Duration 2 Days 12 CPD hours This course is intended for People working in an organization aiming to improve performance, especially in response to digital transformation or disruption. Any roles involved in the creation and delivery of products or services: Leadership and CXO, especially CIO, CTO, CPO, and CVO Transformation and evolution leads and change agents Value stream architects, managers, engineers Scrum Masters, agile and DevOps coaches and facilitators Portfolio, product and project managers, and owners Business analysts Architects, developers, and engineers Release and environment managers IT Ops, service and support desk workers Customer experience and success professionals Overview After completing this course, students will be able to: Describe the origins of value stream management and key concepts such as flow, value, and delivery Describe what value stream management is, why it's needed and the business benefits of its practice Describe how lean, agile, DevOps, and ITSM principles contribute to value stream management Identify and describe value streams, where they start and end, and how they interconnect Identify value stream roles and responsibilities Express value streams visually using mapping techniques, define current and target states and hypothesis backlog Write value stream flow and realization optimization hypotheses and experiments Apply metrics such as touch/processing time, wait/idle time, and cycle time to value streams Understand flow metrics and how to access the data to support data-driven conversations and decisions Examine value realization metrics and aligning to business outcomes, and how to sense and respond to them (outcomes versus outputs) Architect a DevOps toolchain alongside a value stream and data connection points Design a continuous inspection and adaptation approach for organizational evolution The Value Stream Management Foundation course from Value Stream Management Consortium, and offered in partnership with DevOps Institute, is an introductory course taking learners through a value stream management implementation journey. It considers the human, process, and technology aspects of this way of working and explores how optimizing value streams for flow and realization positively impacts organizational performance. History and Evolution of Value Stream Management and its Application Value stream management?s origins Definitions of value stream management Flow Lean and systems thinking and practices Agile, DevOps and other frameworks Research and analysis Identifying Value Streams What is a value stream? Identifying value streams Choosing a value stream Digital value streams Value stream thinking Mapping Value Streams Types of maps Value stream mapping The fuzzy front end Artifacts 10 steps to value stream mapping Mapping and management VSM investment case Limitations of value stream mapping Connecting DevOps Toolchains CICD and the DevOps toolchain Value stream management processes Value stream management platforms DevOps tool categories Building an end-to-end DevOps toolchain Common data model and tools integrations Value Stream Metrics The duality of VSM Downtime in technology Lean, DORA and Flow metrics Definition of Done Value metrics Benefits hypotheses Value streams as profit centers KPIs and OKRs Inspecting the Value Stream 3 Pillars of Empiricism Organizational performance Visibility When to inspect Data and discovery Insights and trends Organizing as Value Streams Value stream alignment Team types and topologies Project to product Hierarchy to autonomy Target Operating Model Value stream people Value stream roles Value stream funding Evolving Value Streams Why now? Transitions VSM capability matrix VSM culture iceberg Learning Making local discoveries global improvements Managing value stream interdependencies
Ensuring an efficient flow of goods and services between manufacturers and their skilled trade customer base.
Duration 3 Days 18 CPD hours This course is intended for This course is intended for solutions architects, solution-design engineers, developers seeking an understanding of AWS architecting and individuals seeking the AWS Solutions Architect-Associate certification. Overview Identify AWS architecting basic practices. Explore using the AWS management tools: The AWS Console, Command Line Interface (CLI), and CloudFormation in a lab environment. Examine the enforcement of accounts security using policies. Identify the elements that build an elastic, secure, virtual network that includes private and public subnets. Practice building an AWS core networking infrastructure. Determine strategies for a layered security approach to Virtual Private Cloud (VPC) subnets. Identify strategies to select the appropriate compute resources based on business use-cases. Practice building a VPC and adding an Elastic Cloud Compute (EC2) instance in a lab environment. Practice installing an Amazon Relational Database Service (RDS) instance and an Application Load Balancer (ALB) in the VPC you created. Compare and contrast AWS storage products and services, based on business scenarios. Compare and contrast the different types of AWS database services based on business needs. Practice building a highly available, auto-scaling database layer in a lab. Explore the business value of AWS monitoring solutions. Identify the role of monitoring, event driven load balancing, and auto scaling responses, based on usage and needs. Identify and discuss AWS automation tools that will help you build, maintain and evolve your infrastructure. Discuss network peering, VPC endpoints, gateway and routing solutions based on use-cases. Discuss hybrid networking configurations to extend and secure your infrastructure. Discuss the benefits of microservices as an effective decoupling strategy to power highly available applications at scale. Explore AWS container services for the rapid implementation of an infrastructure-agnostic, portable application environment. Identify the business and security benefits of AWS serverless services based on business examples. Practice building a serverless infrastructure in a lab environment. Discuss the ways in which AWS edge services address latency and security. Practice building a CloudFront deployment with an S3 backend in a lab environment. Explore AWS backup, recovery solutions, and best practices to ensure resiliency and business continuity. Build a highly available and secure cloud architecture based on a business problem, in a project-based facilitator-guided lab. Architecting on AWS is for solutions architects, solution-design engineers, and developers seeking an understanding of AWS architecting. In this course, you will learn to identify services and features to build resilient, secure and highly available IT solutions on the AWS Cloud. Architectural solutions differ depending on industry, types of applications, and business size. AWS Authorized Instructors emphasize best practices using the AWS Well-Architected Framework, and guide you through the process of designing optimal IT solutions, based on real-life scenarios. The modules focus on account security, networking, compute, storage, databases, monitoring, automation, containers, serverless architecture, edge services, and backup and recovery. At the end of the course, you will practice building a solution and apply what you have learned with confidence. Prerequisites AWS Cloud Practitioner Essentials classroom or digital training, or Working knowledge of distributed systems Familiarity with general networking concepts Familiarity with IP addressing Working knowledge of multi-tier architectures Familiarity with cloud computing concepts 0 - Introductions & Course Map review Welcome and course outcomes 1 - Architecting Fundamentals Review AWS Services and Infrastructure Infrastructure Models AWS API Tools Securing your infrastructure The Well-Architected Framework Hands-on lab: Explore Using the AWS API Tools to Deploy an EC2 Instance 2 - Account Security Security Principals Identity and Resource-Based Policies Account Federation Introduction to Managing Multiple Accounts 3 - Networking, Part 1 IP Addressing Amazon Virtual Private Cloud (VPC), Patterns and Quotas Routing Internet Access Network Access Control Lists (NACLs) Security Groups 4 - Compute Amazon Elastic Cloud Compute (EC2) EC2 Instances and Instance Selection High Performance Computing on AWS Lambda and EC2, When to Use Which Hands-On Lab: Build Your Amazon VPC Infrastructure 5 - Storage Amazon S3, Security, Versioning and Storage Classes Shared File Systems Data Migration Tools 6 - Database Services AWS Database Solutions Amazon Relational Database Services (RDS) DynamoDB, Features and Use Cases Redshift, Features, Use Cases and Comparison with RDS Caching and Migrating Data Hands-on Lab: Create a Database Layer in Your Amazon VPC Infrastructure 7 - Monitoring and Scaling Monitoring: CloudWatch, CloudTrail, and VPC Flow Logs Invoking Events 8 - Automation CloudFormation AWS Systems Manager 9 - Containers Microservices Monitoring Microservices with X-Ray Containers 10 - Networking Part 2 VPC Peering & Endpoints Transit Gateway Hybrid Networking Route 53 11 - Serverless Architecture Amazon API Gateway Amazon SQS, Amazon SNS Amazon Kinesis Data Streams & Kinesis Firehose Step Functions Hands-on Lab: Build a Serverless Architecture 12 - Edge Services Edge Fundamentals Amazon CloudFront AWS Global Accelerator AWS Web Application Firewall (WAF), DDoS and Firewall Manager AWS Outposts Hands-On Lab: Configure an Amazon CloudFront Distribution with an Amazon S3 Origin 13 - Backup and Recovery Planning for Disaster Recovery AWS Backup Recovery Strategie Additional course details: Nexus Humans Architecting on AWS training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Architecting on AWS course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This course is designed for Administrators who need to setup, configure and manage SharePoint Online as part of their Office 365 Administration. Overview After completing this course, students will gain the skills to: - Understand the architecture of SharePoint Online - Have knowledge of all the components in SharePoint Online - Have on hands on experience configuring the components of SharePoint Online - Have hands on experience configuring the options - Work with Site Collections and storage options - Manage user profiles and social profiling - Understand and configure data connectivity in SharePoint Online - Build a taxonomy structure - Understand and configure Search in SharePoint Online - Configure and deploy apps - Understand and define Enterprise content management and data loss prevention. - Configure additional options and features in SharePoint Online such as Information Rights Management This course will introduce the audience to SharePoint Online Administration in Office 365 and explain and demonstrate the configuration options for SharePoint Online. The course is appropriate for existing SharePoint on-premises administrators and new administrators to Office 365 who need to understand how to correctly setup SharePoint Online for their company. The course will also help SharePoint on-premise administrators understand the differences between SharePoint on-premises and SharePoint Online. 1 - INTRODUCTION TO OFFICE 365 AND SHAREPOINT ONLINE Introduction to the Office 365 Administration Center Configure Reporting Accessing SharePoint management tools Accessing security and compliancy Managing Office 365 and SharePoint Online with PowerShell Comparing On Premises SharePoint with SharePoint Online User identity in Office 365 and SharePoint Online Manging user domains Building Hybrid scenarios OneDrive and Sites redirection Yammer redirection Understand hybrid search Hybrid business data connectivity Hybrid taxonomy 2 - WORKING WITH SITE COLLECTIONS Introduction to classic and modern admin centers Creating Site Collections Defining ownership and security for site collections Configuring Storage Configure External Access to site collections Recovering site collections Configure external sharing Managing site collections with PowerShell 3 - MANAGING USER PROFILES Overview of the profile service Defining profile properties Map profile properties to a term store Creating custom profile properties Managing audiences Creating audiences Managing user profile policies Configure trusted my site host locations Configure preferred search center locations Defining read access permission levels Configuring newsfeed options Setup email notifications Configure my site cleanup 4 - WORKING WITH DATA CONNECTIONS Introduction to Data Connections Overview of PowerApps, Flow and PowerBi Overview of the business connectivity service Introduction to BDC definition files Creating BDC definition files Introduction to the secure store service Configuring the secure store service Creating secure store target application settings Configure connections to cloud services Configure connections to on-premises services Tools to build data connections Creating external content types Building external lists using external data 5 - MANAGING THE TERM STORE Overview of the term store Understanding terms and life cycle management Creating term groups Creating the term store Creating Term Sets in the UI Creating Term Sets via importing via a CSV Creating terms in the UI Creating terms via PowerShell and CSOM Manage terms with synonyms and pinning Configure delegated administration 6 - CONFIGURING SEARCH An Introduction to the search service Classic versus Modern search experience Understanding Managed Properties Create Managed Properties Manage Authoritative pages Understand Result sources Create and configure result sources Understand Query rules Promoting results through query rules Remove search results from the index Exporting search configurations Importing search configurations 7 - CONFIGURING APPS An Introduction to Apps Understanding the App Catalog Building the App catalog Adding Apps to the catalog Add Apps to your SharePoint sites Adding Apps via the marketplace store Manage App licensing Configure store access settings Monitoring app usage 8 - ENTERPRISE CONTENT MANAGEMENT IN SHAREPOINT ONLINE An Introduction to ECM in SharePoint Online Components of ECM Office 365 versus classic compliancy Understanding In-Place records management Configure In-Place records management Understanding the records center Build and configure a records center Understanding the compliancy policy center Build a compliancy policy center and configure policies Discover the security and compliancy center Configure an eDiscovery center Build an eDiscovery case Understand data loss prevention Build a data loss prevention policy and query Working with classification and data governance 9 - MANAGE OPTIONS FOR SHAREPOINT ONLINE Configure OneDrive features Configure use of Yammer or Newsfeeds Understand Information Rights Management Configure Information Rights Management Define site classification options Understand early release options for Office 365 Configure Early release options for your Office 365 tenant Manage Access Control Additional course details: Nexus Humans 55238 SharePoint Online for Administrators training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the 55238 SharePoint Online for Administrators course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
The CIPT is the first and only certification of its kind worldwide. It was launched by the IAPP in 2014 and updated in early 2023 to meet the growing need that only tech pros can fill-securing data privacy at all stages of IT product and service lifecycles. Whether you work in the public or private sector, data privacy skills are quickly becoming a must-have-and that's a great opportunity for you. The CIPT certification also holds accreditation under ISO 17024: 2012 About This Course What will you learn? Critical data protection concepts and practices that impact IT Consumer data protection expectations and responsibility How to bake privacy into early stages of IT products and services for cost control, accuracy and speed-to-market How to establish data protection practices for data collection and transfer How to pre-empt data protection issues in the Internet of Things How to factor data protection into data classification and emerging tech such as cloud computing, facial recognition and surveillance How to communicate data protection issues with partners such as management, development, marketing and legal. This course has two programmatic modules, the first four areas focus on the fundamentals of data protection. The second module takes the fundamentals and puts it into practice. MODULE 1: Fundamentals of Information Privacy Unit 1: Common Principles and Approaches to Privacy This unit includes a brief discussion of the modern history of privacy, an introduction to types of information, an overview of information risk management and a summary of modern privacy principles. Unit 2: Jurisdiction and Industries This unit introduces the major privacy models employed around the globe and provides an overview of privacy and data protection regulation by jurisdictions and industry sectors. Unit 3: Information Security: Safeguarding Personal Information This unit presents introductions to information security, including definitions, elements, standards and threats/vulnerabilities, as well as introductions to information security management and governance, including frameworks, controls, cryptography and identity and access management (IAM). Unit 4: Online Privacy: Using Personal Information on Websites and with Other Internet-related Technologies This unit examines the web as a platform, as well as privacy considerations for sensitive online information, including policies and notices, access, security, authentication and data collection. Additional topics include children's online privacy, email, searches, online marketing and advertising, social media, online assurance, cloud computing and mobile devices. MODULE 2: Privacy in Technology Unit 1: Understanding the Need for Privacy in the IT Environment This unit highlights the impact that regulatory activities, security threats, advances in technology and the increasing proliferation of social networks have on IT departments. Unit 2: Core Privacy Concepts This unit reveals how privacy compliance becomes more attainable through developing information lifecycle plans, data identification and classification systems and data flow diagrams. Unit 3: Regulations and Standards Impacting Privacy in IT This unit introduces privacy laws, regulations and standards that can help IT professionals design better privacy programmes and systems to handle personal information throughout the data lifecycle. Unit 4: Privacy in Systems and Applications This unit develops an understanding of the risks inherent in the IT environment and how to address them. Unit 5: Online Privacy Issues This unit presents information about online threats, threat prevention and the role of IT professionals in ensuring proper handling of user data. Unit 6: De-identifying and Anonymizing Personally Identifiable Information This unit reveals the importance of personally identifiable information and methods for ensuring its protection. Unit 7: Cloud Computing This unit evaluates privacy and security concerns associated with cloud services, and standards that exist to advise on their use. Prerequisites There are no prerequisites for this course but attendees would benefit from a review of the materials on the IAPP site. What's Included? 1 years membership of the IAPP Refreshments & Lunch (Classroom courses only) Participant Guide Official Study Guides Official Practice Exam Official Q&A The Exam Fees Who Should Attend? The CIPT credential shows you've got the knowledge to build your organisation's data protection structures from the ground up. With regulators worldwide calling for tech professionals to factor data protection into their products and services, the job market for privacy-trained IT pros has never been stronger. As a result, the CIPT is targeted towards; Data Protection Officers IT Managers and Administrators Records Managers System Developers IT Security specialists Accreditation Our Guarantee We are an approved IAPP Training Partner. You can learn wherever and whenever you want with our robust classroom and interactive online training courses. Our courses are taught by qualified practitioners with a minimum of 25 years commercial experience. We strive to give our delegates the hands-on experience. Our courses are all-inclusive with no hidden extras. The one-off cost covers the training, all course materials, and exam voucher. Our aim: To achieve a 100% first time pass rate on all our instructor-led courses. Our Promise: Pass first time or 'train' again for FREE. *FREE training offered for retakes - come back within a year and only pay for the exam.
Duration 4 Days 24 CPD hours This course is intended for The information protection administrator translates an organization?s risk and compliance requirements into technical implementation. They are responsible for implementing and managing solutions for content classification, data loss prevention (DLP), information protection, data lifecycle management, records management, privacy, risk, and compliance. They also work with other roles that are responsible for governance, data, and security to evaluate and develop policies to address an organization's risk reduction and compliance goals. This role assists workload administrators, business application owners, human resources departments, and legal stakeholders to implement technology solutions that support the necessary policies and controls. Learn how to protect information in your Microsoft 365 deployment. This course focuses on data lifecycle management and information protection and compliance within your organization. The course covers implementation of data loss prevention policies, sensitive information types, sensitivity labels, data retention policies, Microsoft Purview Message Encryption, audit, eDiscovery, and insider risk among other related topics. The course helps learners prepare for the Microsoft Information Protection Administrator exam (SC-400). Prerequisites Foundational knowledge of Microsoft security and compliance technologies. Basic knowledge of information protection concepts. Understanding of cloud computing concepts. Understanding of Microsoft 365 products and services. 1 - Introduction to information protection and data lifecycle management in Microsoft Purview Know your data Protect your data Prevent data loss Govern your data 2 - Classify data for protection and governance Data classification overview Classify data using sensitive information types Classify data using trainable classifiers Review sensitive information and label usage Explore labeled and sensitive content Understand activities related to your data 3 - Create and manage sensitive information types Compare built-in versus custom sensitive information types Create and manage custom sensitive information types Describe custom sensitive information types with exact data match Implement document fingerprinting Create keyword dictionary 4 - Understand Microsoft 365 encryption Learn how Microsoft 365 data is encrypted at rest Understand service encryption in Microsoft Purview Explore customer key management using Customer Key Learn how data is encrypted in-transit 5 - Deploy Microsoft Purview Message Encryption Implement Microsoft Purview Message Encryption Implement Microsoft Purview Advanced Message Encryption Use Microsoft Purview Message Encryption templates in mail flow rules 6 - Protect information in Microsoft Purview Information protection overview Configure sensitivity labels Configure sensitivity label policies Configure auto-labeling policies Manage, monitor, and remediate information protection 7 - Apply and manage sensitivity labels Apply sensitivity labels to Microsoft Teams, Microsoft 365 groups, and SharePoint sites Plan on-premises labeling Configure on-premises labeling for the Unified Labeling Scanner Apply protections and restrictions to email and files Monitor label performance using label analytics 8 - Prevent data loss in Microsoft Purview Data loss prevention overview Identify content to protect Define policy settings for your DLP policy Test and create your DLP policy Prepare Endpoint DLP Manage DLP alerts in the Microsoft Purview compliance portal View data loss prevention reports Implement the Microsoft Purview Extension 9 - Configure DLP policies for Microsoft Defender for Cloud Apps and Power Platform Configure data loss prevention policies for Power Platform Integrate data loss prevention in Microsoft Defender for Cloud Apps Configure policies in Microsoft Defender for Cloud Apps Manage data loss prevention violations in Microsoft Defender for Cloud Apps 10 - Manage data loss prevention policies and reports in Microsoft 365 Configure data loss prevention for policy precedence Implement data loss prevention policies in test mode Explain data loss prevention reporting capabilities Manage permissions for data loss prevention reports Manage and respond to data loss prevention policy violations 11 - Manage the data lifecycle in Microsoft Purview Data Lifecycle Management overview Configure retention policies Configure retention labels Configure manual retention label policies Configure auto-apply retention label policies Import data for Data Lifecycle Management Manage, monitor, and remediate Data Lifecycle Management 12 - Manage data retention in Microsoft 365 workloads Explain retention in Exchange Online Explain retention in SharePoint Online and OneDrive Explain retention in Microsoft Yammer Activate archive mailboxes in Microsoft Exchange Apply mailbox holds in Microsoft Exchange Recover content in Microsoft Exchange 13 - Manage records in Microsoft Purview Records management overview Import a file plan Configure retention labels Configure event driven retention Manage, monitor, and remediate records 14 - Explore compliance in Microsoft 365 Plan for security and compliance in Microsoft 365 Plan your beginning compliance tasks in Microsoft Purview Manage your compliance requirements with Compliance Manager Examine the Compliance Manager dashboard Analyze the Microsoft Compliance score 15 - Search for content in the Microsoft Purview compliance portal Explore Microsoft Purview eDiscovery solutions Create a content search View the search results and statistics Export the search results and search report Configure search permissions filtering Search for and delete email messages 16 - Manage Microsoft Purview eDiscovery (Standard) Explore Microsoft Purview eDiscovery solutions Implement Microsoft Purview eDiscovery (Standard) Create eDiscovery holds Search for content in a case Export content from a case Close, reopen, and delete a case 17 - Manage Microsoft Purview eDiscovery (Premium) Explore Microsoft Purview eDiscovery (Premium) Implement Microsoft Purview eDiscovery (Premium) Create and manage an eDiscovery (Premium) case Manage custodians and non-custodial data sources Analyze case content 18 - Manage Microsoft Purview Audit (Standard) Explore Microsoft Purview Audit solutions Implement Microsoft Purview Audit (Standard) Search the audit log Export, configure, and view audit log records Use audit log searching to investigate common support issues 19 - Prepare Microsoft Purview Communication Compliance Plan for communication compliance Identify and resolve communication compliance workflow Case study--Configure an offensive language policy Investigate and remediate communication compliance alerts 20 - Manage insider risk in Microsoft Purview Insider risk management overview Create and manage insider risk policies Investigate insider risk alerts Take action on insider risk alerts through cases Manage insider risk management forensic evidence Create insider risk management notice templates 21 - Implement Microsoft Purview Information Barriers Explore Microsoft Purview Information Barriers Configure information barriers in Microsoft Purview Examine information barriers in Microsoft Teams Examine information barriers in OneDrive Examine information barriers in SharePoint 22 - Manage regulatory and privacy requirements with Microsoft Priva Create and manage risk management policies Investigate and remediate risk management alerts Create rights requests Manage data estimate and retrieval for rights requests Review data from rights requests Get reports from rights requests 23 - Implement privileged access management Case study--Implementing privileged access management 24 - Manage Customer Lockbox Manage Customer Lockbox requests
Course Objectives At the end of this course you will be able to: Modify the PowerPoint environment Using Master View in order to customise a design template Add and customize SmartArt graphics Add animations and change its effect options Add action buttons to control the flow of the presentation Use various options to customise slide shows Use different PowerPoint file types to distribute presentations ' 1 year email support service Take a closer look at the consistent excellent feedback from our growing corporate clients visiting our site ms-officetraining co uk Customer Feedback Very clearly explained Good pace. Lucy Tailor - ACER ' With more than 20 years experience, we deliver courses on all levels of the Desktop version of Microsoft Office and Office 365; ranging from Beginner, Intermediate, Advanced to the VBA level. Our trainers are Microsoft certified professionals with a proven track record with several years experience in delivering public, one to one, tailored and bespoke courses. Tailored in company training courses: You can choose to run the course exactly as they are outlined by us or we can customise it so that it meets your specific needs. A tailored or bespoke course will follow the standard outline but may be adapted to your specific organisational needs. Customising the PowerPoint Environment Customise the User Interface Set PowerPoint Options Customising Design Templates Modify Slide Masters and Slide Layouts Add Headers and Footers Modify the Notes Master and the Handout Master Adding SmartArt to a Presentation Create SmartArt Modify SmartArt Working with Media Add Audio to a Presentation Add Video to a Presentation Working with Animations Entrance, Emphasis and Exit Animations Animate Charts by Category and Series Customise Animations and Transitions Collaborating on a Presentation Review a Presentation Store and Share Presentations on the Web Customising a Slide Show Annotate a Presentation Set Up a Slide Show Create a Custom Slide Show Add Hyperlinks Add Action Buttons Record a Presentation Securing and Distributing a Presentation Secure a Presentation Create a Video or a CD Distribute the Presentation in different File Formats Who is this course for? Who is this course for? This course is designed for delegates who want to gain the skills necessary to work with design templates, various types of diagrams, special effects, custom slide shows, collaboration functionality, and advanced presentation delivery. Requirements Requirements Preferably, delegates should have attended the Powerpoint Introduction course. Career path Career path Microsoft Office know-how can instantly increase your job prospects as well as your salary. 80 percent of job openings require spreadsheet and word-processing software skills
3 x Online Women's Voice Medicine SessionsThe Journey to Vocal Freedom "Our Voices are like seeds, they can sit dormant until the right conditions present themselves, and when this occurs they come bursting out full bloom!"These sessions are designed as a ritual. We have a consultation at first to determine what to energetically work on and to set intentions. I then guide you through your own Voice Empowerment Journey, we use meditation, affirmations, embodied movement, breathwork and playful sounding to support your journey to a fuller, confident and expressive voice. Things I can support you with: Learning how to trust your Voice How to feel more confident in your own self expression Finding creativity in your flow Understanding how to use your voice for healing How to work with both the Shakti and Shiva energies in sound Finding love for your own authentic Voice and Sound The 3 week online 1-1 Voice Medicine sessions will support you to go deeper into your journey with embodying your voice as a healing tool. This will involve dropping into a new exploration each week: Week 1: Voice Play - Activating the Inner Child Week 2: Voice Power - Learning how to expand your sound Week 3: Voice and Emotion - Explore how to transmute your emotion into embodied sound If you are a practising sound healer, we can also work on how you can open your voice as a healing tool to support your sound healing journeys.This 3 week 1-1 Voice Medicine Journey costs £250. "The journey to vocal freedom is a beautiful one, and is becoming more important for us women as the Feminine energies continue to rise."If you are feeling ready to unleash your inner Goddess through sacred sound, then I would be honoured to support you.
Duration 2 Days 12 CPD hours This course is intended for Network professionals and who design, build, operate, manage, and troubleshoot software-defined networking and security, and application owners who need visibility across multi-cloud environments Overview By the end of the course, you should be able to meet the following objectives: Explain the features and architecture of vRealize Network Insight Describe the vRealize Network Insight installation processes and requirements Navigate the vRealize Network Insight GUI Describe major use cases for vRealize Network Insight and their benefits Deploy vRealize Network Insight Use vRealize Network Insight to monitor, operate, analyze, and troubleshoot the infrastructure supporting your applications This two-day, hands-on course gives you the skills to deploy and use VMware vRealize© Network Insight? to ensure an optimized, highly available, and secure infrastructure for your applications. You will learn the features, components, architecture, and benefits of vRealize Network Insight and how to use it to simplify daily operation and troubleshooting tasks. Course Introduction Introductions and course logistics Course objectives Introduction to vRealize Network Insight Identify the use cases for vRealize Network Insight Access the vRealize Network Insight Home page View vRealize Network Insight entity data Perform searches for specific entity data Create entity search queries Find and use event data vRealize Network Insight Architecture and Components Identify the components of vRealize Network Insight Describe the function of each component and how the components interact Check the health of vRealize Network Insight components vRealize Network Insight Installation Deploy vRealize Network Insight components Configure the pairing relationship between the platform VM and the collector VM Troubleshoot platform VM and collector VM configuration problems Explain how data sources export flow information Add VMware vCenter Server© to vRealize Network Insight Add a VMware NSX-T© data source to vRealize Network Insight Configure IPFIX Distinguish between the mechanisms used to scale vRealize Network Insight Select the appropriate scaling mechanism for your environment Describe how clusters are expanded Integrate VMware vRealize© Operations? with vRealize Network Insight Import a vRealize Network Insight instance into VMware vRealize© Suite Lifecycle Manager? vRealize Network Insight Use Cases Explain use cases for vRealize Network Insight Create vRealize Network Insight applications Perform application discovery Plan and optimize micro-segmentation and security for applications Explain the use of flow analytics Use flow information from physical devices in security planning Generate virtual machine path topologies between entities using flows Extract useful information from path topologies Validate NSX-T and NSX for vSphere deployments Monitor and troubleshoot NSX-T events Operations and Troubleshooting Common Issues Perform vRealize Network Insight operations by using VMware vSphere© tags Use the flow analytics dashboards to perform flow analysis Set and configure thresholds to identify aberrations in the behavior of entities Use vRealize Network Insight tools to troubleshoot common problems Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware vRealize Network Insight: Install, Configure, Manage [v6.1] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware vRealize Network Insight: Install, Configure, Manage [v6.1] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
MySQL for developers training course description This MySQL Developers training course is designed for MySQL Developers who have a good understanding of a MySQL database and experience of using SQL commands. The course provides further practical experience in more advanced MySQL commands and SQL statements including Stored Routines, Triggers and Event Scheduling. What will you learn Provide the skills needed to write more advanced queries and database maintenance statements on a MySQL database. Use advanced features of the MySQL Client. Use advanced data types. Manage the structure of databases and tables. Manage and using indexes. Write complex SQL query statements. Use advanced SQL expressions. Use advanced SQL functions. Perform advanced Insert, Update, Delete, Replace and Truncate Operations. Use user variable syntax and properties. Import and export data from within MySQL. Import and export data from the command line. Perform complex joins to access multiple tables. Perform complex subqueries. Create, manage and us views. Use prepared statements. Create and use stored routines. Create and use triggers. Obtain database metadata. Optimize queries. Work with the main storage engines. Debug MySQL applications. MySQL for developers training course details Who will benefit: MySQL Developers who have a basic understanding of a MySQL database and SQL commands as covered on the Introduction to MySQL course. Prerequisites: MySQL foundation Duration 5 days MySQL for developers training course contents Introduction Administration and Course Materials, Course Structure and Agenda, Delegate and Trainer Introductions. Client/server concepts MySQL client/server architecture, Server modes, Using client programs, Logging in options, Configuration files, Precedence of logging in options Hands on Using client/server The MySQL client program Using MySQL interactively, The MySQL prompts, Client commands and SQL statements, Editing, Selecting a database, Help, Safe updates, Using script files, Using a source file, Redirecting output into a file, Command line execution, Mysql output formats, Overriding the defaults, Html and xml output, MySQL Utilities. Hands on Using the MySQL client program Data types Bit data type, Numeric data types, Auto_increment, Character string data types, Character sets and collation, Binary string data types, Enum and Set data types, Temporal data types, Timezone support, Handling Missing Or Invalid Data Values, SQL_MODE options. Hands on Using data types Identifiers Using Quotes with identifier naming, Case sensitivity in Identifier naming, Qualifying columns with table and database names, Using reserved words as identifiers, Function names Hands on Using identifiers Databases Database properties, Creating a database, Selecting a database, Altering databases, Dropping databases, Obtaining database metadata, The SHOW command, The INFORMATION_SCHEMA database, The SHOW CREATE command Hands on Using databases Tables and indexes Table properties, Creating tables, Create table using Select or Like, Temporary tables and memory tables, Altering tables, Adding columns, Changing column widths and types, Renaming columns, Dropping columns, Adding constraints, Dropping constraints, Renaming tables, Change the table storage engine, Multiple alterations, Dropping tables, Emptying tables, Obtaining table metadata, Show create table, The information_schema, Index introduction, Structure of a mysql index, Creating and dropping indexes, Creating an index, Altering a table to add an index, Specifying index type, Dropping indexes, Obtaining Index Metadata. Hands on Creating, altering and dropping tables/indexes Querying for data The SQL select statement and MySQL differences, Advanced order by, Order by and collation, Order by with enum datatype, Order by with Set datatype, Ordering with distinct and group by Special features of union, Limit and order by clauses, Group By clause, Group_concat, Using Rollup in a Group By clause. Hands on Querying for data SQL Expressions and functions Components of expressions, Nulls, Numeric expressions, String expressions, Temporal expressions, Comparison functions, Flow control functions, Numeric functions, String functions, Temporal functions. Hands on Using expressions and functions Updating data Update operations and privileges, Inserting rows, Insert using a set clause, Inserting duplicate values, Replacing rows, Updating rows, Update using the order by and limit clauses, Deleting rows, The delete and truncate statements. Exercise: Inserting, updating, replacing and deleting data Connectors MySQL client interfaces, MySQL connectors, Oracle and community conectors, Connecting to MySQL server using Java and PHP connectors, MySQL and NoSQL, Innodb integration with memcached. Obtaining database metadata What is metadata?, The mysqlshow utility, The show and describe commands, Describing tables, The information_schema, Listing tables, Listing columns, Listing views, Listing key_columns_usage. Hands on Obtaining database metadata Debugging Mysql error messages, The show statement, Show errors, Show count(*) errors, Show warnings, Show count(*) warnings, Note messages, The perror utility. Hands on Debugging Joins Overview of inner joins, Cartesian product, Inner joins with original syntax, Non equi-join, Using table aliases to avoid name clashes, Inner Joins With ISO/ANSI Syntax, Outer Joins, Left outer joins, Right outer joins, Full outer joins, Updating multiple tables simultaneously, Updating rows in one table based on a condition in another, Updating rows in one table reading data from another, Deleting from multiple tables simultaneously, Deleting rows in one table based on a condition in another. Hands on Coding joins Subqueries Types of subquery, Multiple-column subqueries, Correlated subqueries, Using the ANY, ALL and SOME operators, Using the EXISTS operator, Subqueries as scalar expressions, Inline views, Converting subqueries to joins, Using subqueries in updates and deletes. Hands on Coding subqueries Views Why views are used, Creating views, View creation restrictions, View algorithms, Updateable views, Altering and dropping views, Displaying information about views, Privileges for views. Hands on Using views Import and Export Exporting using SQL, Privileges required to export data, Importing using SQL, Messages when loading data, Privileges required to load data, Exporting from the command line, Mysqldump main options, Importing from the command line, Mysqlimport main options. Hands on Importing and exporting User variables and prepared statements Creating User variables, User variables in a select, Prepared statements, The prepare statement, The execute statement, The deallocate statement, Using prepared statements in code, with connectors. Hands on Using variables and prepared statements Introduction to stored routines Types of stored routines, Benefits of stored routines, Stored routine features, Differences between procedures and functions, Introduction to the Block, Declaring variables and constants, Assigning values to variables, Definer rights and invoker rights, Using SELECT in stored routines, Altering and dropping stored routines, Obtaining stored routine metadata, Stored routine privileges and execution security. Hands on Writing simple stored routines Stored routines - program logic The IF .. THEN .. ELSEIF construct, The CASE statement, The basic loop, The while loop, The repeat loop, The iterate statement, Nested loops. Hands on Writing stored routines with program logic Stored routines - exception handlers and cursors Dealing with errors using Exception handlers, Cursors, What is a cursor?, Cursor operations, Declaring cursors, Opening and closing cursors, Fetching rows, Status checking. Hands on Writing stored routines with program logic Procedures with parameters Creating procedures with parameters, Calling Procedures With Parameters. Hands on Writing stored routines with parameters Functions What is a function?, The create function statement, Executing functions, Executing functions from code, Executing functions from SQL statements, The deterministic and SQL clauses. Hands on Writing functions Triggers Trigger creation, Restrictions on triggers, The create trigger statement, Using the old and new qualifiers, Managing triggers, Destroying triggers, Required privileges. Hands on Writing triggers Basic optimizations Normalisation of data to third normal form, Using indexes for optimization, General query enhancement, Using Explain to analyze queries, Choosing an INNODB or MYISAM storage engine, Using MySQL Enterprise Monitor in query optimization. Hands on Making use of basic optimizations More about indexes Indexes and joins Hands on Investigating indexes and joins