Diary Management Course Overview This Diary Management course offers comprehensive training on effectively organising and managing personal and professional schedules. Learners will explore essential techniques for scheduling appointments, prioritising tasks, and optimising time use to enhance productivity. The course emphasises the development of strong organisational skills, enabling learners to efficiently handle daily commitments and improve workflow. By mastering diary management, participants will gain confidence in managing multiple responsibilities, meeting deadlines, and maintaining clear records. This course is valuable for anyone looking to streamline their time management and improve administrative efficiency in any professional setting. Course Description This course delves into the key components of diary management, including methods for note-taking, scheduling, task tracking, and using digital tools designed to support organisation. Participants will learn how to structure their diaries effectively to accommodate varied responsibilities, manage interruptions, and maintain focus on priorities. The learning experience incorporates techniques for using popular note-taking programmes and digital calendars, ensuring learners can integrate modern technology into their daily routines. Throughout the course, individuals will build skills in time optimisation and discover practical strategies to enhance their organisational capabilities, ultimately supporting improved professional performance and personal productivity. Diary Management Curriculum Module 01: Introduction to Diary Management Module 02: Taking and Organising Notes Module 03: Scheduling and Time Optimisation Module 04: Keeping Track of Tasks Module 05: Note-Taking Programs Module 07: Diary Management Tricks and Optimisation (See full curriculum) Who is this course for? Individuals seeking to improve their time and schedule management skills. Professionals aiming to enhance their organisational and administrative abilities. Beginners with an interest in developing effective diary and task management. Administrative assistants and office workers looking to boost efficiency. Career Path Personal Assistant Office Manager Executive Secretary Administrative Coordinator Project Administrator
Process Improvement Course Overview: This course on Process Improvement provides a comprehensive foundation for learners to understand and apply key principles of process management and optimisation. Participants will explore various strategies, tools, and methodologies to streamline processes, enhance efficiency, and reduce waste. Emphasising real-world applicability, the course equips learners with the knowledge to analyse, design, and implement process improvements in a variety of professional settings. By the end, learners will be able to identify inefficiencies, propose targeted improvements, and contribute effectively to organisational performance enhancement. Course Description: In this course, learners will delve into the essentials of process improvement, covering fundamental concepts and frameworks used to optimise operations. Topics include the types of processes, the methodologies for process analysis, and the steps for implementing effective process improvements. Learners will gain a deep understanding of key process improvement techniques, such as Six Sigma and Lean, and develop the skills to assess and refine processes. The course also includes a LIVE demonstration, allowing learners to see the implementation of improvements in action, ensuring they are well-equipped to contribute to the efficiency of their organisations. Process Improvement Curriculum: Module 01: Introduction Module 02: The Fundamentals of Process Improvement Module 03: Types of Process in Process Improvement Module 04: The Process of Delivering Process Improvement Module 05: LIVE Demonstration of a Process Improvement Module 06: Close Out (See full curriculum) Who is this course for? Individuals seeking to enhance operational efficiency. Professionals aiming to advance their career in process management. Beginners with an interest in process improvement or management. Anyone looking to understand key strategies for process optimisation. Career Path: Process Improvement Specialist Business Process Analyst Operations Manager Lean Six Sigma Consultant Continuous Improvement Coordinator
Generating new leads and new business can be both time-consuming and frustrating. It's not easy - it takes skill, careful preparation and the creation of effective models and methods, even perhaps using formal approaches and scripts. Once generated, a new lead or enquiry must also be carefully managed to maximise the potential revenue it can generate. But it's crucial to get it right. If your company can afford not to worry about getting new business - congratulations! If your company is completely confident that it is performing at peak potential in generating new leads - again, congratulations! But if your company is working in the real world, couldn't your team do with some help, to become even just that little bit more effective, to make the process just that little less painful? This highly practical, intensive workshop gives sales teams the proven strategies and tactics they need to build a sustainable new business pipeline. This course will help participants: Develop a clear and consistent process for new business development and lead-generation Master the secret of effective new business development and lead-generation - 'only sell the appointment or next stage of the sales process, not your product or service' Set and achieve the right level of new business development and lead-generation activity to achieve your personal and organisational sales goals Apply the key principles of effective prospecting and pipeline management using a proven toolkit and approach Overcome the most common 'put-offs' when conducting telephone or face-to-face business-development and lead-generation activities Develop an engaging telephone voice and manner - and a 'networking personality' Qualify potential opportunities with more accuracy on a consistent basis Prioritise opportunities and manage their time when sourcing new business Discover online sources of leads, contacts and referrals Overcome psychological blocks to cold or warm calling - theirs and the client's Identify potential prospects - and decision-makers and influencers within target prospects - with greater accuracy Make outbound sales or appointment calls with improved confidence, control and results Improve the conversion of calls to appointments by using more effective questions and sales messages Get past gatekeepers and assistants more effectively Make the most of your CRM software and systems 1 Online marketing - what works! Workshop overview and learning objectives Choosing your social media channels LinkedIn for sales and marketing Designing and implementing an effective new business email campaign online Creating a lead-generation strategy online - with case studies Avoiding common mistakes in social media marketing Case study: 'Best practice in social media sales and marketing' Using blogs and video-based marketing (eg, YouTube) New trends and how to keep your finger on the 'social media' pulse Twenty essential websites and online marketing tools 2 Making appointments by telephone Planning the call, telephone techniques, integrating with email and online marketing Developing a clear and consistent process to appointment-making Setting and achieving the right level of telephone activity to achieve your appointment goals Applying the key principles of effective prospecting and pipeline management generation, using a proven toolkit and approach Overcoming the most common 'put-offs' to seeing or engaging with you Overcoming psychological blocks to cold or warm calling - yours and the client's Identifying potential prospects - and decision-makers and influencers within target prospects - with greater accuracy Making outbound sales or appointment calls with improved confidence, control and results Improving conversion of calls to appointments by using more effective questions and sales messages The five keys to developing an engaging telephone voice and approaching manner 3 Power networking Strategies for networking and B2B referral-based marketing The importance, and different types, of networking How to work a room - preparation and strategy Communication dynamics in networking - the power of the listening networker Assumptions when networking Business networking etiquette Making connections, asking for cards, contact details and referrals, gaining follow-up commitments Building relationships - follow-up and follow-through 4 Developing new leads Strategies for first-time sales calls Gaining rapport and opening first-time and new business sales calls effectively Advanced consultative selling - questioning techniques to quickly and efficiently uncover opportunities, need areas and preferences Presenting your solution to a new or first-time customer - creating an enthusiastic and compelling personalised and persuasive summary of your proposal Value message - differentiate your solutions clearly and accurately, with tailored value statements Presenting the right initial USPs, features and benefits and making them relevant and real to the customer Smart ways to position price, emphasise value and be a strong player without being the cheapest or leading on price Learn and use advanced techniques to determine customer needs, value and decision-making criteria in depth on a first-time call 5 Organised persistence - CRM and prospect-tracking Organised persistence - sales tracking, following up on 'sleeping' customers, gaining referrals, time and territory management Maintaining a good database for maximising new business ROI Developing a contact strategy with different types and levels of contact Analysing your contact base using state-of-the-art software and tools Making the most of your CRM systems and solutions Understanding that your attitude makes a difference when sourcing new business Setting SMART objectives for new business development and lead-generation Practical exercise - setting personal development and business goals Time management tips to improve daily productivity New business pipeline management strategies for peak sales performance 6 Workshop summary and close Practical exercise - developing your new business action plan Review and feedback
Duration 4 Days 24 CPD hours This course is intended for Security engineers Security administrators Security architects Operations engineers Network engineers Network administrators Network or security technicians Network managers System designers Cisco integrators and partners Overview After taking this course, you should be able to: Describe and administer the Cisco Email Security Appliance (ESA) Control sender and recipient domains Control spam with Talos SenderBase and anti-spam Use anti-virus and outbreak filters Use mail policies Use content filters Use message filters to enforce email policies Prevent data loss Perform LDAP queries Authenticate Simple Mail Transfer Protocol (SMTP) sessions Authenticate email Encrypt email Use system quarantines and delivery methods Perform centralized management using clusters Test and troubleshoot This course shows you how to deploy and use Cisco© Email Security Appliance to establish protection for your email systems against phishing, business email compromise, and ransomware, and to help streamline email security policy management. This hands-on course provides you with the knowledge and skills to implement, troubleshoot, and administer Cisco Email Security Appliance, including key capabilities such as advanced malware protection, spam blocking, anti-virus protection, outbreak filtering, encryption, quarantines, and data loss prevention. This course helps you prepare to take the exam, Securing Email with Cisco Email Security Appliance (300-720 SESA). Describing the Cisco Email Security Appliance Cisco Email Security Appliance Overview Technology Use Case Cisco Email Security Appliance Data Sheet SMTP Overview Email Pipeline Overview Installation Scenarios Initial Cisco Email Security Appliance Configuration Centralizing Services on a Cisco Administering the Cisco Email Security Appliance Distributing Administrative Tasks System Administration Managing and Monitoring Using the Command Line Interface (CLI) Other Tasks in the GUI Advanced Network Configuration Using Email Security Monitor Tracking Messages Logging Controlling Sender and Recipient Domains Public and Private Listeners Configuring the Gateway to Receive Email Host Access Table Overview Recipient Access Table Overview Configuring Routing and Delivery Features Controlling Spam with Talos SenderBase and Anti-Spam SenderBase Overview Anti-Spam Managing Graymail Protecting Against Malicious or Undesirable URLs File Reputation Filtering and File Analysis Bounce Verification Using Anti-Virus and Outbreak Filters Anti-Virus Scanning Overview Sophos Anti-Virus Filtering McAfee Anti-Virus Filtering Configuring the Appliance to Scan for Viruses Outbreak Filters How the Outbreak Filters Feature Works Managing Outbreak Filters Using Mail Policies Email Security Manager Overview Mail Policies Overview Handling Incoming and Outgoing Messages Differently Matching Users to a Mail Policy Message Splintering Configuring Mail Policies Using Content Filters Content Filters Overview Content Filter Conditions Content Filter Actions Filter Messages Based on Content Text Resources Overview Using and Testing the Content Dictionaries Filter Rules Understanding Text Resources Text Resource Management Using Text Resources Using Message Filters to Enforce Email Policies Message Filters Overview Components of a Message Filter Message Filter Processing Message Filter Rules Message Filter Actions Attachment Scanning Examples of Attachment Scanning Message Filters Using the CLI to Manage Message Filters Message Filter Examples Configuring Scan Behavior Preventing Data Loss Overview of the Data Loss Prevention (DLP) Scanning Process Setting Up Data Loss Prevention Policies for Data Loss Prevention Message Actions Updating the DLP Engine and Content Matching Classifiers Using LDAP Overview of LDAP Working with LDAP Using LDAP Queries Authenticating End-Users of the Spam Quarantine Configuring External LDAP Authentication for Users Testing Servers and Queries Using LDAP for Directory Harvest Attack Prevention Spam Quarantine Alias Consolidation Queries Validating Recipients Using an SMTP Server SMTP Session Authentication Configuring AsyncOS for SMTP Authentication Authenticating SMTP Sessions Using Client Certificates Checking the Validity of a Client Certificate Authenticating User Using LDAP Directory Authenticating SMTP Connection Over Transport Layer Security (TLS) Using a Client Certificate Establishing a TLS Connection from the Appliance Updating a List of Revoked Certificates Email Authentication Email Authentication Overview Configuring DomainKeys and DomainKeys Identified Mail (DKIM) Signing Verifying Incoming Messages Using DKIM Overview of Sender Policy Framework (SPF) and SIDF Veri?cation Domain-based Message Authentication Reporting and Conformance (DMARC) Verification Forged Email Detection Email Encryption Overview of Cisco Email Encryption Encrypting Messages Determining Which Messages to Encrypt Inserting Encryption Headers into Messages Encrypting Communication with Other Message Transfer Agents (MTAs) Working with Certificates Managing Lists of Certificate Authorities Enabling TLS on a Listener?s Host Access Table (HAT) Enabling TLS and Certi?cate Verification on Delivery Secure/Multipurpose Internet Mail Extensions (S/MIME) Security Services Using System Quarantines and Delivery Methods Describing Quarantines Spam Quarantine Setting Up the Centralized Spam Quarantine Using Safelists and Blocklists to Control Email Delivery Based on Sender Configuring Spam Management Features for End Users Managing Messages in the Spam Quarantine Policy, Virus, and Outbreak Quarantines Managing Policy, Virus, and Outbreak Quarantines Working with Messages in Policy, Virus, or Outbreak Quarantines Delivery Methods Centralized Management Using Clusters Overview of Centralized Management Using Clusters Cluster Organization Creating and Joining a Cluster Managing Clusters Cluster Communication Loading a Configuration in Clustered Appliances Best Practices Testing and Troubleshooting Debugging Mail Flow Using Test Messages: Trace Using the Listener to Test the Appliance Troubleshooting the Network Troubleshooting the Listener Troubleshooting Email Delivery Troubleshooting Performance Web Interface Appearance and Rendering Issues Responding to Alerts Troubleshooting Hardware Issues Working with Technical Support References Model Specifications for Large Enterprises Model Specifications for Midsize Enterprises and Small-to-Midsize Enterprises or Branch O?ces Cisco Email Security Appliance Model Specifications for Virtual Appliances
Duration 1 Days 6 CPD hours This course is intended for This overview-level course is ideally suited for professionals seeking an introduction to microservices architecture and its application within a business context. Ideal attendee roles include software developers, system architects, technical managers, and IT professionals who are part of teams transitioning to a microservices approach. It's also an excellent starting point for non-technical roles such as product owners or business analysts who work closely with technical teams and want to better understand and become conversant in the language and principles of microservices. Overview This course combines engaging instructor-led presentations and useful demonstrations with engaging group activities. Throughout the course you'll explore: Understand the Basics of Microservices: Get to know the fundamental principles and characteristics of microservices and how they revolutionize traditional software development approaches. Explore the Design of Microservices: Gain an overview of how microservices are designed based on business requirements and what makes them unique in the software architecture world. Overview of Managing and Scaling Microservices: Get an introduction to how microservices are managed and scaled independently, and understand the significance of these features in your business operations. Familiarize with the Microservices Ecosystem: Learn about the typical patterns, best practices, and common pitfalls in the microservices world, setting a foundation for future learning and implementation. Introduction to Microservices in a Business Context: Acquire a basic understanding of how microservices can be aligned with specific business capabilities, and get a glimpse into how they can coexist with legacy systems in a business setting. Microservices have rapidly emerged as a popular architectural style, breaking down applications into small, independent services that can be developed, deployed, and scaled individually. Microservices offer a robust method to address a variety of projects, such as e-commerce platforms and content management systems, enhancing scalability and boosting productivity. This technology, when employed correctly, can greatly increase software delivery speed and system resilience, making it a crucial skill set for modern technology professionals.Understanding Microservices - A Technical Overview is a one-day course ideally suited for technical professionals seeking an introduction to microservices architecture and its application within a business context. Under the guidance of an industry expert, this engaging class combines lecture-style learning with lively demonstrations, case study review and group discussions.Throughout the course you?ll explore the principles and characteristics that define microservices, how to identify suitable projects for a microservices approach, the factors to consider when designing them, and the strategies to effectively manage and scale them within complex systems. You?ll also learn about the best practices, patterns, and anti-patterns, arming you with the knowledge to make the right architectural choices. This course also explores the real-world implementation of microservices in a business enterprise. We'll discuss how to align the application of microservices with your organization's specific business capabilities, and offer strategies for smoothly integrating this technology within existing legacy systems. Introduction to Microservices Understand what microservices are and their role in modern software development. Introduction to Microservices: what they are and why they matter. Monolithic vs Microservices: highlighting the shift and benefits. Key principles and characteristics of microservices. Identifying suitable applications for microservices transformation. Demo: Analyzing a sample application and identifying potential microservices Architecting and Managing Microservices Learn the basic strategies for scaling and managing microservices. Scaling Microservices: from a single service to hundreds. Key components of a microservices architecture. Introduction to resilience patterns: Circuit-Breakers and Bulkheads. Load management and provisioning in a microservices setup. Understanding the role of cloud services in microservices. Optional Demo: Illustrating how a microservice-based application scales in real-time Designing Microservices Learn the key aspects to consider when designing microservices. Defining microservice boundaries: Deciding the scope of a microservice. Communication patterns in microservices. Understanding Microservice endpoints. Exploring data stores and transaction boundaries in microservices. Overcoming challenges in Microservices design. Demo: Designing microservices for a hypothetical business requirement Implementing Microservices in a Business Enterprise Understand the process and considerations for implementing microservices in an enterprise context. Assessing enterprise readiness for microservices. Building the business case for microservices: strategic advantages and potential challenges. Aligning microservices with business capabilities. Organizational changes: Team structures and processes for microservices. Dealing with Legacy Systems: Strategies for microservices integration. Demo: Exploring a case study of successful microservices implementation in a business enterprise The Microservices Ecosystem Understand the key tools and best practices in the Microservices ecosystem. Understanding the typical Microservices Stack. Monitoring and Logging in Microservices. Introduction to Docker: Containerization of Microservices. Deployment strategies in a Microservices setup. Introduction to Orchestration in Microservices Demo: Containerizing and deploying a simple microservice Microservices Deployment Strategies Understand various ways to safely introduce changes in a microservices environment. The concept of Blue-Green Deployment: changing services without downtime. Canary Releases and Feature Toggles: slowly rolling out changes to users. Database changes in a microservices environment: keeping data consistent. Demo: Examining various deployment strategies Microservices Best Practices and DevOps Learn key strategies to ensure a smooth operation of your microservices setup. The DevOps culture in Microservices: collaboration for efficiency. Defining a Minimum Viable Product in a Microservices setup: building small, delivering fast. Dealing with data in a distributed setup: managing Data Islands. The importance of Continuous Integration/Continuous Delivery in a microservices setup. Governance: Keeping track of your services and their consumers. Demo: Visualizing a simple continuous delivery pipeline Microservices Patterns and Anti-Patterns Learn about common do's and don'ts when working with microservices. Understanding patterns that help with efficient microservices operation. Recognizing and avoiding anti-patterns that can hinder performance. Dealing with common challenges: dependencies between services, managing service boundaries. Demo: Examples of real-world patterns and anti-patterns Simple Overview of OAuth and OpenID for Microservices Introduction to OAuth and OpenID: What they are and why they matter in Microservices. The role of tokens in OAuth 2.0: How they help in securing communications. A simplified look at OpenID Connect: Linking identities across services. Demo
Duration 5 Days 30 CPD hours This course is intended for The audience includes implementers, developers, system administrators, project teams, database administrators and engine project technical teams. The audience also includes consultants that are looking to gain an understanding of Maximo Asset Management 7.6.0.x and the engine. Overview After completing this course, you should be able to perform the following tasks: List the components of Tivoli's process automation engine Understand Maximo modules and applications Understand Tivoli's Process Automation Engine Create the foundation data necessary for Maximo Asset Management Customize the engine database and applications Automate IBM Service Management applications using workflows Use the Maximo Work Centers Use the Integration Framework to import and export data This course is designed for anyone planning to use Maximo Asset Management and Tivoli?s process automation engine with one of the IBM System Management (ISM) products. It is a course that introduces you to the features and functions of both products. IBM Maximo Asset Management Overview This unit focuses on Maximo as an overall product and how Maximo assists companies with their asset management lifecycle. Tivoli Process Automation Engine This unit describes the functions of Tivoli?s process automation engine and introduces the products that are based on the engine. This unit also introduces Start Centers and basic navigation. Architecture and components This unit covers the architecture of Tivoli?s process automation engine. The various components that make up the system are described. The unit will address Java EE servers and the basic use of WebSphere© as it relates to the engine. The unit then covers the organization of the administrative workstation and system properties. The unit briefly describes the setup of the system for using attachments. Foundation Data This unit covers the creation of foundation data for Tivoli?s process automation engine. The foundation data is the software constructs that are necessary in the basic configuration of the product. These constructs include organizations, sites, locations, classifications, and various engine financial configurations. Security Security addresses the need to protect system resources from unauthorized access by unauthenticated users. Resources in the system are protected by Authentication and Authorization. Database architecture This unit illustrates the possible database configurations using the Database Configuration application. It also presents specific command lines that you can run to configure the changes made on the attributes of business objects using the Database Configuration application. Work Management Work Management is a collection of components and products that work together to form a powerful process and work management system. This unit provides a look at work management and focuses on using Work Management to generate, process, and complete work orders. Customizing an application This unit provides an overview of the Application Designer and Migration Manager. You will learn how to change, duplicate and create applications. You will learn the process to move from development, integration testing, user acceptance testing and moving to production. Automation This unit provides a high-level overview of key automation application programs and their functionality. It describes cron tasks, which are used to automate jobs in the system. The unit then discusses various communication tools in the system such as Communication Templates and the E mail Listener application. Finally, automated means of notification using escalations and actions are covered. Workflow This unit focuses on workflow. You learn about the Workflow Designer and its tools. You also learn how to modify an existing workflow and how to manage the included workflows. Reporting This unit provides an overview of the data analysis and reporting options that you can use in the system to analyze data. You create query by example (QBE) reports, result sets, key performance indicators (KPI), and query-based reports (QBRs). Students can optionally review Appendix A to learn how to create a simple enterprise report using Business Intelligence Reporting Tools (BIRT) designer. This report provides an example of how developers create more complex, widely used reports for users. Integration Framework In this unit, a high-level overview of the Integration Framework is provided. The Integration Framework architecture and components are described and basic configuration steps are described. The configuration and steps for loading and exporting data to and from the system are covered. You have the opportunity to practice them also. Budget Monitoring This unit provides information on a new feature introduced in Maximo 7.6.0.8, the Budget Monitoring application. In this application, you can create budget records to monitor transactions in a financial period. Inspection Tools and Tasks This unit introduces the new Inspection application. You can use the Inspections tools to create online inspection forms by using your desktop computer or laptop, and you can use the forms to complete an inspection by using your desktop computer, laptop, or tablet. Troubleshooting This unit focuses on troubleshooting as a systematic approach to solving a problem. The goal is to determine why something does not work as expected and to resolve the problem. It discusses the configuration of logging in the application. It also covers basic troubleshooting techniques, some important component logs, and information about obtaining help from Tivoli Support. Additional course details: Nexus Humans U5TR712 - IBM Maximo Asset Management - System Administration and Development v7.6x training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the U5TR712 - IBM Maximo Asset Management - System Administration and Development v7.6x course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Course Overview The Computer Maintenance, PAT & Cyber Security course offers a comprehensive introduction to the essential components of modern IT systems, combining core knowledge in hardware setup, system troubleshooting, and security protocols. Designed to build foundational understanding as well as introduce advanced cybersecurity concepts, this course equips learners with the confidence to navigate today’s digital infrastructure. From building a computer to understanding network vulnerabilities, learners will explore a variety of modules that address both traditional and emerging technologies, including IoT and encryption. By the end of the course, students will have developed the skills to identify risks, support device performance, and understand secure systems architecture—essential for any role in technology-focused sectors. Course Description This course blends key topics across computer hardware maintenance, PAT (Portable Appliance Testing), and cyber security to prepare learners for a well-rounded understanding of IT system management. The curriculum begins with assembling and configuring computers, progressing into network security and advanced Windows troubleshooting. Learners are introduced to essential software tools and coding applications like C++ with OpenCV, and gain insights into the Internet of Things and encryption principles. Additionally, the course includes training in cyber security awareness, addressing the latest threats and preventative frameworks. With clear instructional guidance and structured content delivery, the course is suitable for learners aiming to understand technical environments and the protocols behind secure computing. It is ideal for those seeking career progression or looking to explore new opportunities in IT security, maintenance, or systems analysis. Course Modules: Module 01: Building Your Own Computer Module 02: Computer Networks Security from Scratch to Advanced Module 03: Computer Vision By Using C++ and OpenCV with GPU support Module 04: Advance Windows 10 Troubleshooting for IT HelpDesk Module 05: Portable Appliance Testing (PAT) Module 06: Internet of Things Module 07: Cyber Security Awareness Training Module 08: Encryption (See full curriculum) Who is this course for? Individuals seeking to understand IT maintenance and cybersecurity principles. Professionals aiming to broaden their knowledge of system configuration and data protection. Beginners with an interest in computer technology and digital safety. Employers looking to upskill their IT or facilities staff in security and device compliance. Career Path IT Support Specialist Systems Administrator Network Security Analyst Cyber Security Consultant Electrical Safety Compliance Officer Technical Services Coordinator
Duration 5 Days 30 CPD hours This course is intended for Cloud Solutions Architects DevOps Engineers Individuals using Google Cloud Platform who deploy applications, monitor operations, and manage enterprise solutions Overview At course completion, you will have attained knowledge of: Fundamentals of Google Cloud Platform (GCP) Google Cloud Storage Google Compute Engine Google Cloud SQL Load Balancing (LB) Google Cloud Monitoring Auto-Scaling Virtual Private Cloud (VPC) Network Cloud Identity and Access Management (IAM) Cloud CDN and DNS Cloud VPN Google Cloud Deployment Manager Google Container Engine Cloud Run Cloud Bigtable Cloud Datastore Cloud BigQuery Cloud DataFlow Cloud DataProc Cloud Pub/Sub In this course you will attain a deep knowledge of Google Cloud Platform infrastructure and design patterns on developing applications on GCP. This course will prepare you for the Google Cloud Architect Associate Certification Exam. Fundamentals of Google Cloud Platform (GCP) Overview Regions and Zones Review of major GCP services Google Cloud Storage Fundamental APIs Consistency Cloud Storage Namespace Buckets and Objects Bucket and Object Naming Guidelines Encryption Object Versioning Object Lifecycle Management Access Control Access Control Lists Signed URL Multipart upload Resumable upload Understanding Pricing for Cloud Storage Offline Media Import/Export Architecture case study of common Use Cases of Google Cloud Storage Hands-on: Cloud Storage Lab; Creating Buckets, objects, and managing access control Google Compute Engine Compute Engine Architecture VM Instances types Persistence Disks Images Generating Custom Images IP Addresses Static IPs Ephemeral Access Control Options IAM Service Account Monitoring Instances with Google Cloud Monitoring Compute Engine Networks and Firewalls Hands-on: Hosting an Application on Compute Engine Google Cloud SQL Core advantages of Cloud SQL Cloud SQL database instance types Access Control High availability options Failover Read replica Backup options On Demand Automated Understanding Pricing of Cloud SQL Load Balancing (LB) Fundamentals of a Load Balancer Network Load balancing HTTPS Load balancing Cross region Load balancing Content Load balancing Target proxies SSL Load Balancing Internal Load Balancing Network Load Balancing Understanding Pricing for Load Balancer Google Cloud Monitoring Architecture of Cloud Monitoring Supported metrics Stackdriver Monitoring APIs Auto-Scaling Overview of Autoscaling Auto-scaling Fundamentals Instance groups Templates Policies Decisions Hands-on: Deploying a scale application on GCP using Autoscaling, Compute Engine, Cloud SQL, Load Balancers. Virtual Private Cloud (VPC) Network Salient features of Virtual Private Cloud (VPC) Network Infrastructure Virtual Private Cloud (VPC) Networking Fundamentals Subnetworks Firewall Internal DNS Network Routes Hands-on: Hosting Secure Applications in Google Cloud VPC Networks Cloud Identity and Access Management (IAM) Introduction User and Service Accounts IAM Roles Policy Hands-on: Managing Users, Policies and Granting Roles using Service Accounts Cloud CDN and DNS What is CDN Google Cloud CDN Cloud CDN Concepts Some of the Cloud CDN Edge locations Cloud DNS Cloud DNS Terminologies Supported Record Types Hands-on: Moving an Existing Domain Name to Cloud DNS Cloud VPN Cloud VPN overview Types of Cloud VPN Specifications Maintenance and Availability Google Cloud Deployment Manager Deployment Manager Deployment Manager Fundamentals Runtime Configurator Quotas Hands-on: Generating and Creating Cloud Deployment Manager Template Google Container Engine Google Container Engine Overview Docker Overview Kubernetes Terminologies Replication Controller Deployment Price and Quotas Hands-on: Deploying WordPress Cluster using Container Engine Cloud Run Overview of Cloud Run Deploy a Prebuilt Sample container Cloud Bigtable Overview of Cloud Bigtable Access Control Performance Locations Cloud Datastore Overview of Cloud Datastore Limits Storage Size Multitenancy Benefits of Multitenancy Encryption Locations Cloud BigQuery BigQuery Overview Interacting with BigQuery Datasets, Tables, and Views Partitioned Tables Query Plan Explanation Hands-on: Getting Started with BigQuery Cloud DataFlow Overview Programming Model DataFlow SDK 1.x for java Cloud Dataflow SDK 2.x Security and Permissions Advanced Access Control Cloud DataProc Overview Clusters Versioning Cloud Pub/Sub Overview of Cloud Pub/Sub Pub/Sub Concepts and Message Flow Data Model Cleanup of All Services Hands-on: Cloud Pub/Sub Lab with Background Cloud Function Additional course details: Nexus Humans Google Cloud Engineer Associate Certification Bootcamp training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Google Cloud Engineer Associate Certification Bootcamp course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Build Your Own PC: A Beginner's Guide Course Overview "Build Your Own PC: A Beginner's Guide" is designed for individuals looking to gain an understanding of computer hardware and the process of assembling a fully functional PC. The course covers the essential components involved in building a computer, from selecting the right hardware to installing software and ensuring network connectivity. Learners will also be introduced to building gaming PCs and maintaining their machines for optimal performance. Upon completion, learners will have the skills to confidently build, troubleshoot, and maintain their own PC, opening up opportunities for personal and professional growth in the IT sector. Course Description This course provides an in-depth look into the world of computer building, starting with the basics of understanding computer components and their roles in a functional system. Learners will explore key hardware, including processors, motherboards, RAM, and storage devices, while also learning the significance of peripheral devices. The course includes modules on software installation, networking, and even building a gaming PC. With a focus on providing clear, structured guidance, learners will gain a strong foundation in assembling and maintaining PCs, preparing them for various roles in the technology sector. The course is ideal for beginners and those looking to improve their technical expertise. Build Your Own PC: A Beginner's Guide Curriculum Module 01: Introduction to Computer & Building PC Module 02: Overview of Hardware and Parts Module 03: Building the Computer Module 04: Input and Output Devices Module 05: Software Installation Module 06: Computer Networking Module 07: Building a Gaming PC Module 08: Maintenance of Computers (See full curriculum) Who is this course for? Individuals seeking to understand how computers work and how to build one. Professionals aiming to enhance their IT skills for career development. Beginners with an interest in technology and computer systems. Hobbyists interested in assembling their own custom-built PCs. Career Path IT Support Technician Systems Administrator PC Hardware Specialist Network Technician Gaming PC Builder and Technician
Financial Analysis Course Overview The "Financial Analysis" course provides a comprehensive introduction to financial analysis, equipping learners with the knowledge and skills needed to interpret and evaluate financial statements. Covering key areas such as balance sheets, income statements, and cash flow analysis, this course enables learners to assess financial performance and make informed decisions. Whether you are starting your career in finance or aiming to enhance your existing knowledge, this course offers essential tools for financial analysis. Upon completion, learners will be able to analyse financial data effectively, understand the key financial indicators of businesses, and contribute to strategic financial decision-making. Course Description This course covers the fundamentals of financial analysis, providing in-depth insights into financial statements, including balance sheets, income statements, and cash flow statements. Learners will explore various financial reporting techniques, evaluate profitability, and develop the ability to conduct ratio and equity analysis. The course also delves into the applications and limitations of EBITDA and teaches learners to assess credit risks. By the end of the course, participants will have gained valuable skills in financial data interpretation, enabling them to assess financial health and contribute to strategic financial decisions in organisations. The learning experience combines theoretical knowledge with practical analytical skills to prepare learners for roles in finance and accounting. Financial Analysis Curriculum: Module 01: Introduction to Financial Analysis Module 02: The Balance Sheet Module 03: The Income Statement Module 04: The Cash Flow Statement Module 05: Financial Reporting Module 06: Analysing Profitability Module 07: The Applications and Limitations of EBITDA Module 08: Credit Analysis Module 09: Equity Analysis Module 10: Ratio Analysis (See full curriculum) Who is this course for? Individuals seeking to understand financial analysis Professionals aiming to enhance their financial reporting and decision-making skills Beginners with an interest in finance or accounting Business owners looking to improve their financial literacy Career Path Financial Analyst Accountant Credit Analyst Financial Consultant Corporate Finance Manager Business Intelligence Analyst Investment Analyst