Supporting Windows 10 course description This course is designed to provide students with the knowledge and skills required to support and troubleshoot Windows 10 PCs and devices in a Windows Server domain environment. These skills include understanding of Windows 10 features, how they can be used in an Active Directory environment and how to troubleshoot them. What will you learn Troubleshoot startup issues and operating system services on a Windows 10 PC. Troubleshoot issues related to network connectivity. Troubleshoot client configuration failures and GPO application issues. Troubleshoot issues related to application installation and operation. Recover a PC running Windows 10. Supporting Windows 10 course details Who will benefit: Anyone supporting users running Windows 10 personal computers within a medium to large enterprise. Prerequisites: None. Duration 5 days Supporting Windows 10 course contents Implementing a Troubleshooting Methodology Overview of Windows 10, Introduction to the EDST Job Role, Overview of the Troubleshooting Steps & Tools. Hands on Implementing a Troubleshooting Methodology. Hands on Using Troubleshooting Tools for Windows 10. Troubleshooting Startup Issues Overview of the Windows 10 Startup Recovery Environment, Troubleshooting Startup Settings & Operating System Services Issues, Recovering BitLocker-Protected Drives. Hands on Troubleshooting Startup Issues. Hands on Recovering BitLocker-Encrypted Drives, Creating a New BitLocker Password. Troubleshooting Hardware and Device Drivers Troubleshooting Device Driver Failures & Physical Failures, Overview of Hardware Troubleshooting, Monitoring Reliability, Configuring the Registry. Hands on Troubleshooting Device Driver Issues, Resolving Hardware Issues, Adding a Missing Device Driver to a Driver Store, Reverting a Problematic Device Driver. Hands on Troubleshooting Hardware Issues, Diagnosing Memory, Troubleshooting and Repairing Failed Disk Redundancy Synchronizing Settings, Accessing Data on a Foreign Volume. Troubleshooting Remote Computers Using Remote Desktop and Remote Assistance, Remoting with Windows PowerShell Hands on Troubleshooting Remote Computer by using Remote Desktop and Remote Assistance. Hands on Troubleshooting Remote Computer by using Windows PowerShell. Resolving Network Connectivity Issues Determining Network Settings, Troubleshooting Network Connectivity Issues, Troubleshooting Name Resolution. Hands on Resolving Network Connectivity Issues. Hands onResolving Name Resolution Issues. Troubleshooting Group Policy Overview of Group Policy Application, Resolving Client Configuration Failures and GPO Application Issues. Hands on Troubleshooting Group Policy Application Issues. Hands on Resolving Group Policy Issues. Hands on Installing and Sharing a Printer. Troubleshooting User Settings Troubleshooting Sign In Issues, Troubleshooting the Application of User Settings. Hands on Troubleshooting Sign in Problems. Hands on Troubleshooting the Application of User Settings, Resolving Folder Redirection Problem, Resolving Roaming User Profile Problem. Troubleshooting Remote Connectivity Troubleshooting VPN Connectivity Issues & DirectAccess. Hands on Troubleshooting VPN Connectivity Lab : Configuring and Troubleshooting DirectAccess Configuring and Verifying, DirectAccess Client-Side Settings, Troubleshooting DirectAccess. Troubleshooting Resource Access Within a Domain & File Permissions Issues, Recovering Files Encrypted by EFS, Troubleshooting Printer Access Issues. Lab : Troubleshooting File Access Issues Lab : Troubleshooting Access to Encrypted Files. Hands on Troubleshooting Printer Access Issues Troubleshooting Resource Access for Non Domain Member Clients Configuring and Troubleshooting Device Registration, Configuring and Troubleshooting Work Folders, Configuring and Troubleshooting OneDrive Access. Hands on Troubleshooting Resource Access for Clients that are not Domain Members. Troubleshooting Device Registration, Work Folders and OneDrive for Business. Troubleshooting Applications Troubleshooting Desktop App Installation Issues, Desktop Apps, Managing Windows Store Apps, Troubleshooting Access to Company Web Applications. Hands on Troubleshooting Desktop Apps, AppLocker Policy Application & Application Compatibility issue. Hands on Troubleshooting Access to Company Web Applications, Internet Explorer Issue & Microsoft Edge. Maintaining Windows 10 Managing & Troubleshooting Windows Activation, Troubleshooting Performance, Applying Applications. Hands on Monitoring and Troubleshooting Performance. Recovering Data and Operating System File Recovery in Windows 10, Recovering an OS. Hands on Recovering Data, Recovering Data from Azure Backup, Recovering Deleted File by Using File History. Hands on Provisioning Computer to Comply with Company Standards, Provision Computer to Comply with Company Standards.
Getting the design and implementation of your recruitment and selection process right is the first critical step to attracting great people into your business.
Introduction to Agile for Executives: In-House Training This session provides executives with an overview of Agile values and principles, the key benefits of an Agile approach, and its differences with the traditional Waterfall method. During the session, we compare and contrast the major Agile methods, with an emphasis on Scrum, as the most popular in the market. And most importantly, we present some criteria for Agile Transformation, possible certifications to pursue, and what is needed at the senior leadership level to achieve the best business results. What you will Learn At the end of this program, you will be able to: Explain the basics and benefits of using an Agile approach Describe the Scrum framework, its events, artifacts, and roles and responsibilities Illustrate an Agile approach outside of Software Development Define Scaled Agile Determine how to support an Agile transformation for your organization Getting Started Introduction Course structure Course goals and objectives Agile Introduction What is Agile? Agile benefits Agile myths and realities Overview of Agile Methods Overview of Agile methods Scrum method Lean and Kanban methods Criteria and certifications What Executives Need to Know About Agile Agile is not just for IT Agile can be scaled Agile transformation needs your support Summary and Next Steps Review Personal Action Plan
Recruiting great people to our organisations is the key to high performance and sustainable business success.
This workshop will provide an opportunity to understand and apply a range of commercial analysis tools in a problem-solving environment.
IP security training course description Connection to the Internet is becoming an essential business tool. This course looks at firewalls, digital certificates, encryption and other essential topics for e-commerce sites. A generic course that looks at firewalls and VPNs. Hands on sessions include using hacking tools and configuring firewalls. What will you learn Describe: Basic security attacks RADIUS SSL IPSec VPNs Implement digital certificates Deploy firewalls to protect Web servers and users. Secure Web servers and clients. IP security training course details Who will benefit: Network administrators. Network operators. Security auditors Prerequisites: TCP/IP foundation for engineers Duration 2 days IP security training course contents TCP/IP review Brief overview of the relevant headers. Hands on Download software for course, use analyser to capture passwords on the wire. Security review Policies, Types of security breach, denial of service, data manipulation, data theft, data destruction, security checklists, incident response. Security exploits The Internet worm, IP spoofing, SYN attack, hijacking, Ping o' Death⦠keeping up to date with new threats. Hands on Use a port scanning tool, use a 'hacking' tool. Firewalls Products, Packet filtering, DMZ, content filtering, stateful packet inspection, Proxies, firewall architectures, Intrusion Detection Systems, Viruses. Hands on Set up a firewall and prevent attacks. NAT NAT and PAT, Why use NAT, NAT-ALG, RSIP. Encryption Encryption keys, Encryption strengths, Secret key vs Public key, algorithms, systems, SSL, SSH, Public Key Infrastructures. Hands on Run a password-cracking program. Authentication Types of authentication, Securid, Biometrics, PGP, Digital certificates, X.509 v3, Certificate authorities, CRLs, PPP authentication, RADIUS. Hands on Using certificates. Web client and server security Cookies, browser certificates, censorship, PICS. Operating system security, Web server user authentication, Restricting access, Logging, Securing CGI scripts. Hands on Browser security. VPNs and IPSec What is a VPN, tunnelling, L2F, PPTP, L2TP, IPSec, AH, ESP, transport mode, tunnel mode.
Ensuring that you provide the level of service that your customers want to be delivered through your people. This programme develops the skills and behaviours that enhance the experience that your customers receive.
There are multiple steps and proven strategies that will help you write your Business Administration thesis impressively.
This half day course looks at practical methods of saving time and prioritising work so that participants are more productive. It considers a wide range of strategies to overcome some of the physical and mental barriers for those working in an office or home environment.
Introduction: “Co-ordinating the temporary works process” This two day course is designed to assist those on site who have responsibility for managing all forms of temporary works. It is also designed to give confidence to senior management and those who engage contractors have reached an assessed standard of knowledge. The course has the support of a number of organisations: Temporary Works Forum CECA, UKCG, HSE and FMB. The support of these organisations offers transferability of the course within industry.Temporary works are usually safety and business-critical and require careful co-ordination. An accepted way of achieving this is through the adoption of the management process outlined in BS5975, which introduces the temporary works co-ordinator (TWC) as a key figure. This course explains the role and the overall management context within which it sits.High risk can occur on small as well as larger sites hence understanding the essentials of good safety risk management, as outlined in BS5975, is relevant for projects of all sizes. This course will give the delegate thorough knowledge of the Temporary Works Co-ordinator role however this does not alone make a delegate competent, as this requires other attributes e.g. experience. Aims and Objectives: This course is not a temporary works awareness course. It is only concerned with the process of co-ordination of temporary works, commonly expressed through the role of the Temporary Works Co-ordinator. Attendance does not confer competency as a Temporary Works Co-ordinator.The course gives emphasis, throughout, to: – The importance of communication, co-ordination, co-operation and competency. The ‘4Cs’. – Risk management: safety and also business relatedAllowing the Temporary Works Co-ordinator (TWC) to: – Understand the need for and duties of a TWC – Understand the role of others – Have a detailed knowledge and understanding of BS5975 in respect of this role. Assessment: The method of assessment will be by multiple-choice questions at the end of the course as well as being expected to be interactive during the course.Course Attendance:Delegates are required to attend both sessions, since without full attendance and achievement in the examination the Temporary Works Co-ordinator Training Course cannot be made.Delegates must attend the days in order and, where not on consecutive days, must complete the course within two weeks. Delegates unable to attend both days due to extenuating circumstances (e.g. certificated sickness) will need to enrol onto a new course in order to maintain continuity of learning outcomes and attend both days again. It is expected that experienced and competent Temporary Works Co-ordinators will attend this course. Competence comes from a mixture of education, training and experience and should be judged by an appropriate senior individual, usually referred to as the Designated Individual (DI). Training is considered an essential element of Temporary Works Co-ordinator competence. Background Publications: This course, including its group work and exercises, is constructed around BS5975:2008 +A1:2011. For Open Courses Delegates should bring a copy with them in order not to be significantly disadvantaged. For in house courses it is expected that the Tutor will tailor the course around the organisation procedures,providing they are comprehensive and follow the philosophy of BS5975. In these cases delegates will need a copy of their own procedures. In the absence of adequate procedures delegates will need a copy of the BS itself.Although the following is not mandatory, delegates may find the following useful– BS EN12811-1:20031 Temporary works equipment. Scaffolds. Performance requirements and general design– BS EN12812:2008. Falsework ‐ performance requirements and general design– BS EN12813:2004. Temporary works equipment. Load bearing towers of prefabricated components. Particular methods of structural design– NASC TG20/13 plus supplement 1– NASC TG9:12