• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

22198 Business courses delivered Online

BOHS P904 - Management and control in leisure, display, therapy and other non-industrial systems Online

By Airborne Environmental Consultants Ltd

BOHS P904 - Management and control in leisure, display, therapy and other non-industrial systems is there to provide background and an overview of the risk of Legionella infection and how it can be controlled in leisure, display, therapy and other non-industrial water systems. It is a requirement of this course that candidates have successfully completed P901- Legionella- Management and Control of Building Hot and Cold Water Services [Syllabus GM.1]. Where both P901 and P904 courses are run on subsequent days or as a combined course then this pre-requirement is waived.

BOHS P904 - Management and control in leisure, display, therapy and other non-industrial systems Online
Delivered in Manchester + 1 more or OnlineFlexible Dates
Price on Enquiry

ISO 31000 Risk Manager

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Risk managersBusiness Process OwnersBusiness Finance ManagersBusiness Risk ManagersRegulatory Compliance ManagersProject ManagementPersons responsible for information security or conformity within an organization Overview To understand the concepts, approaches, methods and techniques allowing an effective risk managementaccording to ISO 31000To understand the relationship between the risk management and the compliance with the requirements ofdifferent stakeholders of an organizationTo acquire the competence to implement, maintain and manage an ongoing risk management program accordingto ISO 31000To acquire the competence to effectively advise organizations on the best practices in risk management In this three-day intensive course participants develop the competence to master a model for implementing risk management processes throughout their organization using the ISO 31000:2009 standard as a reference framework. Day 1 Introduction to the Risk Management framework according to ISO 31000 Concepts and definitions related to Risk Management Risk Management standards, frameworks and methodologies Implementation of a Risk Management framework Understanding an organization and its context Day 2 Risk identification and assessment, risk evaluation, treatment, acceptance, communication and surveillance according to ISO 31000 Risk identification Risk analysis and risk evaluation Risk treatment Risk acceptance and residual risk management Risk communication and consultation Risk monitoring and review Day 3 Risk assessment methodologies according to ISO 31000 and Certification Exam Presentation of risk assessment methodologies Certification Exam

ISO 31000 Risk Manager
Delivered OnlineFlexible Dates
Price on Enquiry

CE131 IBM DB2 SQL Workshop for Experienced Users

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This intermediate course is for experienced SQL end users, application programmers, database administrators, and user support staff who need more advanced knowledge of SQL. Overview Discuss basic relational database concepts Use some of the OLAP features of DB2, such as GROUPing and RANKing functions Create tables, views and indexes Use referential integrity, check constraints and triggers Use outer joins, and join tables to themselves Use CASE expressions, and the CAST function Identify the impact of Summary Tables, Materialized Query Tables, and temporary tables Use complex subqueries Use a greater number of scalar SQL functions Use advanced SQL constructs, such as recursive SQL and table expressions Define User-Defined Distinct Types and User-Defined Functions Avoid several of the most common causes for poorly-performing SQL This course teaches you how to make use of advanced SQL techniques to access DB2 databases in different environments. This course is appropriate for customers working in all DB2 environments, specifically for z/OS, Linux, UNIX, and Windows. Introduction Identify the purpose of the clauses in the SELECT statement Describe the key differences among the IBM DB2 platforms Describe and use some of the OLAP features of DB2, such as GROUPING functions like CUBE and ROLLUP, and the RANK, DENSE_RANK and ROW_NUMBER functions Create Objects Code statements to: Create tables and views, Alter tables, Create indexes, Implement referential integrity (RI), and Define triggers and check constraints Identify impacts and advantages of referential integrity, including impacts of delete rules Identify considerations when using triggers and check constraints Define and make use of INSTEAD OF triggers Join Retrieve data from more than one table via inner and outer joins Use outer joins (LEFT, RIGHT, FULL) Use ANTI JOINS Join a table to itself Use UNION and UNION ALL Use EXCEPT and INTERCEPT CASE, CAST, Summary Tables, and Materialized Query Tables Identify when CASE expressions can be used Code CASE expressions in SELECT list and in the WHERE clause Identify when CAST specifications can be used Identify the advantages of using Summary (Materialized Query) Tables and Temporary tables Identify the advantages of using Materialized Query Tables (MQTs) Identify when and how to use Temporary tables Using Subqueries Code subqueries using the ALL, ANY/SOME, and EXISTS keywords Code correlated subqueries Choose the proper type of subquery to use in each case Scalar Functions Extend your knowledge of scalar functions which: Manipulate arithmetic data, Manipulate date values, and Manipulate character data Examples of scalar functions that are addressed in this course: SUBSTR POSSTR COALESCE/VALUE DECIMAL ROUND DIGITS CHAR DATE/TIME Table Expressions and Recursive SQL Identify reasons for using table expressions and recursive SQL Use nested and common table expressions Identify the difference between views and table expressions Code recursive SQL Control the depth of recursion when coding recursive SQL UDTs/UDFs and Performance Describe the concepts behind User-Defined Types, User-Defined Functions and Stored Procedures Predict when queries will use indexes to get better performance Identify concepts of predicate processing State introductory concepts about index structure State general best practices advice Additional course details: Nexus Humans CE131 IBM DB2 SQL Workshop for Experienced Users training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CE131 IBM DB2 SQL Workshop for Experienced Users course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CE131 IBM DB2 SQL Workshop for Experienced Users
Delivered OnlineFlexible Dates
Price on Enquiry

F5 Configuring BIG-IP APM - Access Policy Manager v13.x

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is intended for network administrators, operators, and engineers responsible for managing the normal day-to-day operation and administration of BIG-IP Access Policy Manager Overview This course provides the skills to create and manage BIG-IP APM system. This course covers three typical deployment scenarios for BIG-IP Access Policy Manager (APM) and is broken into three individual lessons. In lesson one, you learn how to configure BIG-IP APM to provide Active Directory-based authentication for a load-balanced pool of web servers. In lesson two, you learn how to create a policy that provides an SSL VPN (Network Access) resource to users, but only when they log into BIG-IP APM using a corporate-issued PC. Finally, lesson three builds on the first two lessons to create a policy that provides a dynamic landing page with both SSL VPN as well as an OWA (Portal Access) resource, but only to users with special authorization. Setting Up the BIG-IP System Introducing the BIG-IP System Initially Setting Up the BIG-IP System Archiving the BIG-IP Configuration Leveraging F5 Support Resources and Tools Configuring Web Application Access Review of BIG-IP LTM Introduction to the Access Policy Web Access Application Configuration Overview Web Application Access Configuration in Detail Exploring the Access Policy Navigating the Access Policy Managing BIG-IP APM BIG-IP APM Sessions and Access Licenses Session Variables and sessiondump Session Cookies Access Policy General Purpose Agents List Using Authentication Introduction to Access Policy Authentication Active Directory AAA Server RADIUS One-Time Password Local User Database Understanding Assignment Agents List of Assignment Agents Configuring Portal Access Introduction to Portal Access Portal Access Configuration Overview Portal Access Configuration Portal Access in Action Configuring Network Access Concurrent User Licensing VPN Concepts Network Access Configuration Overview Network Access Configuration Network Access in Action Deploying Macros Access Policy Macros Configuring Macros An Access Policy is a Flowchart Access Policy Logon Agents Configuring Logon Agents Exploring Client-Side Checks Client-Side Endpoint Security Exploring Server-Side Checks Server-Side Endpoint Security Agents List Server-Side and Client-Side Checks Differences Using Authorization Active Directory Query Active Directory Nested Groups Configuration in Detail Configuring AppTunnels Application Access Remote Desktop Network Access Optimized Tunnels Landing Page Bookmarks Deploying Access Control Lists Introduction to Access Control Lists Configuration Overview Dynamic ACLs Portal Access ACLs Signing On with SSO Remote Desktop Single Sign-On Portal Access Single Sign-On Using iRules iRules Introduction Basic TCL Syntax iRules and Advanced Access Policy Rules Customizing BIG-IP APM Customization Overview BIG-IP Edge Client Advanced Edit Mode Customization Landing Page Sections Deploying SAML SAML Conceptual Overview SAML Configuration Overview Exploring Webtops and Wizards Webtops Wizards Using BIG-IP Edge Client BIG-IP Edge Client for Windows Installation BIG-IP Edge Client in Action Lesson Configuration Project Additional Training and Certification Getting Started Series Web-Based Training F5 Instructor Led Training Curriculum F5 Professional Certification Program F5 Instructor Led Training Curriculum F5 Professional Certification Program Additional course details: Nexus Humans F5 Configuring BIG-IP APM - Access Policy Manager v13.x training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the F5 Configuring BIG-IP APM - Access Policy Manager v13.x course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

F5 Configuring BIG-IP APM - Access Policy Manager v13.x
Delivered OnlineFlexible Dates
Price on Enquiry

CWS-206 Citrix Workspace Microapps Essentials

By Nexus Human

Duration 3 Days 18 CPD hours This foundational course to Citrix Workspace intelligence ushers you into the new generation of Citrix. You will discover how intelligent features help organize, guide, and automate the future of your work.You will gain an understanding of the fundamentals of web services, APIs, and systems integrations through building microapps designed to boost employee productivity and optimize the end user experience.Through this course, you will learn the fundamentals of Citrix Workspace intelligence features, web services, security considerations and API troubleshooting to help you successfully deploy intelligent workspace features in your environment. This foundational course to Citrix Workspace intelligence ushers you into the new generation of Citrix. You will discover how intelligent features help organize, guide, and automate the future of your work. You will gain an understanding of the fundamentals of web services, APIs, and systems integrations through building microapps designed to boost employee productivity and optimize the end user experience. Through this course, you will learn the fundamentals of Citrix Workspace intelligence features, web services, security considerations and API troubleshooting to help you successfully deploy intelligent workspace features in your environment.

CWS-206 Citrix Workspace Microapps Essentials
Delivered OnlineFlexible Dates
Price on Enquiry

CNS-226: Implement Citrix ADC 13.x with Citrix Gateway

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Built for IT Professionals working with Citrix Gateway, with little or no previous Citrix Gateway experience. Potential students include administrators, engineers, and architects interested in learning how to deploy or manage Citrix Gateway environments. Overview Configure Authentication and Authorization Define End User Access and Experience Integrate Citrix Gateway with Citrix Virtual Apps and Desktops and additional resources Employ recommended tools and techniques to troubleshoot common Citrix Gateway network and connectivity issues Learn the skills required to configure and manage Citrix Gateway features. At the end of the course, students will be able to configure their Citrix Gateway environments to address remote access requirements for Apps and Desktops. Citrix Gateway Introduction to Citrix Gateway Advantages and Utilities of Citrix Gateway Citrix Gateway Configuration Common Deployments AppExpert Expressions Introduction to AppExpert Policies Default Policies Explore Citrix ADC Gateway Policies Policy Bind Points Using AppExpert with Citrix Gateway Authentication, Authorization, and Secure Web Gateway Authentication and Authorization Multi-Factor Authentication nFactor Visualizer SAML authentication Managing Client Connections Introduction to Client Connections Session Policies and Profiles Pre and Post Authentication Policies Citrix Gateway Deployment Options Managing User Sessions Integration for Citrix Virtual Apps and Desktops Virtual Apps and Desktop Integration Citrix Gateway Integration Citrix Gateway WebFront ICA Proxy Clientless Access and Workspace App Access Fallback SmartControl and SmartAccess for ICA Configuring Citrix Gateway Working with Apps on Citrix Gateway RDP Proxy Portal Themes and EULA Additional course details: Nexus Humans CNS-226: Implement Citrix ADC 13.x with Citrix Gateway training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CNS-226: Implement Citrix ADC 13.x with Citrix Gateway course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CNS-226: Implement Citrix ADC 13.x with Citrix Gateway
Delivered OnlineFlexible Dates
Price on Enquiry

Risk Assessing

By Prima Cura Training

This course is designed to enable learners to increase their understanding of risk assessment and risk management in Health and Social Care settings.

Risk Assessing
Delivered in person or OnlineFlexible Dates
Price on Enquiry

Certified Asset Management Security Expert (CAMSE)

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is intended for IT Asset Managers and other professionals involved in Asset Management, strategic planning, security programs and those affected or influenced by ITAM and security initiatives. The mission of IAITAM?s CAMSE course is to maximize the contribution of IT Asset Management professionals to the information security and physical security of the organization by bridging the gap between ITAM and IT security processes while incorporating security strategies throughout the ITAM policies, processes and procedures so that ITAM enhances the security program and improves the applicable governance. This course includes the comprehensive online examination necessary for achieving CAMSE Certification. Course Outline Scope of IT Security & ITAM Threat Prevention vs. Threat Protection Decentralized vs. Centralized Security The IT Security Plan ITAM?s Role in Risk Management The 12 KPAs & Security Program Management & Security Communication & Education Management & Security Policy Management & Security Acquisition Management & Security Asset Identification Management & Security Disposal Management & Security Project Management & Security Documentation Management & Security Financial Management & Security Legislation Management & Security Compliance Management & Security Vendor Management & Security Assessing Asset Risk Level Program Issues by Asset Type ITAM Program Assessment for Security

Certified Asset Management Security Expert (CAMSE)
Delivered OnlineFlexible Dates
Price on Enquiry

Logging, Monitoring and Observability in Google Cloud

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This class is intended for the following customer job roles: Cloud architects, administrators, and SysOps personnel Cloud developers and DevOps personnel Overview This course teaches participants the following skills: Plan and implement a well-architected logging and monitoring infrastructure Define Service Level Indicators (SLIs) and Service Level Objectives (SLOs) Create effective monitoring dashboards and alerts Monitor, troubleshoot, and improve Google Cloud infrastructure Analyze and export Google Cloud audit logs Find production code defects, identify bottlenecks, and improve performance Optimize monitoring costs This course teaches you techniques for monitoring, troubleshooting, and improving infrastructure and application performance in Google Cloud. Guided by the principles of Site Reliability Engineering (SRE), and using a combination of presentations, demos, hands-on labs, and real-world case studies, attendees gain experience with full-stack monitoring, real-time log management and analysis, debugging code in production, tracing application performance bottlenecks, and profiling CPU and memory usage. Introduction to Google Cloud Monitoring Tools Understand the purpose and capabilities of Google Cloud operations-focused components: Logging, Monitoring, Error Reporting, and Service Monitoring Understand the purpose and capabilities of Google Cloud application performance management focused components: Debugger, Trace, and Profiler Avoiding Customer Pain Construct a monitoring base on the four golden signals: latency, traffic, errors, and saturation Measure customer pain with SLIs Define critical performance measures Create and use SLOs and SLAs Achieve developer and operation harmony with error budgets Alerting Policies Develop alerting strategies Define alerting policies Add notification channels Identify types of alerts and common uses for each Construct and alert on resource groups Manage alerting policies programmatically Monitoring Critical Systems Choose best practice monitoring project architectures Differentiate Cloud IAM roles for monitoring Use the default dashboards appropriately Build custom dashboards to show resource consumption and application load Define uptime checks to track aliveness and latency Configuring Google Cloud Services for Observability Integrate logging and monitoring agents into Compute Engine VMs and images Enable and utilize Kubernetes Monitoring Extend and clarify Kubernetes monitoring with Prometheus Expose custom metrics through code, and with the help of OpenCensus Advanced Logging and Analysis Identify and choose among resource tagging approaches Define log sinks (inclusion filters) and exclusion filters Create metrics based on logs Define custom metrics Link application errors to Logging using Error Reporting Export logs to BigQuery Monitoring Network Security and Audit Logs Collect and analyze VPC Flow logs and Firewall Rules logs Enable and monitor Packet Mirroring Explain the capabilities of Network Intelligence Center Use Admin Activity audit logs to track changes to the configuration or metadata of resources Use Data Access audit logs to track accesses or changes to user-provided resource data Use System Event audit logs to track GCP administrative actions Managing Incidents Define incident management roles and communication channels Mitigate incident impact Troubleshoot root causes Resolve incidents Document incidents in a post-mortem process Investigating Application Performance Issues Debug production code to correct code defects Trace latency through layers of service interaction to eliminate performance bottlenecks Profile and identify resource-intensive functions in an application Optimizing the Costs of Monitoring Analyze resource utilization cust for monitoring related components within Google Cloud Implement best practices for controlling the cost of monitoring within Google Cloud

Logging, Monitoring and Observability in Google Cloud
Delivered OnlineFlexible Dates
Price on Enquiry

ISTQB Certified Tester, Advanced Level - Technical Test Analyst

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Developers, Functional Testers, Test Automation Specialists, Performance Specialists, Environment and Data Specialists, Security Specialists Prerequisites for taking part in the workshop: It is recommended that participants should have completed the ISTQB© Certified Tester Foundation Level certification, or have attended the workshop. Overview Defined tasks need to be structured according to the technical requirements and the internal structure of the system needs to be analysed in detail in order to achieve the expected level of quality and detect errors during development. The ISTQB© Advanced Level Technical Test Analyst certification will teach you on the basis of the current ISTQB© Advanced Level syllabus. The various procedures, techniques and tools for non-functional system testing will be explained, and you will then be in a position to apply these in your future work as a Technical Test Analyst. The three-day certification will be followed by a two-hour examination. During the workshop, our experienced trainers will fully prepare you for the ISTQB© Advanced Level Technical Test Analyst examination. Following on from the ISTQB© Certified Tester Foundation Level training, this workshop covers the increasing technical challenges faced by system testing in particular. Topic 1 Tasks of a Technical Test Analyst in risk-based testing Topic 2 Structure-based testing: Simple condition test, condition/decision test, modified condition/decision test, multiple condition test, path test, API test, selection of structure-based procedures Topic 3 Analytical testing methods: static analysis (control flow analysis, data flow analysis, improved maintainability/adaptability with static analysis, call graphs), dynamic analysis (detection of memory leaks/?rogue? pointers, analysis of system performance) Topic 4 Quality features in technical tests (ISO 25000 standard): Planning aspects of technical testing, security testing, reliability testing, performance testing, resource usage, maintainability testing, portability testing Topic 5 Review checklists (architecture and code reviews) Topic 6 Testing tools and automation, tool integration, test automation projects, specific testing tools Topic 7 Practical exercises on all core topics Notes In order to take the examination, you must show at least 18 months? practical experience as a tester and be certified at ISTQB© Foundation Level. Confirmation from your employer or from your reference customers are accepted as proof of practical experience. Additional course details: Nexus Humans ISTQB Certified Tester, Advanced Level - Technical Test Analyst training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the ISTQB Certified Tester, Advanced Level - Technical Test Analyst course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

ISTQB Certified Tester, Advanced Level - Technical Test Analyst
Delivered OnlineFlexible Dates
Price on Enquiry