• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

2634 Business courses near Harpole delivered Live Online

A Manager's Guide To Challenging Conversations and How to Have Them Well

By Happy Human Training

Wanna learn something simple yet so amazing that it's going to blow your mind? Good, because this little workshop's a gem. Join Happy Human Training's Cami Rose as she shares her decades of experience as a counsellor and coach with an introduction to the power of noticing and the crucial role it can play in helping us better manage our day to day stresses, challenges and relationships.

A Manager's Guide To Challenging Conversations and How to Have Them Well
Delivered OnlineFlexible Dates
£30

MS-203T00 Microsoft 365 Messaging

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The Messaging Administrator deploys, configures, manages, and troubleshoots recipients, permissions, mail protection, mail flow, and public folders in both on-premises and cloud enterprise environments. Responsibilities include managing message hygiene, messaging infrastructure, and hybrid configuration and migration. To implement a secure hybrid topology that meets the business needs of a modern organization, the Messaging Administrator must collaborate with the Security Administrator and Microsoft 365 Enterprise Administrator. The Messaging Administrator should have a working knowledge of authentication types, licensing, and integration with Microsoft 365 applications. Overview After completing this course, students will be able to: Configure and manage the transport pipeline Manage and troubleshoot mail flow and transport issues Manage message hygiene and compliance Manage authentication for messaging Configure organizational settings and sharing Manage mobile devices Manage role-based permissions Create and manage recipient objects and resources Plan, implement, and troubleshoot public folders Plan a hybrid environment Perform mailbox migrations Deploy and troubleshoot a hybrid environment This course examines the key elements of Microsoft 365 messaging administration, including message transport and mail flow, messaging security, hygiene, and compliance, messaging infrastructure, and hybrid messaging. This course is designed for IT Professionals who deploy and manage the messaging infrastructure for Microsoft 365 in their organization. Managing the Transport Pipeline Overview of Transport Services Configuring Message Transport Managing Transport Rules Managing and Troubleshooting Mail Flow Managing Mail Flow Troubleshooting Mail Flow Troubleshooting Transport Issues Troubleshooting with Logs Managing Message Hygiene Planning for Message Hygiene Managing Anti-Malware and Anti-Spam Policies Managing Advanced Threat Protection Managing Compliance Messaging Compliance in the SCC Messaging Compliance in Exchange Managing Exchange Online Archiving and Auditing Managing Content Search Managing Organizational Settings Managing Authentication for Messaging Configuring Organizational Settings Configuring Organizational Sharing Managing Mobile Devices Mobile Device Mailbox Policies Managing Mobile Device Access Managing Role-Based Permissions Managing Admin Roles Managing User Roles Exchange Setup - RBAC and AD Split Permission Managing Recipient Objects and Resources Exchange Recipients Creating and Managing Exchange Recipients Managing Email Addresses, Lists, and Resources Managing Public Folders Planning the Public Folder Hierarchy Implementing and Managing Public Folders Troubleshooting Public Folders Planning a Hybrid Environment Exchange Hybrid Deployment Requirements Planning to Run the Hybrid Configuration Wizard Performing Mailbox Migrations Planning Mailbox Migrations Performing IMAP Migrations Performing Cutover and Staged Migrations Performing Advanced Migrations Deploying and Troubleshooting a Hybrid Environment Deploying and Managing an Edge Transport Server Configuring a Hybrid Deployment using the HCW Implementing Advanced Hybrid Functionality Troubleshooting Hybrid Deployments

MS-203T00 Microsoft 365 Messaging
Delivered OnlineFlexible Dates
Price on Enquiry

EC-Council Certified Threat Intelligence Analyst (C|TIA)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Organizations today demand a professional-level cybersecurity threat intelligence analyst who can extract the intelligence from data by implementing various advanced strategies. Such professional-level programs can only be achieved when the core of the curricula maps with and is compliant to government and industry published threat intelligence frameworks. Ethical Hackers Security Practitioners, Engineers, Analysts, Specialist, Architects, and Managers Threat Intelligence Analysts, Associates, Researchers, Consultants Threat Hunters SOC Professionals Digital Forensic and Malware Analysts Incident Response Team Members Any mid-level to high-level cybersecurity professionals with a minimum of 2 years of experience. Individuals from the information security profession and who want to enrich their skills and knowledge in the field of cyber threat intelligence. Individuals interested in preventing cyber threats. Overview This program will benefit students who are looking to build effective threat intelligence for their organization in order to combat modern-day cyber-attacks and prevent future attacks. Certified Threat Intelligence Analyst (C|TIA) is designed and developed in collaboration with cybersecurity and threat intelligence experts across the globe to help organizations identify and mitigate business risks by converting unknown internal and external threats into known threats. It is a comprehensive, specialist-level program that teaches a structured approach for building effective threat intelligence. Introduction to Threat Intelligence Understanding Intelligence Understanding Cyber Threat Intelligence Overview of Threat Intelligence Lifecycle and Frameworks Cyber Threats and Kill Chain Methodology Understanding Cyber Threats Understanding Advanced Persistent Threats (APTs) Understanding Cyber Kill Chain Understanding Indicators of Compromise (IoCs) Requirements, Planning, Direction, and Review Understanding Organization?s Current Threat Landscape Understanding Requirements Analysis Planning Threat Intelligence Program Establishing Management Support Building a Threat Intelligence Team Overview of Threat Intelligence Sharing Reviewing Threat Intelligence Program Data Collection and Processing Overview of Threat Intelligence Data Collection Overview of Threat Intelligence Collection Management Overview of Threat Intelligence Feeds and Sources Understanding Threat Intelligence Data Collection and Acquisition Understanding Bulk Data Collection Understanding Data Processing and Exploitation Data Analysis Overview of Data Analysis Understanding Data Analysis Techniques Overview of Threat Analysis Understanding Threat Analysis Process Overview of Fine-Tuning Threat Analysis Understanding Threat Intelligence Evaluation Creating Runbooks and Knowledge Base Overview of Threat Intelligence Tools Intelligence Reporting and Dissemination Overview of Threat Intelligence Reports Introduction to Dissemination Participating in Sharing Relationships Overview of Sharing Threat Intelligence Overview of Delivery Mechanisms Understanding Threat Intelligence Sharing Platforms Overview of Intelligence Sharing Acts and Regulations Overview of Threat Intelligence Integration

EC-Council Certified Threat Intelligence Analyst (C|TIA)
Delivered OnlineFlexible Dates
Price on Enquiry

Outlook - advanced (In-House)

By The In House Training Company

This one-day workshop is intended for participants who have a basic understanding of Outlook but who want to know how to use its advanced features to manage their email communications, calendar events, contact information and other communication tasks. This course will help participants: Gain confidence using Outlook and its advanced features Organise and prioritise email messages Archive messages for safe-keeping Use rules to process received or sent messages automatically Manage scheduled meetings with others Give others permission to view and manage their folders and items Use contacts and commands to find out more about a person or company Prioritise work-flow using tasks and assigning tasks to others 1 Email messages Combining multiple clicks with quick steps Following up flag options Saving multiple attachments Attaching a folder of files Recalling and replacing a message Categorising messages with conditional formatting 2 Message options Adding options to messages Marking a message as private Receiving quick responses with voting buttons Directing replies to specific users Delaying sent messages Inserting links in messages 3 Stay organised with rules Using rules to automate message flow Moving messages with rules Using the rules wizard Setting up rules with conditions Using rules that work whilst you are away 4 Message clean-up Using conversation clean-up Using mailbox clean-up Moving messages to the archive folder Archiving folder properties Auto-archiving properties 5 Managing calendars Creating calendar groups Sharing calendars with permissions Setting up working days and times Managing time zones Categorise appointments with conditional formatting Publishing a calendar 6 Schedule meetings Scheduling a meeting Managing meeting responses Proposing new meeting times Adding attendees to a meeting Viewing multiple appointments 7 Using contacts Merging contacts to letters Merging contacts to labels Mail merging contacts in Word Exporting contacts to Excel 8 Managing tasks Organising your workload with tasks Categorising tasks Assigning tasks to others Sending a task status report Allocating time for tasks Regenerating a new task Viewing your tasks in the calendar 9 Adding message items Adding calendars to messages Adding business cards to messages 10 Email accounts Adding multiple user accounts Adding account permissions

Outlook - advanced (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry

AN110 IBM Power Systems for AIX I - LPAR Configuration and Planning

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This is an intermediate course for architects, system integrators, security administrators, network administrators, software engineers, technical support individuals, and IBM Business Partners who implement LPARs on IBM Power Systems. Overview Describe important concepts associated with managing POWER7 processor-based systems, such as Logical partitioning (LPAR), dynamic partitioning, virtual devices, virtual processors, virtual consoles, virtual Local Area Network (VLAN), and shared processors Describe the features of the PowerVM Editions. Use the System Planning Tool to plan an LPAR configuration Describe the functions of the HMC Configure and manage the HMC, including users and permissions, software, startup and shutdown, remote access features, network configuration, security features, HMC backup and restore options, and the HMC reload procedure Describe the rules associated with allocating resources, including dedicated processors, processing units for Micro-Partitions, memory, physical I/O for AIX and Linux partitions Configure and manage LPARs using the HMC Graphical User Interface (GUI) and HMC commands Interpret physical and AIX location codes and relate to the key hardware components Power on and power off the POWER7 system Use the HMC to back up and restore partition data In this course, students will learn the skills needed to become an effective administrator on IBM's POWER7-based systems that support Logical Partitioning (LPAR). Day 1 Introduction to partitioning Hardware system overview Hardware Management Console Day 2 Hardware Management Console (cont.) System Planning Tool HMC and managed system maintenance System power management Planning and configuring logical partitions Day 3 Planning and configuring logical partitions (cont.) Partition operations Dynamic resource allocation Exercise 9 Additional course details: Nexus Humans AN110 IBM Power Systems for AIX I - LPAR Configuration and Planning training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AN110 IBM Power Systems for AIX I - LPAR Configuration and Planning course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

AN110 IBM Power Systems for AIX I - LPAR Configuration and Planning
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco NSO Essentials for Programmers and Network Architects v4.1 (NSO201)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is designed primarily for network and software engineers who are interested in learning about automation and programmability and hold the following job roles: Network administrators Solutions designers System installers System integrators System administrators Overview After completing this course, you should be able to: Explain the transactional service activation and how it relates to business requirements Explain how Cisco NSO communicates with network devices Understand the NETCONF protocol and be able to read and write simple YANG models Understand the difference between devices that are fully NETCONF capable and those that are less or not NETCONF capable Understand the support for candidate configuration and confirmed commit support Use logs to troubleshoot the Cisco NSO deployment and check NSO communication with network devices Explain the YANG service model structure Design a real-world usable service Explain the mapping logic of service parameters to device models and consequently to device configurations Describe the use of different integration options and APIs Explain how to implement action with use of config-templates in NSO package Explain the use of Reactive FASTMAP in for manipulating and implementing advanced NFV components Describe the use of feature components and function packs Define and explain the ETSI MANO principles and solution Work with the alarm console, and understand the NSO alarm structure and how it conforms to modern network operations procedures Describe Cisco NSO 5.3 new features and changes in NSO The NSO Essentials for Programmers and Network Architects (NSO201) v4.1 course introduces you to Cisco Network Services Orchestrator (NSO). You will learn to install Cisco NSO and use it to manage devices and create services based on YANG templates with XPath. This course provides an overview of NSO as a network automation solution as well as introducing you to NETCONF, YANG, and XPath. You will learn about managing devices and creating device templates, service management and service package creation, network element drivers, interfacing with other systems using APIs, configuring and troubleshooting system settings, managing alarms and reporting, configuring NSO for scalability and performance, and capabilities that can be added to Cisco NSO. Course Outline Introducing Service Orchestration with Cisco NSO Exploring Cisco NSO Architecture Orchestrating Network Solutions Describing Cisco NSO Operation Installing Cisco NSO Exploring the Advantages of NETCONF Managing Devices Using the Device Manager Creating YANG Models Using Services Implementing Services with Model-to-Model Mapping Designing Services in Cisco NSO Managing the Service Lifecycle Programming with Python in Cisco NSO Configuring and Troubleshooting System Settings Discovering Cisco NSO Northbound APIs Managing Alarms and Reporting Configuring Cisco NSO for Scalability and Performance Describing Cisco NSO VNF Manager and Function Packs

Cisco NSO Essentials for Programmers and Network Architects v4.1 (NSO201)
Delivered OnlineFlexible Dates
Price on Enquiry

Italian Private Tuition

4.9(26)

By Tertulia Language | Courses & Private Tuition

Learn Italian with Tertulia Language

Italian Private Tuition
Delivered in Emsworth + 4 more or OnlineFlexible Dates
£34

Spanish Private Tuition

4.9(26)

By Tertulia Language | Courses & Private Tuition

Learn Spanish with Tertulia Language

Spanish Private Tuition
Delivered in Emsworth + 4 more or OnlineFlexible Dates
£34

Implementing AI in Software Testing | AI in Test Automation (TTAI2140)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course is intended for software testers, architects, engineers, or other related roles, who wish to apply AI to software testing practices within their enterprise. While there are no specific pre-requisites for this course, it would be helpful is the attendee has familiarity with basic scripting (Python preferred) and be comfortable with working from the command line (for courses that add the optional hands-on labs). Attendees without basic scripting skills can follow along with the hands-on labs or demos. Overview This course introduces AI and related technologies from a practical applied software testing perspective. Through engaging lecture and demonstrations presented by our expert facilitator, students will explore: Exploring AI Introduction to Machine Learning Introduction to Deep Learning Introduction to Data Science Artificial Intelligence (AI) in Software Testing Implementing AI in Test Automation Innovative AI Test Automation Tools for the Future Implementing AI in Software Testing / AI in Test Automation is an introductory-level course for attendees new to AI, Machine Learning or Deep Learning who wish to automate software testing tasks leveraging AI. The course explores the essentials of AI, ML and DL and how the integrate into IT business operations and initiatives. Then the course moves to specifics about the skills, techniques and tools used to apply AI to common software testing requirements. Exploring AI AI-Initiatives The Priority: Excellence AI- Intelligence Types The Machine Learning Types The Quality Learning Initiative The Inception in Academics AI - Importance & Applications The Re-visit Learning Re-visited via AI Teaching in the world of AI Exploring AI for Self-Development AI In Academics Beyond Academics Introduction to Machine Learning What is Machine Learning? Why Machine Learning? Examples - Algorithms behind Machine Learning Introduction to Deep Learning What is Deep Learning? Why Deep Learning? Example - Deep Learning Vs Machine Learning Introduction to Data Science What is Data Science? Why Data Science? Examples - Use Cases of Data Science Artificial Intelligence (AI) in Software Testing What is AI in Software Testing? The Role of AI Testing Why do we Need AI in Software Testing? Pros and Cons of AI in Software Testing Applications of AI in Software Testing Is it time for Testers or QA Teams to worry about AI? Automated Testing with Artificial Intelligence Implementing AI in Test Automation Training the AI Bots Challenges with AI-powered Applications Examples - Real World use cases using Artificial Intelligence Demo - Facial Emotion Detection Using Artificial Intelligence Demo - Text Analysis API Using Artificial Intelligence Demo - EYE SPY Mobile App Using Artificial Intelligence Innovative AI Test Automation Tools for the Future Tools used for Implementing AI in Automation Testing What is NEXT? AI Test Automation Demo using Testim

Implementing AI in Software Testing | AI in Test Automation (TTAI2140)
Delivered OnlineFlexible Dates
Price on Enquiry

TS619G IBM Spectrum Protect version 8.1.12 Implementation and Administration

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Implementers and administrators who are new to IBM Spectrum Protect data management. Overview Describe the purpose of IBM Spectrum Protect Install and configure the IBM Spectrum Protect components Use the administrative and client interfaces Discuss storage methodology options and create storage pool Customize data movement and retention policies to meet business requirements Configure the IBM Spectrum Protect database and storage pools for protection Optimize client configuration Perform backup, restore, archive and retrieve operations Organize daily tasks required to protect the IBM Spectrum Protect environment Automate and monitor client and administrative tasks and events IBM Spectrum Protect 8.1.12 is a data backup and recovery solution designed to help you manage your data retention, reduce the cost of storage, and provide appropriate recovery point objectives to meet any service level agreement. IBM Spectrum Protect offers improved efficiency and flexibility using object-based data management and policy driven retention.This five-day course will focus on implementation and basic administration of an IBM Spectrum Protect environment. The hands-on lab exercises are performed on a Windows 2016 environment. The course materials include examples of AIX and Linux commands, when different from Windows. Unit 1 Concepts and components Unit 2 Installation and configuration Unit 3 Interfaces and monitoring Unit 4 Storage pools and devices Unit 5 Policy management, data movement, and expiration Unit 6 Server database and storage pool management Unit 7 Client configuration and management Unit 8 Client data protection Unit 9 Daily operations and maintenance Unit 10 Schedules and reports Additional course details: Nexus Humans TS619G IBM Spectrum Protect version 8.1.12 Implementation and Administration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the TS619G IBM Spectrum Protect version 8.1.12 Implementation and Administration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

TS619G IBM Spectrum Protect version 8.1.12 Implementation and Administration
Delivered OnlineFlexible Dates
Price on Enquiry