troubleshoot link aggregation using Etherchannel EIGRP Implement and optimize OSPFv2/v3, including adjacencies, packet types, and areas, summarization, and route filtering for IPv4/v6 Implement EBGP interdomain routing, path selection, and single and dual-homed networkingImplementing Network Redundancy: HSRP and VRRP Implement static and dynamic NAT Virtualization Protocols and TechniquesVPNs and Interfaces: Overlay technologies such as VRF, GRE, VPN, and LISP Wireless Principles: RF, antenna characteristics, and wireless standards.Wireless Deployment: Models available, autonomous AP deployments and cloud-based designs within the centralized Cisco WLC architecture Wireless Roaming and Location ServicesWireless AP Operation: How APs communicate with WLCs to obtain software, configurations, and centralized managementWireless Client Authentication: EAP, WebAuth, and PSK wireless client authentication on a WLC. Troubleshoot wireless client connectivity issues using various available tools Troubleshoot networks using services such as NTP, SNMP, Cisco IP SLAs, NetFlow, and Cisco IOS EEM Explain network analysis and troubleshooting tools, which include show and debug commands, as well as best practices in troubleshootingMulticast Protocols: IGMP v2/v3, PIM DM/SM and RPs Introducing QoS: Concepts and features. Implementing Network Services: Secure administrative access for Cisco IOS devices using CLI access, RBAC, ACL, and SSH, and device hardening concepts to secure devices from less secure applications Using Network Analysis ToolsInfrastructure Security: Scalable administration using AAA and the local database, features and benefits Enterprise Network Security Architecture: VPNs, content security, logging, endpoint security, personal firewalls, and other security features. Automation and Assurance with Cisco DNA Center: Purpose, function, features, and workflow. Intent-Based Networking, for network visibility, proactive monitoring, and application experienceCisco SD-Access Solution: Nodes, fabric control plane, and data plane, VXLAN gatewaysCisco SD-WAN Solution: Components and features of Cisco SD-WAN solutions, including the orchestration, management, control, and data planesBasics of Python Programming: Python components and conditionals with script writing and analysis Network Programmability: NETCONF and RESTCONF APIs in Cisco DNA Center and vManage Labs: Investigate the CAM. Analyze CEF. Troubleshoot VLAN and Trunk Issues. Tuning STP and Configuring RSTP. Configure MSTP. Troubleshoot EtherChannel. Implement Multi-area OSPF. Implement OSPF Tuning. Apply OSPF Optimization. Implement OSPFv3. Configure and Verify Single-Homed EBGP. Implementing HSRP. Configure VRRP. Implement NAT. Configure and Verify VRF. Configure and Verify a GRE Tunnel. Configure Static VTI Point-to-Point Tunnels. Configure Wireless Client Authentication in a Centralized Deployment. Troubleshoot Wireless Client Connectivity Issues. Configure Syslog. Configure and Verify Flexible NetFlow. Configuring Cisco IOS EEM. Troubleshoot Connectivity and Analyze Traffic with Ping, Traceroute, and Debug. Configure and Verify Cisco IP SLAs. Configure Standard and Extended ACLs. Configure Control Plane Policing. Implement Local and Server-Based AAA. Writing and Troubleshooting Python Scripts. Explore JSON Objects and Scripts in Python. Use NETCONF Via SSH. Use RESTCONF with Cisco IOS XE.
Are you already foundation-qualified and ready to take your aesthetics career to the next level? Dive deeper with our 2-Day Top-Up Course and unlock advanced techniques that will set you apart! The course will include: - Advanced level basic Botulinum toxin type A training - Advanced level basic Dermal filler training - Complications management L7 - Safe practice in medicine L7 Learners will require 1 model for day 2 (Dermal filler) - Jaw - Chin - Cheeks - Nose Step up your career with training from an established provider committed to your growth and success in the aesthetics industry. Become the go-to advanced aesthetics professional your client’s trust!