Our monthly Social Media Marketing Update will break down the need-to-know marketing trends across TikTok, Instagram, LinkedIn, YouTube and more!
Our monthly Social Media Marketing Update will break down the need-to-know marketing trends across TikTok, Instagram, LinkedIn, YouTube and more!
Our monthly Social Media Marketing Update will break down the need-to-know marketing trends across TikTok, Instagram, LinkedIn, YouTube and more!
Leadership Foundations introduces the ideas and practical tools that help individuals, teams and organisations function more effectively. It is also known as 'Foundations of Success' and comprises the core principles and some initial resources that we share with all our clients: The Four Foundations of Leadership Personal responsibility and prioritisation The tyranny of the urgent & the secret of uninterrupted time Developing a planning and goal setting system Understanding Communication Styles Your personal goals and life balance 10 Magic Minutes daily planning
Duration 1 Days 6 CPD hours This course is intended for This course is intended for network engineers, support personnel, reseller support, and others responsible for implementing ScreenOS products. Overview After successfully completing this course, you should be able to: Configure attack prevention features, including: ?SCREEN options; Deep Inspection (DI); and Antivirus (AV) scanning. Configure URL filtering. Configure antispam filters. This course meets the business needs of customers who are deploying the attack prevention features of ScreenOS software. The course focuses specifically on the attack-related features and assumes familiarity with ScreenOS software. Upon completing this course, you should be able to return to work and successfully configure and verify the desired attack prevention features. Chapter 1: Course Introduction Chapter 2: ScreenOS Basics Review Concepts Review Configuration Review Lab: ScreenOS Basics Review Chapter 3: SCREEN Options Multilayer Network Protection Types of Attacks SCREEN Options Configuration SCREEN Best Practices Lab: SCREEN Options Configuration Chapter 4: Deep Inspection Deep Inspection Overview Attack Database Configuration Policy Configuration Logging and Monitoring Lab: Deep Inspection Configuration Chapter 5: Antivirus Antivirus Operations Antivirus Configuration?Kaspersky Antivirus Configuration?ICAP Verifying Operations Lab: Antivirus Configuration Chapter 6: Web Filtering Web-Filtering Options Web-Filtering Configuration Verifying Operations Lab: Configuring Web Filtering Chapter 7: Antispam Antispam Concepts Antispam Configuration Verifying Operations Lab: Antispam Configuration Additional course details: Nexus Humans Attack Prevention with Juniper Networks Firewalls training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Attack Prevention with Juniper Networks Firewalls course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours This course is intended for Data center engineers Engineers (design, implementation, pre-sales, post-sales) Product managers and sales Overview After taking this course, you should be able to: Describe hyperconvergence, Cisco HyperFlex, and the components of Cisco HyperFlex Explain the Cisco Unified Computing System⢠(Cisco UCS) and what makes it valuable to business Describe how Cisco HyperFlex Data Platform (HXDP) works Describe the physical components of Cisco HyperFlex Describe Cisco Intersight and introduce functionalities relevant to HyperFlex Install standard ESXi-based vSphere Cisco HyperFlex Manage your Cisco HyperFlex VMware ESXi-based cluster Describe how to maintain Cisco HyperFlex Design a Cisco HyperFlex solution Protect the data on your Cisco HyperFlex cluster using replication and data at rest encryption Describe a stretched cluster and how is it different from a standard cluster Describe an Edge cluster and how is it different from a standard cluster Perform basic troubleshooting tasks and explain Cisco Intersight The Implementing Cisco HyperFlex (DCIHX) v1.3 course shows you how to deploy and use the Cisco© HyperFlex? data platform to support multicloud workloads. You will become familiar with HyperFlex components and learn how to install, design, manage, and troubleshoot Cisco HyperFlex to support highly scalable and resilient multicloud implementations. You will also gain hands-on experience focused on installation, management, maintenance, and native replication, and you will explore cluster technologies as well as Cisco Intersight.? Introducing Hyperconvergence and Cisco HyperFlex Traditional Data Center Design What Is Hyperconvergence? Describing Cisco UCS: The Foundation of Cisco HyperFlex Cisco Server Deployment Models: Standalone Versus Managed Cisco UCS Managed Model Benefits Describing Cisco HyperFlex Software Components Virtual Machine Hypervisor Log-Structured File System Describing Cisco HyperFlex Hardware Components Introducing Cisco HyperFlex Servers Storage Technologies in Cisco HyperFlex Introducing Cisco Intersight Introducing Cisco Intersight Installing and Expanding Standard ESXi Cisco HyperFlex Installation Summary Software Prerequisites Managing Cisco HyperFlex in vSphere Environment Management Interfaces Overview Cisco HyperFlex Plugin for vCenter Maintaining Cisco HyperFlex Cisco HyperFlex Upgrade Overview Cisco HyperFlex Online Upgrade Designing Cisco HyperFlex Cluster Resiliency: VM-Level Cluster Resiliency: HXDP-Level Protecting Your Data Disaster Recovery Overview Third-Party Data Restore Solutions Introducing Cisco HyperFlex Stretched Deployment Stretched Cluster Overview Prerequisites Introducing Cisco HyperFlex EDGE Cisco HyperFlex EDGE Cluster Overview Prerequisites and Recommendations Troubleshooting Cisco HyperFlex Troubleshooting Guidelines Generating Tech Support Bundles
Duration 2 Days 12 CPD hours This course is intended for IBM SPSS Statistics users who want to familiarize themselves with the statistical capabilities of IBM SPSS StatisticsBase. Anyone who wants to refresh their knowledge and statistical experience. Overview Introduction to statistical analysis Describing individual variables Testing hypotheses Testing hypotheses on individual variables Testing on the relationship between categorical variables Testing on the difference between two group means Testing on differences between more than two group means Testing on the relationship between scale variables Predicting a scale variable: Regression Introduction to Bayesian statistics Overview of multivariate procedures This course provides an application-oriented introduction to the statistical component of IBM SPSS Statistics. Students will review several statistical techniques and discuss situations in which they would use each technique, how to set up the analysis, and how to interpret the results. This includes a broad range of techniques for exploring and summarizing data, as well as investigating and testing relationships. Students will gain an understanding of when and why to use these various techniques and how to apply them with confidence, interpret their output, and graphically display the results. Introduction to statistical analysis Identify the steps in the research process Identify measurement levels Describing individual variables Chart individual variables Summarize individual variables Identify the normal distributionIdentify standardized scores Testing hypotheses Principles of statistical testing One-sided versus two-sided testingType I, type II errors and power Testing hypotheses on individual variables Identify population parameters and sample statistics Examine the distribution of the sample mean Test a hypothesis on the population mean Construct confidence intervals Tests on a single variable Testing on the relationship between categorical variables Chart the relationship Describe the relationship Test the hypothesis of independence Assumptions Identify differences between the groups Measure the strength of the association Testing on the difference between two group meansChart the relationship Describe the relationship Test the hypothesis of two equal group means Assumptions Testing on differences between more than two group means Chart the relationship Describe the relationship Test the hypothesis of all group means being equal Assumptions Identify differences between the group means Testing on the relationship between scale variables Chart the relationship Describe the relationship Test the hypothesis of independence Assumptions Treatment of missing values Predicting a scale variable: Regression Explain linear regression Identify unstandardized and standardized coefficients Assess the fit Examine residuals Include 0-1 independent variables Include categorical independent variables Introduction to Bayesian statistics Bayesian statistics and classical test theory The Bayesian approach Evaluate a null hypothesis Overview of Bayesian procedures in IBM SPSS Statistics Overview of multivariate procedures Overview of supervised models Overview of models to create natural groupings
Artificial Intelligence (AI) is the most disruptive technology since the internet came onto the scene. AI is transforming every aspect of how we manage projects from developing a business case, to planning the work, managing risk, and tracking performance. Because the technology and market are moving so fast, it can be difficult to know how to start using AI on projects. Generative AI for Project Management will engage you with diverse Generative AI tools to start, plan, and manage either your own project or a generic case study. We will embrace a tool agnostic approach to adopting, integrating, and scaling Generative AI without compromising data or trust. You will have hands-on practice utilizing AI tools to optimize your time and your outcomes. You will be accessing a variety of AI tools requiring you to register for a free account. A computer is required for all traditional classroom deliveries. None At the end of this program, you will be able to: Define essential terms and concepts related to artificial intelligence (AI) Illustrate how prompts facilitate interaction with Generative AI Recognize the capabilities of Large Language Models Craft prompts to develop project origination documents Create prompts to assist in planning a project Develop user stories with Generative AI Analyze project performance using Generative AI Identify the limitations of Generative AI Identify the risks associated with using Generative AI Articulate the need for governance and ethics when establishing an AI program in an organization Course Overview Getting Started Foundation Concepts Understanding essential terms and concepts related to AI Exploring various Generative AI Models Understanding Prompts Creating Prompts for Project Startup Prompts for starting a project Prompts for planning a project Best Practices for prompt engineering Creating Prompts for Managing Projects Creating agile user stories Measuring project performance Analyzing a schedule Using Generative AI Responsibly Limitations of AI Models Establishing an AI governance framework Future trends and next steps Summary and Next Steps
Taster session. Passive income from Property. Professional Investor secrets to build a Property Portfolio, even if you're starting with little capital
Duration 5 Days 30 CPD hours This course is intended for Implementers and administrators who are new to IBM Spectrum Protect data management. Overview At the end of this course you should be able to: Describe the purpose of IBM Spectrum Protect Install and configure the IBM Spectrum Protect components Use the administrative and client interfaces Discuss storage methodology options and create storage pool Customize data movement and retention policies to meet business requirements Configure the IBM Spectrum Protect database and storage pools for protection Optimize client configuration Perform backup, restore, archive and retrieve operations Organize daily tasks required to protect the IBM Spectrum Protect environment Automate and monitor client and administrative tasks and events IBM Spectrum© Protect 8.1.6 is a data backup and recovery solution designed to help you manage your data retention, reduce the cost of storage, and provide appropriate recovery point objectives to meet any service level agreement. IBM Spectrum© Protect offers improved efficiency and flexibility using object-based data management and policy driven retention.This course will focus on implementation and basic administration of a IBM Spectrum© Protect environment. The hands-on lab exercises are performed on a Windows 2012 environment. The course materials include examples of AIX and Linux commands, when different from Windows. Components and conceptsInstallation and configurationInterfaces and monitoringStorage pools and devicesPolicy management, data movement, and explorationDatabase and storage pool managementClient configuration and managementClient data protectionDaily operations and maintenanceSchedules and reports Additional course details: Nexus Humans TS617 IBM Spectrum Protect - Implementation and Administration (v8.1.6) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the TS617 IBM Spectrum Protect - Implementation and Administration (v8.1.6) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.