• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

210 Courses in Cardiff delivered Live Online

Certified Kanban System Design – KMP I - 30 Apr - 2 May

By Tom Reynolds

Attend our world class Kanban University accredited Certified Kanban System Design training course and learn to implement Kanban in your company

Certified Kanban System Design – KMP I - 30 Apr - 2 May
Delivered OnlineFlexible Dates
£1,074 to £1,195

Certified Kanban System Design – KMP I - 17-19 December

By Tom Reynolds

Attend our world class Kanban University accredited Certified Kanban System Design training course and learn to implement Kanban in your company

Certified Kanban System Design – KMP I - 17-19 December
Delivered OnlineFlexible Dates
£1,074 to £1,194

Certified Kanban System Design – KMP I - 24-26 September

By Tom Reynolds

Attend our world class Kanban University accredited Certified Kanban System Design training course and learn to implement Kanban in your company

Certified Kanban System Design – KMP I - 24-26 September
Delivered OnlineFlexible Dates
£1,074 to £1,194

Certified Kanban System Design – KMP I - 19-21 November

By Tom Reynolds

Attend our world class Kanban University accredited Certified Kanban System Design training course and learn to implement Kanban in your company

Certified Kanban System Design – KMP I - 19-21 November
Delivered OnlineFlexible Dates
£1,074 to £1,194

JMR - Junos Multicast Routing

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Network engineers, technical support personnel, reseller support engineers, and others responsible for implementing and/or maintaining the Juniper Networks products covered in this course. This course benefits individuals responsible for implementing, monitoring, and troubleshooting multicast components in a service provider's network. Overview Identify the components of IP multicast Explain how IP multicast addressing works Identify the need for reverse path forwarding (RPF) in multicast Explain the role of IGMP and describe the available IGMP versions Configure and monitor IGMP Explain the differences between dense-mode and sparse-mode protocols Describe rendezvous point (RP) discovery options Configure and monitor PIM dense and sparse modes Configure and monitor rendezvous point discovery mechanisms Explain the purpose and operation of MSDP Describe the usage of MSDP within a single PIM domain with Anycast RP Describe the usage of MSDP across multiple PIM domains Configure and monitor MSDP Compare the any-source multicast (ASM) and source-specific multicast (SSM) service models Describe the basic requirements, benefits, and caveats of SSM List the address ranges used for SSM Illustrate the role of IGMPv3 and PIM-SM in an SSM implementation Configure and monitor SSM Describe the default PIM sparse mode information distribution Explain how routing policies alter PIM message traffic Describe how MSDP advertises messages to established peers Identify the role of a policy in controlling MSDP message advertisement Explain how you can use a policy to scope multicast groups This two-day course is designed to provide students with detailed coverage of multicast protocol. Course IntroductionIntroduction to Multicast Overview of Multicast Multicast Addresses Reverse Path Forwarding Internet Group Management Protocol Multicast Routing Protocols Overview of Multicast Routing Protocols PIM-DM PIM-SM MSDP MSDP Anycast RP Source-Specific Multicast Overview of SSM Operation SSM Addresses IGMPv3 and SSM PIM-SM and SSM SSM Case Study Multicast and Policy Multicast and Policy Overview Controlling PIM Join and Register Messages Controlling BSR Messages Controlling MSDP SA Messages Implementing Multicast Scoping

JMR - Junos Multicast Routing
Delivered OnlineFlexible Dates
Price on Enquiry

Kubernetes Administration

By Nexus Human

Duration 4 Days 24 CPD hours Overview Topics Include:Installation of a multi-node Kubernetes cluster using kubeadm, and how to grow a cluster.Choosing and implementing cluster networking.Various methods of application lifecycle management, including scaling, updates and roll-backs.Configuring security both for the cluster as well as containers.Managing storage available to containers.Learn monitoring, logging and troubleshooting of containers and the cluster.Configure scheduling and affinity of container deployments.Use Helm and Charts to automate application deployment.Understand Federation for fault-tolerance and higher availability. In this vendor agnostic course, you'll learn the installation, configuration and administration of a production-grade Kubernetes cluster. Introduction Linux Foundation Linux Foundation Training Linux Foundation Certifications Laboratory Exercises, Solutions and Resources Distribution Details Labs Basics of Kubernetes Define Kubernetes Cluster Structure Adoption Project Governance and CNCF Labs Installation and Configuration Getting Started With Kubernetes Minikube kubeadm More Installation Tools Labs Kubernetes Architecture Kubernetes Architecture Networking Other Cluster Systems Labs APIs and Access API Access Annotations Working with A Simple Pod kubectl and API Swagger and OpenAPI Labs API Objects API Objects The v1 Group API Resources RBAC APIs Labs Managing State With Deployments Deployment Overview Managing Deployment States Deployments and Replica Sets DaemonSets Labels Labs Services Overview Accessing Services DNS Labs Volumes and Data Volumes Overview Volumes Persistent Volumes Passing Data To Pods ConfigMaps Labs Ingress Overview Ingress Controller Ingress Rules Labs Scheduling Overview Scheduler Settings Policies Affinity Rules Taints and Tolerations Labs Logging and Troubleshooting Overview Troubleshooting Flow Basic Start Sequence Monitoring Logging Troubleshooting Resources Labs Custom Resource Definition Overview Custom Resource Definitions Aggregated APIs Labs Kubernetes Federation Overview Federated Resources Labs Helm Overview Helm Using Helm Labs Security Overview Accessing the API Authentication and Authorization Admission Controller Pod Policies Network Policies Labs

Kubernetes Administration
Delivered OnlineFlexible Dates
Price on Enquiry

WM103 IBM Technical Introduction to IBM MQ

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This basic course is designed for system administrators, system architects, application developers, quality assurance specialists, and technical sales and marketing professionals. Overview After completing this course, you should be able to: Summarize current business drivers and the need for flexibility Describe enterprise messaging and the capabilities it must provide Identify the main ways that IBM© MQ can impact application design Describe the basic components of IBM© MQ Differentiate between point-to-point and IBM© MQ cluster connectivity Summarize queue manager and queue manager components administrative tasks Contrast the architectural role of IBM© MQ clusters and multiple instance queue managers Describe the security provisions of IBM© MQ and IBM© MQ Advanced Message Security Describe how IBM© MQ is used as part of the communications infrastructure to: Connect application environments, such as the World Wide Web, enterprise transaction systems, and database systems Manage the distribution of publisher information to appropriate subscribers Provide file transfer management with IBM© MQ Managed File Transfer Serve as a JMS provider Interface with WebSphere Application Server Store in-flight messages for IBM© Integration Bus Interact with z/OS applications Facilitate connectivity to mobile environments with IBM© MQ Telemetry Describe the options for deployment to the Cloud In this course, you learn about IBM© MQ V9 basic components and the path that messages follow when they are exchanged between applications. You also learn how IBM© MQ administrative responsibilities can include the management of topic-based publish/subscribe messaging, managed file transfer, and deployments to the cloud. Topics include an overview of the support that IBM© MQ provides for security, publish/subscribe, high availability, administration, logging, auditing, managed file transfer, MQTT, and cloud options. Course introductionIBM© MQ overviewIBM© MQ basicsMessaging styles, topologies, and architecture overviewSystem administration overviewSecurity overviewIntroduction to IBM© MQ Managed File TransferIntroduction to IBM© MQ Telemetry and IBM© MessageSightIntroduction to the IBM© MQ ApplianceExpanding the scope of IBM© MQCourse summary

WM103 IBM Technical Introduction to IBM MQ
Delivered OnlineFlexible Dates
Price on Enquiry

BO100 SAP Reporting with SAP BusinessObjects BI Solutions for SAP Business Warehouse

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course are Application Consultants, Business Analysts, Business Process Owners/Team Leads/Power Users, Data Consultants /Managers, Program/Project Managers, and Solution Architects. Overview Gain hands-on experience in running SAP BusinessObjects BI tools on top of SAP NetWeaver BW data In this course, students are provided with detailed knowledge on the integration for reporting of SAP BusinessObjects BI Platform 4.x with SAP NetWeaver 7.x. Overview of SAP BusinessObjects Business Intelligence(BI) 4.x and SAP NetWeaver Describing SAP BusinessObjects 4.x Semantic Layer in SAP BusinessObjects BI 4.x and Data Connectivity Describing Semantic Layer Technology Creating a Universe with the Information Design Tool SAP BusinessObjects Analysis, Edition for Microsoft Office and SAP NetWeaver BW Creating a Workbook in SAP BusinessObjects Analysis, Edition for Microsoft Office Creating a Workbook with SAP BusinessObjects Analysis, Edition for Microsoft Office and SAP BW SAP BusinessObjects Analysis, Edition for OLAP and SAP NetWeaver BW Creating a Workspace with SAP BusinessObjects Analysis, Edition for OLAP Creating a Workspace in SAP BusinessObjects Analysis, Edition for OLAP Based on a BW Query SAP BusinessObjects Design Studio and SAP NetWeaver BW Creating an Analytical Application in SAP BusinessObjects Design Studio Creating an Analytical Application with Scripting SAP BusinessObjects Dashboards and SAP NetWeaver BW Creating a Dashboard with SAP BusinessObjects Dashboards Creating a Dashboard with BEx Query SAP Crystal Reports and SAP NetWeaver BW Creating a Report with SAP Crystal Reports for Enterprise Creating a Report with SAP Crystal Reports 2013 Creating a Report with SAP Crystal Reports 2013 and SAP NetWeaver BW Differentiating SAP Crystal Reports 2013 and SAP Crystal Reports for Enterprise SAP BusinessObjects Web Intelligence and SAP NetWeaver BW Creating a Web Intelligence Document Creating a Web Intelligence Document for SAP NetWeaver BW SAP BusinessObjects Explorer and SAP NetWeaver BW Creating an SAP BusinessObjects Explorer Information Space Describing Data Connectivity between SAP BusinessObjects Explorer and SAP NetWeaver BW Information Distribution Reporting with Mobile Devices Creating Publications with SAP Crystal Reports and SAP BusinessObjects Web Intelligence Integrating BI Content with SAP NetWeaver Enterprise Portal

BO100 SAP Reporting with SAP BusinessObjects BI Solutions for SAP Business Warehouse
Delivered OnlineFlexible Dates
Price on Enquiry

BOE310 SAP BusinessObjects Business Intelligence Platform - Administration and Security

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for System administrators Overview Prepare you to perform key administrative tasks in SAP BusinessObjects Business Intelligence platform to manage users, groups, and objects, and to distribute contents to users. In this course, students perform key administrative tasks in SAP BusinessObjects Business Intelligence platform to manage users, groups, and objects, and to distribute contents to users. SAP BusinessObjects Business Intelligence (BI) Platform Identifying the Components of the SAP BusinessObjects Business Intelligence BI Platform Content and Objects in the SAP BusinessObjects Business Intelligence (BI) Platform Viewing and Modifying Objects in the BI Platform Organizing Objects in the BI Platform Searching for Content in the BI Platform User and User Group Security in the SAP BusinessObjects Business Intelligence (BI) Platform Setting Up Users and Groups Administering Rights Application Security in the SAP BusinessObjects Business Intelligence (BI) Platform Managing Access to Applications Securing Applications Content Distribution Using Scheduling and Alerting Scheduling Objects Managing Instances Managing Calendars Managing Events Configuring Alerts and Alerting Publications and Publishing Designing Publications Additional course details: Nexus Humans BOE310 SAP BusinessObjects Business Intelligence Platform - Administration and Security training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the BOE310 SAP BusinessObjects Business Intelligence Platform - Administration and Security course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

BOE310 SAP BusinessObjects Business Intelligence Platform - Administration and Security
Delivered OnlineFlexible Dates
Price on Enquiry

Primavera Risk Analysis

By Underscore Group

Discover the powerful schedule and cost risk analysis features of PRA. Course overview Duration: 2 days (13 hours) Our Primavera Risk Analysis course gives a detailed introduction to the schedule and risk analysis features of Primavera Risk Analysis. It shows the powerful features of the tool and give hands on practice throughout the course to ensure you can confidentially put your new skills into practice back in the workplace. This course is designed for new users of Primavera Risk Analysis, and no previous experience is required. You should however be familiar with risk management processes and terminology. Objectives  By the end of the course you will be able to: Import schedules into PRA Add three point estimates onto plans Perform schedule and cost analysis Use templated quick risk Run risk analysis Interpret results from the Risk Histogram and Tornado graph Add task percentiles to a Gantt chart Set up a risk register Add qualitative and quantitative risks Link risk to activities in the plan Create reports Use the Distribution Analyser Content Importing schedules Importing MSP and Primavera Schedules Running import checks Checking schedule integrity Schedule risk analysis 3 point estimating Entering uncertainly Different distributions Using quick risk Updating plan Importing plans with 3 point estimates Cost/Resource uncertainty Resource loadings Creating 3 point cost estimates Resource distributions and escalations Simple cost estimates Templated quick risk Setting up and applying templated quick risk Assessing risk at WBS level Running risk analysis Running risk analysis Interpreting results on the Risk Histogram Setting analysis options Task percentiles Setting task percentile options Including task percentiles on the Gantt chart Tornado graph Creating a Tornado graph Viewing sensitivity Analysing sensitivity against activities Setting up the risk register Setting Schema levels Defining criteria and tolerances Setting up a Risk Breakdown Structure (RBS) Working with manageability and proximity Saving scoring matrices Adding custom fields Exporting data Exporting to Excel, Word and PowerPoint Qualitive risks Setting risk IDs Adding risk cause, description and effect Setting up risk details Entering mitigation actions Quantitative risks Linking risks to activities Adding schedule and cost impacts Defining how multiple risks impact Correlation Migrating your plan Adding mitigation actions to your plan as tasks Linking tasks to mitigation actions Actioning your risk register Progressing risks Importing progressed plans Linking register to progressed plans Risk history The Waterfall chart Saving and reporting Exporting the risk register Running reports Creating new reports Building and comparing risk plans Using the distribution analyser Comparing dates and cost

Primavera Risk Analysis
Delivered in Horsham or OnlineFlexible Dates
Price on Enquiry