Duration 2 Days 12 CPD hours This course is intended for Executives, Project Managers, Business Analysts, Business and IT stakeholders working with analysts, Quality and process engineers, technicians, corrective action coordinators or managers; supervisors, team leaders, and process operators; anyone who wants to improve their ability to solve recurring problems. Overview At the completion of this course, you should be able to: Identify the different types of tools and techniques available Apply change management successfully Review what to look for when applying business case thinking to Root Cause Analysis Develop a process to systematically approach problems Business success is dependent on effective resolution of the problems that present themselves every day. Often the same or similar problems continue causing repeated losses in time or money and your staff become experts at fixing rather than preventing the problems. Learn to find and fix root causes and develop corrective actions that will effectively eliminate or control these problems. Section 1: RCA Foundation Concepts and Objectives Section Learning Objectives Discuss Definitions ? IT Perspective Discuss What is a problem and why do they exist? What is Root Cause? RCA Benefits and Approaches Event and Casual Analysis Event and Causal Analysis: Exercise 1c Worksheet RCA Tools for each approach Section Summary and Conclusions Section 2: Enhance use of RCA tools Why use a Particular Method Tool: Change Analysis Change Analysis Examples Tool: How to Resolve Conflict Tool: 5 Why?s Example Learning Management Problem Tool: Cause and Effect Tool: Fault Tree Analysis Why do we use Fault Tree Analysis? How does it work? Fault Tree Diagram Symbols Example #1 of FTA: Car Hits Object Tool: Failure Modes and Effects Analysis (FMEA) Example: Failure Modes and Effects Analysis Tool: Design / Application Review Section 3: Problem Resolution and Prevention Section Objectives The Secret of Solving Problems: -A Note about Statistical Control -A Note about Fire Fighting Technique: Business Process Mapping Example: IGOE Technique: Lean Six Sigma and DMAIC Lean Six Sigma Benefits Importance of Understanding the Business Process The Business Process Mandate Technique: Process Modeling Graphical Notation Standard (BPMN): -What is Business Process Modeling Notation (BPMN)? -Benefits of BPMN -Basic Components of BPMN Technique: Business Process Maturity Model Five Levels of Maturity Section 4: Capability Improvement for RCA Steps in Disciplined Problem Solving RCA as a RCA Process Key RCA Role Considerations Sustainable RCA Improvement Organizational Units Process Area Goals, Practices Specific and General Practices Specific Practice Examples Software Maturity Survey SWOT Analysis Worksheet Recognize the importance of the Change Management component in your RCA implementation Using the ADKAR Model to Communicate Change Review ADKAR© Model ? -Awareness of the need for change -Desire to participate and support the change -Knowledge on how to change -Ability to implement required skills and behaviors -Reinforcement to sustain the change The ADKAR Model: Reinforcement Section 5: Course Summary and Conclusions Plan the Proposal and Business Case Example: 1 Page Business Case Resource Guide Questions
Duration 3.5 Days 21 CPD hours This course is intended for This course is for AWS Cloud Architects with expertise in designing and implementing solutions running on AWS who now want to design for Microsoft Azure. Overview After completing this course, students will be able to: Secure identities with Azure Active Directory and users and groups. Implement identity solutions spanning on-premises and cloud-based capabilities Apply monitoring solutions for collecting, combining, and analyzing data from different sources. Manage subscriptions, accounts, Azure policies, and Role-Based Access Control. Administer Azure using the Resource Manager, Azure portal, Cloud Shell, and CLI. Configure intersite connectivity solutions like VNet Peering, and virtual network gateways. Administer Azure App Service, Azure Container Instances, and Kubernetes. This course teaches Solutions Architects who have previously designed for Amazon Web Services how to translate business requirements into secure, scalable, and reliable solutions for Azure. Introduction to Azure Subscriptions and accounts Resource groups and templates in Azure Resource Manager Azure global infrastructure Azure regions Azure Availability Zones Comparison with AWS Implement Azure Active Directory Introduction to Azure Active Directory Domains and custom domains Safety features Guest users in Azure Active Directory Manage multiple directories Comparison with AWS Implement and manage hybrid identities Introduction to Azure AD Connect Comparison with AWS Implement virtual networking Azure Virtual Network and VNet peering VPN and ExpressRoute connections Comparison with AWS Implement VMs for Windows and Linux Configure high availability Comparison with AWS Implement load balancing and network security Implement Azure Load Balancer Implement an Azure Application Gateway Implement Azure Firewall Implement network security groups and application security groups Comparison with AWS Implement container-based applications Configure Azure Kubernetes Service Publish a solution on an Azure Container Instance Comparison with AWS Implement an application infrastructure Create an App Service plan Create and configure Azure App Service Configure networking for an App Service Introduction to Logic Apps and Azure Functions Comparison with AWS Implement storage accounts Azure Storage core concepts Managing the Azure Blob storage lifecycle Working with Azure Blob storage Comparison with AWS Implement NoSQL databases Introduction to Azure Cosmos DB Consistency Select appropriate CosmosDB APIs Set up replicas in CosmosDB Comparison with AWS DynamoDB Implement Azure SQL databases Configure Azure SQL database settings Implement Azure SQL Database managed instances Configure high availability for an Azure SQL database Comparison with AWS Implement cloud infrastructure monitoring Monitor security Monitor cost Configure a Log Analytics workspace Comparison with AWS Implement and manage Azure governance solutions Assign RBAC roles Configure management access to Azure Implement and configure an Azure Policy Comparison with AWS Manage security for applications Implement Azure Key Vault Implement and configure Azure AD Managed Identities Register and manage applications in Azure AD Comparison with AWS Migration, backup, and disaster recovery management Migrate workloads Implement Azure Backup for VMs Implement disaster recovery Comparison with AWS
Duration 1 Days 6 CPD hours This course is intended for This course is intended for managers and supervisors engaged in working with the Millennial generation workforce. Overview Upon successful completion of this course, participants will be able to define onboarding, discuss the characteristics of Millennials, and develop action plans for working with them. In this course, participants will learn to build an onboarding process that recognizes the challenges and strengths of the Millennial workforce. Getting Started Workshop Objectives Action Plan Purpose of Onboarding Start Up Costs Employee Anxiety Employee Turnover Realistic Expectations Practical Illustration Introduction Why Onboarding? Importance of Onboarding Making Employees Feel Welcome First Day Checklist Practical Illustration Millennials and Onboarding Who are Millennials? How Do Millennials Differ from Other Workers? Investiture Socialization ? Let Them Be Themselves! Informal Rather than Formal Onboarding Processes Practical Illustration Onboarding Checklist Pre-Arrival Arrival First Day First Week First Month Practical Illustration Engaging the Millennial Employee Create an Informal Program Engage Employees One-on-one The Role of Human Resources The Role of Managers Practical Illustration Following Up with the Millennial Employee Initial Check-In ? One-on-one Following up ? Regular, Informal Follow Ups Setting Schedules ? Millennials and Work-Life Mentoring and the Millennial Practical Illustration Setting Expectations with the Millennial Employee Define Requirements ? Provide Specific Instructions Identify Opportunities for Improvement and Growth Set Verbal Expectations Put It in Writing Practical Illustration Mentoring the Millennial Be Hands-On and Involved Serial Mentoring Be a Mentor, Not an Authority Figure Focus Millennia?s Exploratory Drive on Work Practical Illustration Assigning Work to the Millennial Employee Provide Clear Structure and Guidelines Provide Specific Benchmarks Set Boundaries and Provide Reality Checks Practical Illustration Providing Feedback Millennials Thrive on Feedback! Characteristics of Quality Feedback Informal Feedback Formal Feedback Practical Illustration Wrapping Up Words From the Wise Additional course details: Nexus Humans Millennial Onboarding training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Millennial Onboarding course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 1 Days 6 CPD hours This course is intended for This course is intended for managers and individuals who need to recognize and overcome anxiety occurring in the workplace. Overview Upon successful completion of this course, participants will be able to identify workplace anxiety and learning powerful coping strategies to help work with anxiety, rather than against it. In this course, participants will learn resources and effective skills that will help them recognize and manage anxiety in the workplace. Getting Started Workshop Objectives Action Plan Types of Anxiety Generalized Anxiety Disorder Social Anxiety Panic Disorder Phobias Obsessive-Compulsive Disorder Practical Illustration Physical Symptoms Rapid Heartbeat Panic Attack Headache Trembling or Shaking Digestive Discomfort Practical Illustration Anxiety Triggers Fear of the Unknown Fear of Conflict or Confrontation Holding in Feelings Public Speaking Perfectionism Practical Illustration Anxiety vs. Nervousness Determining the Cause The Duration of Symptoms Intensity of Symptoms Interfering With Life Levels of Anxiety Practical Illustration Recognizing Anxiety in Others Avoiding Social Situations Difficulty Accepting Negative Feedback Difficulty Focusing on Tasks Irrational Fears Offering Support Practical Illustration Coping Strategies (I) Keeping a Journal Power of Positive Thinking Creating a ?Me? Place Establish Attainable Goals -- Rule Practical Illustration Coping Strategies (II) Talk With Friends and Family Get Enough Sleep Eating Well and Exercise Breathing Exercises Begin Small and Build Up to Larger Challenges Practical Illustration Acknowledge the Situation It?s OK to Make a Mistake Accept the Situation, and Move On Ending the Cycle Identify the Trigger You?re Not Alone Practical Illustration The Positive Aspects Alerts Us to Danger Improves Self-Awareness Great Motivator Prevent Mistakes Empathetic and Understanding Practical Illustration When to Seek Extra Help? Feeling Overwhelmed Physical Changes Unable to Work or Function Experiencing Panic Attacks Feelings of Irritability Practical Illustration Wrapping Up Words From the Wise Additional course details: Nexus Humans Managing Workplace Anxiety training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Managing Workplace Anxiety course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Ideal candidates include network professionals who are looking to build their foundational knowledge of the ClearPass product portfolio. Overview After you successfully complete this course, expect to be able to: Ability to setup ClearPass as a AAA server Demonstrate Configuration Guest, OnGurad, Onboard and Profiling features Integrate with External AD Server Understand Monitoring and Reporting Demonstrate Scaling and deployment of best practices Configure AAA services for both wired and wireless networks Demonstrate the configuration of Aruba Downloadable User Roles. Demonstrate the configuration of Dynamic Segmentation with Aruba switches. This course prepares participants with foundational skills in Network Access Control using the ClearPass product portfolio. This 5-day classroom session includes both instructional modules and labs to teach participants about the major features of the ClearPass portfolio. Participants will learn how to setup ClearPass as an AAA server, and configure the Policy Manager, Guest, OnGuard and Onboard feature sets. In addition, this course covers integration with external Active Directory servers, Monitoring and Reporting, as well as deployment best practices. The student will gain insight into configuring authentication with ClearPass on both wired and wireless networks. Intro to ClearPass BYOD High Level Overview Posture and Profiling Guest and Onboard ClearPass for AAA Policy Service Rules Authentication Authorization and Roles Enforcement Policy and Profiles Authentication and Security Concepts Authentication Types Servers Radius COA Active Directory Certificates Intro to NAD NAD Devices Adding NAD to ClearPass Network Device Groups Network Device Attributes Aruba Controller as NAD Aruba Switch Aruba Instant Monitoring and Troubleshooting Monitoring Troubleshooting Logging Policy Simulation ClearPass Insight Insight Dashboard Insight Reports Insight Alerts Insight Search Insight Administration Insight Replication Active Directory Adding AD as Auth Source Joining AD domain Using AD services External Authentication Multiple AD domains LDAP Static Host Lists SQL Database External Radius Server Guest Guest Account creation Web Login pages Guest Service configuration Self-registration pages Configuring NADS for Guest Guest Manager Deep Dive Web Login Deep Dive Sponsor Approval MAC Caching Onboard Intro to Onboard Basic Onboard Setup Onboard Deepdive Single SSID Onboarding Dual SSID Onboarding Profiling Intro to Profiling Endpoint Analysis Deep Dive Posture Intro to Posture Posture Deployment Options OnGuard Agent Health Collection OnGuard workflow 802.1x with Posture using Persistent/dissolvable agent OnGuard web Login Monitoring and Updates Operation and Admin Users Operations Admin Users Clustering and Redundancy Clustering Redundancy LAB Licensing ClearPass Licensing Base License Applications ClearPass Exchange Intro Examples General HTTP Palo Alto Firewall Configuration Case Study Objectives Discussion Advanced Labs Overview Wired Port Authentication 802.1X for access layer switch ports Profiling on Wired Network Configuration of Dynamic Segmentation Aruba Downloadable User Roles Downloadable User Role Enforcement in ClearPass Aruba Controller/Gateway configuration Aruba Switch configuration Troubleshooting
Duration 1 Days 6 CPD hours This course is intended for This course is intended for: Developers System Administrators Solutions Architects Overview This course is designed to teach you how to: Design a microservices-based architecture that uses containers Use Amazon ECS to run and scale a microservices-based application Integrate Amazon ECS with other AWS services Running Container-Enabled Microservices on AWS is designed to teach you how to manage and scale container-enabled applications by using Amazon Elastic Container Service (ECS). This course highlights the challenges of running containerized applications at scale and provides guidance on creating and using Amazon ECS to develop and deploy containerized microservices-based applications. In the hands-on lab exercises you will use Amazon ECS to handle long-running services, build and deploy container images, link services together, and scale capacity to meet demand. You will also learn how to run container workers for asynchronous application processes. Module 1a: Overview of Microservices on AWS Welcome to Simple Mustache Service! The monolith What are microservices? How to implement a microservices infrastructure The six principles of microservices Module 1b: Containers and Docker Introduction to containers Comparing virtual machines with containers Docker Running containers Storing container images Hands-on lab: Building and running your first container Module 2: Continuous delivery for container-based microservices Compare and contrast different software development cycles Use AWS CodePipeline to code, build, and deploy a microservice Use AWS CodeCommit as a source control service Use Jenkins to perform a Docker build Use Postman to run and test microservices Use AWS CloudFormation to provision and deploy microservices Hands-on lab: Using the Amazon ECS Service Scheduler Module 3: High availability and scaling with Amazon Elastic Container Service High availability Cluster management and scheduling Monitoring Scaling a cluster Scaling services Hands-on lab: Continuous delivery pipelines for container-based microservices Module 4: Security for container-based microservices Implement security Apply best practices Automate security Evaluate compliance requirements Embed security into the CI/CD Hands-on lab: Extending Amazon ECS with Service Discovery and Config Management Additional course details: Nexus Humans Running Container Enabled Microservices on AWS training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Running Container Enabled Microservices on AWS course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for This course is designed for security experts and Check Point resellers who desire to obtain the necessary knowledge required to perform more advanced troubleshooting skills while managing their security environments. Overview Understand how to use Check Point diagnostic tools to determine the status of a network. Understand how to use network packet analyzers and packet capturing tools to evaluate network traffic.Become familiar with more advanced Linux system commands. Obtain a deeper knowledge of the Security Management architecture. Understand how the Management database is structured and how objects are represented in the database. Understand key Security Management Server processes and their debugs. Understand how GuiDBedit operates. Understand how the kernel handles traffic and how to troubleshoot issues with chain modules. Understand how to use the two main procedures for debugging the Firewall kernel and how they differ. Recognize User mode processes and how to interpret their debugs. Discuss how to enable and use core dumps. Understand the processes and components used for policy installs and processing packets in Access Control policies. Understand how to troubleshoot and debug issues that may occur with App Control and URLF. Understand how to debug HTTPS Inspection-related issues. Understand how to troubleshoot and debug Content Awareness issues. Understand how IPS works and how to manage performance issues. Understand how to troubleshoot Anti-Bot and Antivirus. Recognize how to troubleshoot and debug Site-to-Site VPN related issues. Understand how to troubleshoot and debug Remote Access VPNs. Understand how troubleshoot Mobile Access VPN issues. Recognize how to use SecureXL features and commands to enable and disable accelerated traffic. Understand how the server hardware and operating system affects the performance of Security Gateways. Understand how to evaluate hardware configurations for optimal performance. Provide advanced troubleshooting skills to investigate and resolve more complex issues that may occur while managing your Check Point Security environment. Course Outline Advanced Troubleshooting Management Database and Processes Advanced Kernel Debugging User Mode Troubleshooting Advanced Access Control Understanding Threat Prevention Advanced VPN Troubleshooting Acceleration and Performance Tuning Additional course details: Nexus Humans CCTE Check Point Troubleshooting Expert training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CCTE Check Point Troubleshooting Expert course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours This course is intended for This intermediate course is for: Individuals who are assessing and/or planning to deploy storage network virtualization solutions Overview Create an implementation task list to integrate the SVC solution into the storage network fabric Establish or update zoning policies to enable the SVC to control storage device access and facilitate storage provisioning to host servers Utilize SVC user interfaces to manage the networked storage environment, assign storage to servers, migrate data, replicate data across storage systems, and monitor storage access activities Assess issues related to coexistence between the SVC and native disk storage access across host servers Migrate existing data to the virtualized SVC environment Implement SVC storage efficiency solutions including Easy Tier, Thin Provisioning, Volume Mirroring, and Real-time Compression Implement data replication services including FlashCopy and Remote Copy Leverage networked storage connectivity by integrating a layer of intelligence - the SAN Volume Controller (SVC) - to facilitate storage application data access independence from storage management functions and requirements ...and more. Introducing the SAN Volume Controller Storage provisioning with the SAN Volume Controller SAN Volume Controller clustering environment SVC Cluster Setup and Storage Provisioning SVC physical environment and management interfaces Storage systems and LUN assignments to SVC Cluster creation and storage provisioning Additional functions: Quorum disks, expand/shrink volumes, MDisk removal, MDisk multipathing Fabric Zoning, Non Disruptive Volume Move, and iSCSI Connectivity Host to SVC volume access infrastructure Fibre Channel host to SVC SAN fabric zoning Non Disruptive Volume Move (NDVM) iSCSI host to SVC IP connectivity Easy Tier, Thin Provisioning, Volume Mirroring, and Real-time Compression Easy Tier Thin Provisioning Volume Mirroring Real-time Compression and the Comprestimator Data Migration Pool Migration Migration Wizards (Import, Migration, Export) Storage system replacement Copy Services: FlashCopy and Remote Copy FlashCopy Remote Copy: Metro Mirror Copy Services: FlashCopy and Remote Copy FlashCopy Remote Copy: Metro Mirror Remote Copy: Global Mirror and Global Mirror with change volumes Managing the SVC Environment Logging and Directed Maintenance Procedures Code upgrades and node replacement Remote user authentication SVC configuration backup Additional course details: Nexus Humans SNV1 IBM SAN Volume Controller (SVC) Planning and Implementation Workshop training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SNV1 IBM SAN Volume Controller (SVC) Planning and Implementation Workshop course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 1 Days 6 CPD hours This course is intended for This course is for individuals who need to write clearly and concisely in a professional environment. Overview In this course, you will organize and write effective business documents. You will: Identify techniques to write effective business communication. Write electronic communication that is clear, concise, and appropriate in a business context. Apply the writing principles you have studied to specific business situations and learn to address the needs of a particular audience. Use your writing and diplomatic skills to create formal business letters. Use basic persuasive strategies that will allow you to plan and deliver effective proposals. Though businesses increasingly rely on technology, technological skills alone do not guarantee success in the workplace. You must still develop your ideas, express them clearly, and persuade others of their viability. This course offers effective strategies to sharpen your writing skills by structuring your ideas logically, exercising diplomacy in letters and reports, and shaping your arguments.In contemporary business environments, information overload makes it necessary for you to communicate clearly and concisely. Trying to make sense of a disorganized email message can be frustrating given the number of emails you have to answer daily. By analyzing your audience, organizing your writing, and employing effective persuasive techniques, your writing will make an impact. Lesson 1: Writing Effective Business Communication Topic A: Write Strong Sentences Topic B: Organize Your Content Topic C: Analyze Your Audience Lesson 2: Writing Email and Other Electronic Communication Topic A: Write an Email Topic B: Write Instant Messages and Text Messages Lesson 3: Writing Common Business Documents Topic A: Write an Internal Announcement Topic B: Write a Routine Request Topic C: Write a Response to Routine Requests Topic D: Write a Complaint Topic E: Write a Positive Response to Customer Complaints Topic F: Write Bad-News Messages Lesson 4: Writing a Business Letter Topic A: Write a Business Letter Topic B: Write a Thank-You Letter Lesson 5: Writing Business Proposals Topic A: Persuade Your Audience Topic B: Write an Executive Summary Topic C: Use Visuals Additional course details: Nexus Humans Effective Business Writing (Second Edition) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Effective Business Writing (Second Edition) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 1 Days 6 CPD hours This course is intended for This course is intended for business users and knowledge workers in a variety of roles and fields who have competence in a desktop-based installation of the Microsoft Office 2010, 2013, or 2016 edition of the Microsoft Office productivity suite, and who are now extending Microsoft Office to a collaborative cloud-based Office 365 environment. Overview In this course, you will build upon your knowledge of the Microsoft Office desktop application suite to work productively in the cloud-based Microsoft Office 365 environment. You will: Sign in, navigate, and identify components of the Office 365 environment. Create, edit, and share documents with team members using the Office Online apps, SharePoint, OneDrive for Business, and Delve. Collaborate and work with colleagues using the Yammer and Planner apps. Use email and manage contacts with Outlook on the web. Collaborate using Teams. Configure Teams. This course introduces working with shared documents in the familiar Office 365 online apps?Word, PowerPoint©, and Excel©?as an alternative to installing the Microsoft© Office desktop applications. This course also introduces several productivity apps including Yammer?, Planner, and Delve© that can be used in combination by teams for communication and collaboration. Getting Started with Office 365 Topic A: Sign In to Office 365 Topic B: Navigate the Office 365 Environment Collaborating with Shared Files Topic A: Work with Shared Documents in SharePoint Topic B: Edit Documents in Office Online Topic C: Collaborate on the SharePoint Site Topic D: Work with OneDrive for Business Topic E: Find Shared Resources Using Productivity Apps Topic A: Work with Productivity Apps in Combination Topic B: Broadcast Messages with Yammer Using Outlook on the Web Topic A: Send and Receive Email Topic B: Manage Contacts Topic C: Schedule Appointments Topic D: Personalize Outlook on the Web Collaborating with Teams Topic A: Overview of Microsoft Teams Topic B: Converse and Share in Teams Topic C: Call and Meet in Teams Topic D: Collaborate with Microsoft 365 Apps and Teams Configuring Teams Topic A: Configure Teams Topic B: Configure Channels Topic C: Configure Tabs Additional course details: Nexus Humans Microsoft 365 Office for the Web (with Teams) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Microsoft 365 Office for the Web (with Teams) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.