Duration 5 Days 30 CPD hours This course is intended for Data Warehouse Administrator Database Administrators Database Designers Support Engineer Technical Administrator Overview Back up, restore, and patch DBCS database deployments Describe the DBaaS and on-premises Oracle Database architectures Manage database instances Manage UNDO data Move data between databases Implement basic backup and recovery procedures Monitor and tune database performance Tune SQL to improve performance Manage resources with Oracle Database Resource Manager Create pluggable databases (PDBs) Configure the Oracle network environment Administer user security and implement auditing Create and manage tablespaces Manage storage space Create and manage Database as a Cloud Service (DBCS) database deployments Register databases and manage performance with Enterprise Manager Cloud Control The Oracle Database 12c R2: Administration Workshop Ed 3 course is designed to provide students with a firm foundation in administration of an Oracle Database. In this course students will gain a conceptual understanding of Oracle Database architecture and learn how to manage an Oracle Database in an effective and efficient manner. Exploring Oracle Database Architecture Introducing Oracle Database Relation Database Models Oracle SQL and PL/SQL Oracle Database Server Architecture Connecting to Oracle Databases Oracle Database Tools Oracle-Supplied User Accounts Querying the Oracle Data Dictionary Managing Database Instances Initialization Parameter Files Starting Up Oracle Databases Shutting Down Oracle Databases Opening and Closing PDBs Working with the Automatic Diagnostic Repository (ADR) Querying Dynamic Performance Views Creating PDBs Methods and Tools to Create PDBs Creating PDBs from Seed with SQL*Plus Cloning PDBs with SQL*Plus Unplugging and Pluggin In PDBs with SQL*Plus Dropping PDBs with SQL*Plus Configuring the Oracle Network Environment Oracle Net Services How Listeners Work Configuring Listeners for Dynamic Service Registration Configuring Listeners for Static Service Registration Configuring Local Naming for Connections Testing Oracle Net Connectivity with tnsping Configuring Communication Between Databases Dedicated Versus Shared Server Configurations Administering User Security Creating Users Granting Privileges Creating and Granting Roles Revoking Privileges and Roles Creating and Assigning Profiles Authenticating Users Assigning Quotas to Users Applying the Principal of Least Privilege Creating and Managing Tablespaces How Table Data is Stored Creating Tablespaces in SQL*Plus Altering and Dropping Tablespaces in SQL*Plus Viewing Tablespace Information in SQL*Plus Implementing Oracle Managed Files Moving and Renaming Online Data Files in SQL*Plus Managing Storage Space Oracle Database Space Management Features Block Space Management Row Chaining and Migration Free Space Management Within Segments Types of Segments Allocating Extents Understanding Deferred Segment Creation Space-Saving Features Managing UNDO Data Undo Data: Overview Transactions and Undo Data Storing Undo Information Comparing Undo Data and Redo Data Managing Undo Local Undo Mode Versus Shared Undo Mode Configuring Undo Retention Categories of Undo Moving Data Moving Data: General Architecture Oracle Data Pump: Overview Oracle Data Pump: Benefits Data Pump Export and Import Clients Data Pump Utility: Interfaces and Modes Data Pump Import: Transformations SQL*Loader Overview Loading Methods Backup and Recovery Concepts DBA Responsibilities Categories of Failure Understanding Instance Recovery Understanding Types of Backups Comparing Complete and Incomplete Recovery Oracle Data Protection Solutions Flashback Technology Monitoring and Tuning Database Performance Managing Performance Activities Performance Planning Considerations Database Maintenance Automatic Workload Repository (AWR) Automatic Database Diagnostic Monitor Performance Monitoring Performance Tuning Methodology Database Server Statistics and Metrics SQL Tuning SQL Tuning Process Oracle Optimizer Optimizer Statistics SQL Plan Directives Adaptive Execution Plans SQL Tuning Advisor SQL Access Advisor SQL Performance Analyzer Oracle Database Resource Manager Oracle Database Resource Manager: Overview Resource Manager Elements Using Resource Manager to Allocate Resources Creating a Simple Resource Plan Creating a Complex Resource Plan Using the Active Session Pool Feature Limiting CPU Utilization at the Database Level Limiting CPU Utilization at the Server Level Enterprise Manager Cloud Control Controlling the Enterprise Manager Cloud Control Framework Starting the Enterprise Manager Cloud Control Framework Stopping the Enterprise Manager Cloud Control Framework Introduction to Oracle Database Cloud Service Oracle Cloud: Overview Database Cloud Service Offerings DBCS Architecture Features and Tooling Additional Database Configuration Options Creating DBCS Database Deployments Automated Database Provisioning Creating a Database Deployment How SSH Key Pairs are Used Creating an SSH Key Pair Storage Used for Database Files Managing DBCS Database Deployments Cloud Tooling Accessing Tools and Features from the DBCS Console Managing the Compute Node Associated With a Database Deployment Managing Network Access to DBCS Enabling Access to a Compute Node Port Scaling a Database Deployment Backing Up and Restoring DBCS Database Deployments Backing Up and Recovering Databases on DBCS Backup Destination Choices Backup Configuration Creating an On-Demand Backup Customizing the Backup Configuration Performing Recovery by Using the Console Performing Recovery by Using the dbaascli Utility Patching DBCS Database Deployments Patching DBCS Using the DBCS Console to Manage Patches Using the dbaascli Utility to Manage Patches Creating Master Encryption Keys for PDBs CDB and PDB Master Encryption Keys Determining Whether You Need to Create and Activate and Encryption Key for a PDB Creating and Activating an Encryption Key Tablespace Encryption by Default Tablespace Encryption by Default in DBCS Transparent Data Encryption (TDE) Overview Components of TDE Using TDE Defining the Keystore Location Controlling Tablespace Encryption by Default Managing the Software Keystore and Master Encryption Key Managing the Keystore in CDBs and PDBs Additional course details: Nexus Humans Oracle Database 12c R2 - Administration Workshop Ed 3 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Oracle Database 12c R2 - Administration Workshop Ed 3 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Course Overview The "UK Employment Law Level 5" course offers a comprehensive introduction to the key aspects of employment law within the UK. This course is designed for those seeking to understand the legal framework that governs workplace relations, from recruitment through to dismissal. Covering crucial topics such as employment contracts, discrimination, and health and safety, this course provides valuable knowledge applicable across various industries. By the end of the course, learners will be equipped with the legal understanding required to navigate and implement employment laws effectively, ensuring compliance and fostering fair workplace practices. Course Description This course delves into the fundamental areas of UK employment law, offering learners a thorough grounding in legislation that affects both employers and employees. Learners will explore areas including recruitment procedures, employment contracts, employee handbooks, and the disciplinary process, along with in-depth coverage of national minimum wage laws and workplace discrimination. The course also includes key topics such as parental rights, sick pay, pension schemes, and the health and safety obligations of employers. Learners will gain a comprehensive understanding of employment law, empowering them to contribute to a fair, legal, and well-managed workplace. Course Modules Module 01: Basics of Employment Law Module 02: Legal Recruitment Process Module 03: Employment Contracts Module 04: Employee Handbook Module 05: Disciplinary Procedure Module 06: National Minimum Wage & National Living Wage Module 07: Parental Rights, Sick Pay & Pension Scheme Module 08: Discrimination in the Workplace Module 09: Health & Safety at Work Module 10: Dismissal, Grievances and Employment Tribunals Module 11: Workplace Monitoring & Data Protection (See full curriculum) Who is this course for? Individuals seeking to understand UK employment law. Professionals aiming to advance their careers in HR or management. Beginners with an interest in workplace legislation and employee relations. HR managers and team leaders looking to update their legal knowledge. Career Path HR Manager Employment Lawyer Compliance Officer Payroll Specialist Workplace Policy Advisor Employee Relations Consultant
KYC, AML, & GDPR Training Course Overview This KYC, AML, and GDPR Training course offers a comprehensive introduction to the regulatory frameworks governing financial institutions and businesses. Learners will gain in-depth knowledge of Know Your Customer (KYC) protocols, Anti-Money Laundering (AML) procedures, and GDPR compliance, understanding their importance in maintaining legal and ethical business operations. The course equips professionals with the necessary skills to navigate the regulatory landscape, safeguard businesses against financial crime, and ensure compliance with data privacy laws. By the end of the course, learners will be well-prepared to apply their knowledge in real-world business environments, contributing to secure and compliant operations. Course Description This course delves into the key principles of KYC, AML, and GDPR, exploring their relevance across different industries. Learners will understand the processes involved in customer due diligence, how to identify and prevent money laundering, and how businesses must comply with data privacy regulations. The course provides a structured learning experience, focusing on the practical application of compliance measures, exploring case studies, and providing insights into current and future trends in the industry. Upon completion, participants will possess the expertise to implement these regulations within their organisations, mitigate risks, and contribute to a culture of compliance. KYC, AML, & GDPR Training Curriculum Module 01: Introduction to KYC Module 02: Customer Due Diligence Module 03: AML (Anti-Money Laundering) Module 04: KYC, AML, and Data Privacy Regulations for Business Operations in the United Kingdom Module 05: Regulations to be Complied by Industries Module 06: Methods for Carrying out KYC and AML and the Future of KYC Compliance (See full curriculum) Who is this course for? Individuals seeking to understand financial regulations and compliance. Professionals aiming to develop their knowledge of KYC, AML, and GDPR in their career. Beginners with an interest in the financial services or regulatory compliance industry. Business owners or managers who want to ensure their organisation’s compliance. Career Path Compliance Officer Anti-Money Laundering Specialist KYC Analyst Data Protection Officer Regulatory Compliance Consultant Risk Management Professional
Course Overview The Computer Maintenance, PAT & Cyber Security course offers a comprehensive introduction to the essential components of modern IT systems, combining core knowledge in hardware setup, system troubleshooting, and security protocols. Designed to build foundational understanding as well as introduce advanced cybersecurity concepts, this course equips learners with the confidence to navigate today’s digital infrastructure. From building a computer to understanding network vulnerabilities, learners will explore a variety of modules that address both traditional and emerging technologies, including IoT and encryption. By the end of the course, students will have developed the skills to identify risks, support device performance, and understand secure systems architecture—essential for any role in technology-focused sectors. Course Description This course blends key topics across computer hardware maintenance, PAT (Portable Appliance Testing), and cyber security to prepare learners for a well-rounded understanding of IT system management. The curriculum begins with assembling and configuring computers, progressing into network security and advanced Windows troubleshooting. Learners are introduced to essential software tools and coding applications like C++ with OpenCV, and gain insights into the Internet of Things and encryption principles. Additionally, the course includes training in cyber security awareness, addressing the latest threats and preventative frameworks. With clear instructional guidance and structured content delivery, the course is suitable for learners aiming to understand technical environments and the protocols behind secure computing. It is ideal for those seeking career progression or looking to explore new opportunities in IT security, maintenance, or systems analysis. Course Modules: Module 01: Building Your Own Computer Module 02: Computer Networks Security from Scratch to Advanced Module 03: Computer Vision By Using C++ and OpenCV with GPU support Module 04: Advance Windows 10 Troubleshooting for IT HelpDesk Module 05: Portable Appliance Testing (PAT) Module 06: Internet of Things Module 07: Cyber Security Awareness Training Module 08: Encryption (See full curriculum) Who is this course for? Individuals seeking to understand IT maintenance and cybersecurity principles. Professionals aiming to broaden their knowledge of system configuration and data protection. Beginners with an interest in computer technology and digital safety. Employers looking to upskill their IT or facilities staff in security and device compliance. Career Path IT Support Specialist Systems Administrator Network Security Analyst Cyber Security Consultant Electrical Safety Compliance Officer Technical Services Coordinator
Course Overview Cyber Security Awareness Training is designed to equip learners with the essential knowledge to identify, manage, and reduce cyber risks in both personal and professional environments. This course provides a comprehensive understanding of the ever-evolving landscape of cyber threats and the proactive steps necessary to mitigate them. Through clear, accessible content, learners will explore key areas such as cyber attacks, password management, data breaches, and safe internet practices. By the end of the programme, participants will be able to recognise potential cyber threats, protect sensitive information, and contribute to creating a more secure digital environment. Whether for personal confidence or professional enhancement, this course offers crucial insights to stay safe in today’s technology-driven world. It is suitable for individuals at all levels, ensuring a solid foundation for developing cyber security awareness and resilience against emerging digital risks. Course Description This Cyber Security Awareness Training course delves deeper into the principles of protecting information and systems from cyber threats. Learners will explore common cyber attacks, cybercrimes, and the consequences of data breaches, alongside strategies for strengthening password security and practising safe internet browsing. The training also covers essential topics such as securing remote work environments, managing devices securely, and applying preventative measures to mitigate risks. Throughout the course, participants will engage with structured, easy-to-understand materials designed to build their confidence and competence in cyber security awareness. Learners will gain the ability to assess potential vulnerabilities, adopt safer digital habits, and contribute to wider organisational security initiatives. Delivered in a flexible, accessible format, the course is structured to support learners in developing critical thinking around cyber security issues while enhancing their ability to respond effectively to real-world digital threats. Course Modules Module 01: Introduction to Cyber Security Module 02: Cyber Attacks Module 03: Cybercrimes Module 04: Cyber Security and Data Breaches Module 05: Password Management Module 06: Internet Browsing Module 07: Office and Remote Work Security Module 08: Device Management Module 09: Preventative Measures (See full curriculum) Who is this course for? Individuals seeking to enhance their understanding of cyber threats and secure their digital presence. Professionals aiming to strengthen workplace cyber security practices. Beginners with an interest in cyber security, information security, or technology sectors. Employees required to complete cyber security awareness as part of corporate compliance programmes. Small business owners wishing to protect their business operations and client data. Career Path Cyber Security Assistant IT Support Analyst Security Awareness Coordinator Risk and Compliance Assistant Data Protection Officer Network Security Administrator Information Security Officer Technical Support Specialist Digital Operations Executive
Microsoft Power BI Masterclass 2021 Course Overview: The "Microsoft Power BI Masterclass 2021" provides learners with the skills to become proficient in data analysis and visualization using Power BI. This comprehensive course covers the core functionalities of Power BI, from data preparation and transformation to creating impactful reports and dashboards. Learners will gain valuable insights into data modelling, visualisation, and the use of DAX for advanced calculations. By the end of the course, participants will be able to apply their knowledge to real-world projects, improving their ability to communicate data-driven insights effectively. This course is ideal for professionals and beginners who want to leverage Power BI to unlock the potential of their data. Course Description: This masterclass delves into the essential features of Microsoft Power BI, guiding learners through every stage of data analysis. Starting with project setup and data transformation in the Query Editor, the course progresses to advanced topics such as DAX functions and data storytelling. Learners will explore how to build data models, create dashboards, and employ Python in Power BI to enhance their reports. The course also covers Power BI Service for cloud-based analytics, row-level security for data protection, and integrating additional data sources. With a focus on empowering users to communicate insights clearly, the course ensures learners gain the expertise to manage data efficiently, make informed decisions, and stay up to date with evolving tools and features. Microsoft Power BI Masterclass 2021 Curriculum: Module 01: Introduction Module 02: Preparing our Project Module 03: Data Transformation - The Query Editor Module 04: Data Transformation - Advanced Module 05: Creating a Data Model Module 06: Data Visualization Module 07: Power BI & Python Module 08: Storytelling with Data Module 09: DAX - The Essentials Module 10: DAX - The CALCULATE function Module 11: Power BI Service - Power BI Cloud Module 12: Row-Level Security Module 13: More data sources Module 14: Next steps to improve & stay up to date (See full curriculum) Who is this course for? Individuals seeking to enhance their data analysis skills. Professionals aiming to advance their data visualization expertise. Beginners with an interest in data science or business analytics. Business analysts or data professionals looking to upskill in Power BI. Career Path: Data Analyst Business Intelligence Analyst Data Scientist Power BI Developer Reporting Analyst Data Visualisation Expert
Duration 5 Days 30 CPD hours This course is intended for Implementers and administrators who are new to IBM Spectrum Protect data management. Overview At the end of this course you should be able to: Describe the purpose of IBM Spectrum Protect Install and configure the IBM Spectrum Protect components Use the administrative and client interfaces Discuss storage methodology options and create storage pool Customize data movement and retention policies to meet business requirements Configure the IBM Spectrum Protect database and storage pools for protection Optimize client configuration Perform backup, restore, archive and retrieve operations Organize daily tasks required to protect the IBM Spectrum Protect environment Automate and monitor client and administrative tasks and events IBM Spectrum© Protect 8.1.6 is a data backup and recovery solution designed to help you manage your data retention, reduce the cost of storage, and provide appropriate recovery point objectives to meet any service level agreement. IBM Spectrum© Protect offers improved efficiency and flexibility using object-based data management and policy driven retention.This course will focus on implementation and basic administration of a IBM Spectrum© Protect environment. The hands-on lab exercises are performed on a Windows 2012 environment. The course materials include examples of AIX and Linux commands, when different from Windows. Components and conceptsInstallation and configurationInterfaces and monitoringStorage pools and devicesPolicy management, data movement, and explorationDatabase and storage pool managementClient configuration and managementClient data protectionDaily operations and maintenanceSchedules and reports Additional course details: Nexus Humans TS617 IBM Spectrum Protect - Implementation and Administration (v8.1.6) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the TS617 IBM Spectrum Protect - Implementation and Administration (v8.1.6) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Level 4 Endorsed Diploma - International Trade Qualification Complete all 15 modules and 3 assessments, from a choice of 7 to earn a Level 4 Diploma in International Trade.