Duration 2 Days 12 CPD hours This course is intended for System architects, system administrators, IT managers, VMware partners, and individuals responsible for implementing and managing vSphere architectures who want to deploy vSphere 8.0 into their existing vSphere environment. Overview By the end of the course, you should be able to meet the following objectives: Recognize the importance of key features and enhancements in vSphere 8.0 Describe vCenter Server, VMware ESXi, storage, virtual machine, and security enhancements in vSphere 8.0 Describe the purpose of vSphere Distributed Services Engine Update an ESXi host equipped with a Data Processing Unit (DPU) using vSphere Lifecycle Manager Identify devices supported for system storage on ESXi 8.0 Recognize enhancements to VM hardware compatibility settings VMware vSphere Memory Monitoring and Remediation and the improvements to vSphere DRS Recognize the new Virtual Non-Uniform Memory Access (vNUMA) topology settings of a VM in vSphere Client Use vSphere Lifecycle Manager and Auto Deploy to manage the configuration specifications for the hosts in a cluster Recognize the vSphere Lifecycle Manager and Auto Deploy enhancements in vSphere 8.0 Recognize the cloud benefits that VMware vSphere+ brings to on-premises workloads Recognize technology that is discontinued or deprecated in vSphere 8.0 In this two-day course, you explore the new features and enhancements following VMware vCenter Server 8.0 and VMware ESXi 8.0. Real-world use-case scenarios, hands-on lab exercises, and lectures teach you the skills that you need to effectively implement and configure VMware vSphere 8.0. Course Introduction Introductions and course logistics Course objectives Artificial Intelligence and Machine Learning Describe how device groups support AI and ML in vSphere 8 Describe how device virtualization extensions support AI and ML in vSphere 8 vSphere Distributed Services Engine Describe the benefits of Distributed Services Engine Explain how Distributed Services Engine works Recognize use cases for Distributed Services Engine Install ESXi on a host equipped with a DPU View DPU information in vSphere Client Add an ESXi host equipped with a DPU to a cluster Update an ESXi host equipped with a DPU using vSphere Lifecycle Manager Create a vSphere Distributed Switch for network offloads Add a host with a DPU to the vSphere Distributed Switch Configure a VM to use Uniform Passthrough Mode vSphere and vCenter Management Review the improvements to the communication between vCenter and ESXi hosts Review the enhancements to the vCenter recovery process ESXi Enhancements Describe the function of the central configuration store in ESXi Explain how ConfigStore affects your interaction with ESXi configuration files Recognize the supported system storage partition configuration on ESXi 8.0 Identify devices supported for system storage on ESXi 8.0 Configure an RDMA host local device on ESXi vSphere Storage Describe the vSAN Express Storage Architecture Recognize the benefits of using vSAN Express Storage Architecture Describe the benefits of using NVMe Recognize the support for NVMe devices in vSphere Guest OS and Workloads Review the enhancements of the latest virtual hardware versions Describe the features introduced with virtual hardware version 20 Create a snapshot of a VM with an NVDIMM device Resource Management View energy and carbon emission metrics in vRealize Operations Manager Describe the VMware vSphere Memory Monitoring and Remediation (vMMR) functionality Describe how vMMR enhances the performance of vSphere DRS Security and Compliance Describe how to handle vTPM secrets when cloning a VM Manage OVF templates for VMs that are configured with vTPM Deploy an OVF template with vTPM Describe the enhancements to trusted binary enforcement in ESXi Describe ESXi 8 enhanced security features vSphere Lifecycle Manager Describe the enhancements to life cycle management of standalone ESXi hosts Manage the configuration profiles of ESXi hosts in a cluster with vSphere Lifecycle Manager Use Auto Deploy to boot a host with the desired image and configuration specifications Upgrade multiple ESXi hosts in a cluster in parallel Stage an ESXi host image prior to remediation Auto Deploy Manage custom host certificates using Auto Deploy vSphere with Tanzu Describe the features of the Tanzu Kubernetes Grid 2.0 offering Announcing vSphere+ Describe the functionality and benefits of vSphere+
Course Overview The Traffic Marshal course is designed to equip learners with the essential knowledge required to operate safely and effectively in environments where vehicle and pedestrian movement must be coordinated. Covering key principles of traffic control, risk assessment, and vehicle signalling, this course aims to enhance site safety and improve communication between vehicle operators and marshals. Learners will gain insight into traffic management systems and reversing procedures, allowing them to perform their role with confidence and competence. By the end of the course, participants will understand the legal responsibilities and health and safety standards associated with traffic marshalling. This training provides a recognised foundation for those looking to work in construction, logistics, and other vehicle-heavy environments. Course Description This course delves into the core responsibilities of a Traffic Marshal, offering a structured approach to traffic management and safety awareness. Through comprehensive learning modules, participants will explore the processes involved in directing vehicles, managing temporary traffic setups, and identifying potential hazards. Emphasis is placed on reversing techniques, vehicle signalling, and conducting traffic risk assessments in line with current health and safety guidelines. Learners will also examine how to support site operations by ensuring compliance with regulatory practices. Ideal for both newcomers and professionals, this course delivers essential training that aligns with industry expectations for safe vehicle movement and operational coordination in diverse workplace settings. Course Modules Module 01: Introduction to Traffic Marshalling Module 02: Traffic Management Module 03: Temporary Traffic Control Module 04: Traffic Risk Assessment Module 05: Vehicle Signaling Module 06: Reversing Vehicles Module 07: Health and Safety (See full curriculum) Who is this course for? Individuals seeking to work in vehicle coordination and site logistics. Professionals aiming to enhance safety knowledge for construction or industrial environments. Beginners with an interest in site safety and traffic control operations. Employers requiring qualified staff to manage vehicle movement on-site. Career Path Traffic Marshal Site Safety Officer Construction Site Coordinator Logistics Supervisor Vehicle Banksman Health and Safety Assistant
Course Overview This course offers a comprehensive introduction to the role of estate agents, focusing on key industry skills and knowledge. Learners will gain an in-depth understanding of the property market, various types of estate agents, and the steps involved in buying, selling, and letting properties. The course also highlights the importance of negotiation, valuation, and regulation within the estate agency sector, equipping learners with the tools required to succeed in a competitive industry. By the end of the course, learners will have the practical skills and confidence to embark on a career in estate agency, whether in sales or lettings. Course Description Throughout this course, learners will explore core estate agent functions, including property listing, negotiation, valuation, and selling techniques. The course will cover different estate agent specialisms, such as sales, lettings, and property management, along with the technology used in the industry. Additionally, learners will gain a strong understanding of the regulatory environment governing estate agents in the UK. They will learn about market trends, customer service skills, and effective communication, equipping them with the expertise necessary to excel in the sector. The curriculum ensures that learners are well-prepared for the challenges of the real estate industry, with clear, actionable steps for career progression. Course Modules Module 01: Estate Agent: An Introduction Module 02: Different Types of Estate Agents Module 03: Getting Started on the Job Module 04: Listing Property - Finding the Sellers Module 05: Valuation Process Module 06: Negotiating as Estate Agent Module 07: Selling Property - Finding the Buyers Module 08: Letting Property Module 09: Technology for Estate Agents Module 10: Regulation of Estate Agents (See full curriculum) Who is this course for? Individuals seeking to start a career in estate agency. Professionals aiming to advance in the property market. Beginners with an interest in property sales and lettings. Those looking to understand the regulatory framework of estate agents. Career Path Estate Agent Property Manager Lettings Agent Property Valuer Real Estate Consultant Sales and Lettings Negotiator
Why cultural differences exist, what you can do to understand and respect these differences and then implement strategies to build effective intercultural relationships.Learn the skills, knowledge and have the confidence to tackle difficult conversations in a productive way. Course overview Duration: 1 day (6.5 hours) This workshop is designed for those who deal on a regular basis with fellow employees, suppliers or customers from different cultural backgrounds. The workshop will focus on understanding why cultural differences exist, what you can do to understand and respect these differences and then implement strategies to build effective intercultural relationships. The one day session will use professional actors in the afternoon so that you can practice real-life situations involving intercultural challenges. Objectives By the end of the course you will be able to: Understand what makes us different from people from other cultures Appreciate why we form impressions of other cultures Use strategies to communicate effectively with those from different cultural backgrounds Build trust with those we work with from a different cultural background Content Intercultural Challenges What challenges do you face with dealing with people from different cultures? Why do these challenges exist? Understanding Culture What is culture? Trompenaars’ Model of Culture – what determines our understanding of different cultures Cultural theories Hall and Hall:Three Systems of TimeThe Importance of Context – Data vs Dialogue Hofstede – 6 Cultural Dimensions Trompenaars – 7 Cultural Dimensions Chart your intercultural business relationships against these dimensions Strategies and Intercultural Management Trompenaar’s 3 step approach – Recognise, Respect, Reconcile How to foster and maintain trust Effective intercultural communication strategies Practical Activities Professional actors will work with you in small groups in the afternoon to practice real-life challenging conversations.
Duration 3 Days 18 CPD hours This course is intended for This course is intended for: DevOps engineers DevOps architects Operations engineers System administrators Developers Overview In this course, you will learn to: Use DevOps best practices to develop, deliver, and maintain applications and services at high velocity on AWS List the advantages, roles and responsibilities of small autonomous DevOps teams Design and implement an infrastructure on AWS that supports DevOps development projects Leverage AWS Cloud9 to write, run and debug your code Deploy various environments with AWS CloudFormation Host secure, highly scalable, and private Git repositories with AWS CodeCommit Integrate Git repositories into CI/CD pipelines Automate build, test, and packaging code with AWS CodeBuild Securely store and leverage Docker images and integrate them into your CI/CD pipelines Build CI/CD pipelines to deploy applications on Amazon EC2, serverless applications, and container-based applications Implement common deployment strategies such as 'all at once,' 'rolling,' and 'blue/green' Integrate testing and security into CI/CD pipelines Monitor applications and environments using AWS tools and technologies DevOps Engineering on AWS teaches you how to use the combination of DevOps cultural philosophies, practices, and tools to increase your organization?s ability to develop, deliver, and maintain applications and services at high velocity on AWS. This course covers Continuous Integration (CI), Continuous Delivery (CD), infrastructure as code, microservices, monitoring and logging, and communication and collaboration. Hands-on labs give you experience building and deploying AWS CloudFormation templates and CI/CD pipelines that build and deploy applications on Amazon Elastic Compute Cloud (Amazon EC2), serverless applications, and container-based applications. Labs for multi-pipeline workflows and pipelines that deploy to multiple environments are also included. Module 0: Course overview Course objective Suggested prerequisites Course overview breakdown Module 1: Introduction to DevOps What is DevOps? The Amazon journey to DevOps Foundations for DevOps Module 2: Infrastructure automation Introduction to Infrastructure Automation Diving into the AWS CloudFormation template Modifying an AWS CloudFormation template Demonstration: AWS CloudFormation template structure, parameters, stacks, updates, importing resources, and drift detection Module 3: AWS toolkits Configuring the AWS CLI AWS Software Development Kits (AWS SDKs) AWS SAM CLI AWS Cloud Development Kit (AWS CDK) AWS Cloud9 Demonstration: AWS CLI and AWS CDK Hands-on lab: Using AWS CloudFormation to provision and manage a basic infrastructure Module 4: Continuous integration and continuous delivery (CI/CD) with development tools CI/CD Pipeline and Dev Tools Demonstration: CI/CD pipeline displaying some actions from AWS CodeCommit, AWS CodeBuild, AWS CodeDeploy and AWS CodePipeline Hands-on lab: Deploying an application to an EC2 fleet using AWS CodeDeploy AWS CodePipeline Demonstration: AWS integration with Jenkins Hands-on lab: Automating code deployments using AWS CodePipeline Module 5: Introduction to Microservices Introduction to Microservices Module 6: DevOps and containers Deploying applications with Docker Amazon Elastic Container Service and AWS Fargate Amazon Elastic Container Registry and Amazon Elastic Kubernetes service Demonstration: CI/CD pipeline deployment in a containerized application Module 7: DevOps and serverless computing AWS Lambda and AWS Fargate AWS Serverless Application Repository and AWS SAM AWS Step Functions Demonstration: AWS Lambda and characteristics Demonstration: AWS SAM quick start in AWS Cloud9 Hands-on lab: Deploying a serverless application using AWS Serverless Application Model (AWS SAM) and a CI/CD Pipeline Module 8: Deployment strategies Continuous Deployment Deployments with AWS Services Module 9: Automated testing Introduction to testing Tests: Unit, integration, fault tolerance, load, and synthetic Product and service integrations Module 10: Security automation Introduction to DevSecOps Security of the Pipeline Security in the Pipeline Threat Detection Tools Demonstration: AWS Security Hub, Amazon GuardDuty, AWS Config, and Amazon Inspector Module 11: Configuration management Introduction to the configuration management process AWS services and tooling for configuration management Hands-on lab: Performing blue/green deployments with CI/CD pipelines and Amazon Elastic Container Service (Amazon ECS) Module 12: Observability Introduction to observability AWS tools to assist with observability Hands-on lab: Using AWS DevOps tools for CI/CD pipeline automations Module 13: Reference architecture (Optional module) Reference architectures Module 14: Course summary Components of DevOps practice CI/CD pipeline review AWS Certification
Duration 3 Days 18 CPD hours This course is intended for This course benefits individuals responsible for configuring and monitoring devices running the Junos OS. Overview Describe the value of MPLS VPNs. Describe the differences between provider-provisioned VPNs and customer-provisioned VPNs. Describe the differences between Layer 2 VPNs and Layer 3 VPNs. List the provider-provisioned MPLS VPN features supported by the JUNOS software. Describe the roles of a CE device, PE router, and P router in a BGP Layer 3 VPN. Describe the format of the BGP routing information, including VPN-IPv4 addresses and route distinguishers. Describe the propagation of VPN routing information within an AS. List the BGP design constraints to enable Layer 3 VPNs within a provider network. Explain the operation of the Layer 3 VPN data plane within a provider network. Create a routing instance, assign interfaces to a routing instance, create routes in a routing instance, and import/export routes from a routing instance using route distinguishers/route targets. Describe the purpose of BGP extended communities, configure extended BGP extended communities, and use BGP extended communities. List the steps necessary for proper operation of a PE-CE dynamic routing protocol. List the troubleshooting and monitoring techniques for routing instances. Explain the difference between the bgp.l3vpn table and the inet.0 table of a routing instance. Monitor the operation of a CE-PE dynamic routing protocol. Explain the operation of a PE mulit-access interface in a Layer 3 VPN and list commands to modify that behavior. Describe ways to support communication between sites attached to a common PE router. Provision and troubleshoot hub-and-spoke Layer 3 VPNs, Describe the flow of control traffic and data traffic in a hub-and-spoke Layer 3 VPN. Describe QoS mechanisms available in L3VPNs. Configure L3VPN over GRE tunnels. Describe the RFC 4364 VPN options. Describe the carrier-of-carriers model. Configure the carrier-of-carriers and ''Option C'' configuration. Describe the flow of control and data traffic in a draft-rosen multicast VPN. Describe the configuration steps for establishing a draft-rosen multicast VPN. Monitor and verify the operation of draft-rosen multicast VPNs. Describe the flow of control traffic and data traffic in a next-generation multicast VPN. Describe the configuration steps for establishing a next-generation multicast VPN. Describe the configuration steps for establishing a next-generation multicast VPN. Monitor and verify the operation of next-generation multicast VPNs. This three-day course is designed to provide students with MPLS-based Layer 3 virtual private network (VPN) knowledge and configuration examples. Chapter 1: Course Introduction Course Introduction Chapter 2: MPLS VPNs MPLS VPNs Provider-Provisioned VPNs Chapter 3: Layer 3 VPNs Layer 3 VPN Terminology VPN-IPv4 Address Structure Operational Characteristics Chapter 4: Basic Layer 3 VPN Configuration Preliminary Steps PE Router Configuration Lab: Layer 3 VPN with Static and BGP Routing Chapter 5: Layer 3 VPN Scaling and Internet Access Scaling Layer 3 VPNs Public Internet Access Options Lab: LDP over RSVP Tunnels and Public Internet Access Chapter 6: Layer 3 VPNs ? Advanced Topics Exchanging Routes between Routing Instances Hub-and-Spoke Topologies Layer 3 VPN CoS Options Layer 3 VPN and GRE Tunneling Integration Layer 3 VPN and IPSec Integration Layer 3 VPN Egress Protection BGP prefix-independent convergence (PIC) edge for MPLS VPNs VRF Localization Provider Edge Link Protection Support for configuring more than 3 million L3VPN Labels Lab: GRE Tunneling Chapter 7: Interprovider Backbones for Layer 3 VPNs Hierarchical VPN Models Carrier-of-Carriers Model Option C Configuration Lab: Carrier of Carrier Layer 3 VPNs Chapter 8: Troubleshooting Layer 3 VPNs Working with Multiple Layers Troubleshooting Commands on a PE Device Multiaccess Interfaces in Layer 3 VPNs PE and CE-based Traceroutes Layer 3 VPN Monitoring Commands Lab: Troubleshooting Layer 3 VPNs Chapter 9: Draft Rosen Multicast VPNs Multicast Overview Draft Rosen MVPN Overvie Draft Rosen MVPN Operation Configuration Monitoring Chapter 10: Next Generation Multicast VPNs Multicast VPN Overview Next-Generation MVPN Operation Configuration Monitoring Internet Multicast Ingress Replication Internet Multicast Signaling and Data Plane Configuring MVPN Internet Multicast Monitoring MVPN Internet Multicast Lab: MVPN Internet Multicast
Technology and innovation and its profound impact on financial operations Technology adoption indeed comes with risks, particularly around data security and privacy. As CFOs, we must ensure robust cybersecurity measures and adhere to strict data protection regulations. It requires ongoing investment in secure systems, staff training, and proactive monitoring to mitigate risks and protect sensitive financial information. Change management is also crucial. The adoption of new technologies requires proper planning, training, and cultural adjustments. As CFOs, we need to foster a culture that embraces innovation and continuous learning. Clear communication about the benefits and objectives of technology adoption is essential to gain buy-in and drive successful implementation. Fantastic insights! Now, let’s discuss the future. What emerging technologies do you foresee shaping the future of finance functions? One area that holds immense potential is blockchain technology. Its decentralised and transparent nature has the potential to streamline financial transactions, enhance auditability, and revolutionize supply chain finance. We’re closely monitoring blockchain’s development and exploring pilot projects to leverage its benefits. I agree, blockchain is a game-changer. Additionally, as the internet of things (IoT) expands, we anticipate new opportunities and challenges. CFOs will need to adapt to the influx of real-time data from interconnected devices, leveraging this information to optimize financial processes, enhance risk management, and improve operational efficiencies. Before we wrap up, any final thoughts or advice for our CFO audience? Embrace technology and view it as an opportunity rather than a threat. Invest in understanding the technological landscape and its implications for finance. Stay curious, adapt, and be open to change. Technology will continue to evolve, and as CFOs, we must evolve with it. Absolutely. Collaboration is key. Engage with IT teams, industry peers, and external experts to stay informed about the latest technological advancements. By fostering partnerships and sharing knowledge, we can collectively navigate the ever-changing technology landscape and drive innovation within our organisations. https://www.fdcapital.co.uk/podcast/technology-and-innovation-and-its-profound-impact-on-financial-operations/ Tags Online Events Things To Do Online Online Conferences Online Science & Tech Conferences #technology #innovation #financial #impact #operations
In a world focused on digital media, 24-hour news channels and social channels, it’s really important to communicate with your audience – there are lots of opportunities to do this if you are interviewed by journalists. There’s the chance to deliver expert comments or take part in in-depth features or give a quote about your business or organisation. The media wants to stay relevant and engaged with its audience and you can play a part in that and talk to your audience. In our Broadcast Media Training Courses, we will teach you the best ways to share your story, how to answer those difficult questions and present yourself with confidence and style. This means you will capitalise on every opportunity. Our broadcast media and media interview training courses include: Crisis Media Training Benefits There are many reasons why businesses and organisations suddenly find themselves trending on social media or being talked about in the broadcast media. When something goes wrong, your every move is watched and then commented on online, putting you and your teams under even more pressure. So if the worst should happen and you find yourself or your company or business suddenly in the public eye, you need to be prepared. We’ll help you learn how to manage your response ensuring clarity and confidence. It’s vital you don’t leave a vacuum for others to fill so let us help you respond effectively. Why would I ever need Crisis Training? Brand reputation is the most important asset we have in the digital media age. Audiences want to engage with organisations which have credibility and authenticity. A crisis – not always of your making – can quickly undermine that if it’s handled badly. Communication is at the heart of crisis media training and we can show you how to deal with a wide range of situations, address concerns and criticism and ensure your message reaches audiences under the most pressured circumstances. Who needs to attend the training? Crisis Media Training isn’t just for the most senior CEO’s or Managing Directors. In order to support the authenticity of your response it’s important the people on the ground can talk to the public. And in the age of social media, if you’re talking to the public, you’re talking to the media. So the people dealing with the crisis are the people who should know how to communicate in a crisis. There are times when the top bosses must talk as they are accountable and are happy to demonstrate that level of responsibility. But the media will also ask to talk to the people handling the problem and we can show them how. How do I book Crisis Media Training? We can help you create the perfect training to stress test your messaging and make sure you’re ready to deliver your message if you find yourselves unexpectedly in the news. We’ll help you deal with challenging questions and diffuse the most tense of interviews. But our main criteria is that we design the training you want so we’ll work with you to create the perfect course. All you have to do is give one of our friendly team a ring on 0754 533 4269 or email us.
The CASP certification is an international, vendor-neutral exam that proves competency in enterprise security; risk management; research and analysis; and integration of computing, communications, and business disciplines. The exam covers the technical knowledge and skills required to conceptualize, design, and engineer secure solutions across complex enterprise environments. It involves applying critical thinking and judgment across a broad spectrum of security disciplines to propose and implement solutions that map to enterprise drivers. The CompTIA Advanced Security Practitioner certification was accredited by the International Organization for Standardization (ISO) and the American National Standards Institute (ANSI) on Dec. 13, 2011.
PowerPoint Presentation Course Overview This PowerPoint Presentation course is designed to equip learners with the skills to create impactful and visually engaging presentations. The course covers essential elements such as structuring content, integrating multimedia, and applying design principles to enhance presentation effectiveness. Learners will understand how to communicate ideas clearly through slide design and develop a polished, professional presentation style. By the end of the course, participants will be capable of creating presentations that are not only visually appealing but also coherent and persuasive. Course Description In this comprehensive course, learners will explore core principles of PowerPoint presentation design. Topics include crafting clear narratives, choosing effective visual elements, adding multimedia to support key messages, and mastering slide layouts for clarity. Learners will also gain knowledge in using PowerPoint’s advanced features like animations and transitions. The course ensures that learners are able to produce well-structured and aesthetically pleasing presentations suitable for various audiences. Throughout, learners will refine their presentation skills to deliver messages that are both impactful and professional, preparing them for any professional setting. PowerPoint Presentation Curriculum Module 01: Introduction and Welcome Module 02: Map Out Your Message Module 03: Add Variety to Your Visuals (See full curriculum) Who is this course for? Individuals seeking to enhance their presentation skills. Professionals aiming to improve their communication abilities. Beginners with an interest in presentation design. Anyone looking to create effective and engaging PowerPoint presentations. Career Path Corporate Presentations Specialist Marketing or Sales Professional Project Manager Event Coordinator Business Consultant