• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1923 Courses in Cardiff delivered Live Online

ISO 14001 Lead Auditor

By Training Centre

  ISO 14001 Lead Auditor training enables you to develop the necessary expertise to perform an Environmental Management System (EMS) audit by applying widely recognized audit principles, procedures and techniques. About This Course   During this training course, you will acquire the knowledge and skills to plan and carry out internal and external audits in compliance with ISO 19011 and ISO/IEC 17021-1 certification process. Based on practical exercises, you will be able to master audit techniques and become competent to manage an audit program, audit team, communication with customers, and conflict resolution. After acquiring the necessary expertise to perform this audit, you can sit for the exam and gain "Certified ISO 14001 Lead Auditor' Certificate. By holding this Certificate, you will demonstrate that you have the capabilities and competencies to audit organizations based on best practices.    Learning objectives   Understand the operations of an Environmental Management System (EMS) based on ISO 14001 Acknowledge the correlation between ISO 14001, ISO 14040 and other standards and regulatory frameworks Understand an auditor's role to: plan, lead and follow-up on a management system audit in accordance with ISO 19011 Learn how to lead an audit and audit team Learn how to interpret the requirements of ISO 14001 in the context of an EMS audit Acquire the competencies of an auditor to: plan an audit, lead an audit, draft reports, and follow-up on an audit in compliance with ISO 19011   Educational approach   This training is based on both theory and best practices used in EMS audits Lecture sessions are illustrated with examples based on case studies Practical exercises are based on a case study which includes role playing and discussions Practice tests are similar to the Certification Exam Prerequisites   A fundamental understanding of ISO 14001 and comprehensive knowledge of audit principles.  Who Should Attend?   Auditors seeking to perform and lead Environmental Management System (EMS) certification audits Managers or consultants seeking to master an Environmental Management System audit process Individuals responsible for maintaining conformance with EMS requirements Technical experts seeking to prepare for an Environmental Management System audit Expert advisors in Environmental Management What's Included?   Refreshments & Lunch (Classroom courses only) Course Slide Deck Official Study Guides CPD Certificate The Exam   Accreditation Assessment     Delegates sit a combined exam, consisting of in-course quizzes and exercises, as well as a final 12 question, essay type exam on Day 4 of the course. The overall passing score is 70%, to be achieved within the 150 minute time allowance. Exam results are provided within 24 hours, with both a Certificate and a digital badge provided as proof of success. Provided by   This course is Accredited by NACS and Administered by the IECB

ISO 14001 Lead Auditor
Delivered OnlineFlexible Dates
£1,450

Property Sourcing Business Blueprint

By Property SQ2

Build a property sourcing business, negotiation property deals as a sourcing agent or buyer's agent. Be legal and compliant, learning industry best practice as a deal packager.

Property Sourcing Business Blueprint
Delivered OnlineFlexible Dates
£1,100 to £3,000

AZ-104T00 Microsoft Azure Administrator

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is for Azure Administrators. The Azure Administrator implements, manages, and monitors identity, governance, storage, compute, and virtual networks in a cloud environment. The Azure Administrator will provision, size, monitor, and adjust resources as appropriate. This course teaches IT Professionals how to manage their Azure subscriptions, secure identities, administer the infrastructure, configure virtual networking, connect Azure and on-premises sites, manage network traffic, implement storage solutions, create and scale virtual machines, implement web apps and containers, back up and share data, and monitor your solution. Prerequisites Successful Azure Administrators start this role with experience in virtualization, networking, identity, and storage. Understanding of on-premises virtualization technologies, including: VMs, virtual networking, and virtual hard disks. Understanding of network configurations, including TCP/IP, Domain Name System (DNS), virtual private networks (VPNs), firewalls, and encryption technologies. Understanding of Active Directory concepts, including users, groups, and role-based access control. Understanding of resilience and disaster recovery, including backup and restore operations. 1 - Configure Microsoft Entra ID Describe Microsoft Entra ID benefits and features Describe Microsoft Entra concepts Compare Active Directory Domain Services to Microsoft Entra ID Select Microsoft Entra editions Implement Microsoft Entra join Implement Microsoft Entra self-service password reset 2 - Configure user and group accounts Create user accounts Manage user accounts Create bulk user accounts Create group accounts Create administrative units 3 - Configure subscriptions Identify Azure regions Implement Azure subscriptions Obtain an Azure subscription Identify Azure subscription usage Implement Microsoft Cost Management Apply resource tagging Apply cost savings 4 - Configure Azure Policy Create management groups Implement Azure policies Create Azure policies Create policy definitions Create an initiative definition Scope the initiative definition Determine compliance 5 - Configure role-based access control Implement role-based access control Create a role definition Create a role assignment Compare Azure roles to Microsoft Entra roles Apply role-based access control Review fundamental Azure RBAC roles 6 - Configure Azure resources with tools Use the Azure portal Use Azure Cloud Shell Use Azure PowerShell Use Azure CLI 7 - Use Azure Resource Manager Review Azure Resource Manager benefits Review Azure resource terminology Create resource groups Create Azure Resource Manager locks Reorganize Azure resources Remove resources and resource groups Determine resource limits 8 - Configure resources with Azure Resource Manager templates Review Azure Resource Manager template advantages Explore the Azure Resource Manager template schema Explore the Azure Resource Manager template parameters Consider Bicep templates Review QuickStart templates 9 - Configure virtual networks Plan virtual networks Create subnets Create virtual networks Plan IP addressing Create public IP addressing Associate public IP addresses Allocate or assign private IP addresses 10 - Configure network security groups Implement network security groups Determine network security group rules Determine network security group effective rules Create network security group rules Implement application security groups 11 - Configure Azure DNS Identify domains and custom domains Verify custom domain names Create Azure DNS zones Delegate DNS domains Add DNS record sets Plan for Azure Private DNS zones Review Azure Private DNS zone scenarios 12 - Configure Azure Virtual Network peering Determine Azure Virtual Network peering uses Determine gateway transit and connectivity Create virtual network peering Extend peering with user-defined routes and service chaining 13 - Configure network routing and endpoints Review system routes Identify user-defined routes Determine service endpoint uses Determine service endpoint services Identify private link uses 14 - Configure Azure Load Balancer Determine Azure Load Balancer uses Implement a public load balancer Implement an internal load balancer Determine load balancer SKUs Create back-end pools Create health probes Create load balancer rules 15 - Configure Azure Application Gateway Implement Azure Application Gateway Determine Azure Application Gateway routing Configure Azure Application Gateway components 16 - Configure storage accounts Implement Azure Storage Explore Azure Storage services Determine storage account types Determine replication strategies Access storage Secure storage endpoints 17 - Configure Azure Blob Storage Implement Azure Blob Storage Create blob containers Assign blob access tiers Add blob lifecycle management rules Determine blob object replication Upload blobs Determine Blob Storage pricing 18 - Configure Azure Storage security Review Azure Storage security strategies Create shared access signatures Identify URI and SAS parameters Determine Azure Storage encryption Create customer-managed keys Apply Azure Storage security best practices 19 - Configure Azure Files and Azure File Sync Compare storage for file shares and blob data Manage Azure file shares Create file share snapshots Implement Azure File Sync Identify Azure File Sync components Deploy Azure File Sync 20 - Configure Azure Storage with tools Use Azure Storage Explorer Use the Azure Import/Export service Use the WAImportExport tool Use the AzCopy tool 21 - Configure virtual machines Review cloud services responsibilities Plan virtual machines Determine virtual machine sizing Determine virtual machine storage Create virtual machines in the Azure portal Connect to virtual machines 22 - Configure virtual machine availability Plan for maintenance and downtime Create availability sets Review update domains and fault domains Review availability zones Compare vertical and horizontal scaling Implement Azure Virtual Machine Scale Sets Create Virtual Machine Scale Sets Implement autoscale Configure autoscale 23 - Configure Azure App Service plans Implement Azure App Service plans Determine Azure App Service plan pricing Scale up and scale out Azure App Service Configure Azure App Service autoscale 24 - Configure Azure App Service Implement Azure App Service Create an app with App Service Explore continuous integration and deployment Create deployment slots Add deployment slots Secure your App Service app Create custom domain names Back up and restore your App Service app Use Azure Application Insights 25 - Configure Azure Container Instances Compare containers to virtual machines Review Azure Container Instances Implement container groups Review the Docker platform 26 - Configure file and folder backups Describe Azure Backup benefits Implement Backup Center for Azure Backup Configure Azure Recovery Services vault backup options Use the Microsoft Azure Recovery Services (MARS) agent Configure on-premises file and folder backups 27 - Configure virtual machine backups Explore options to protect virtual machine data Create virtual machine snapshots in Azure Backup Set up Azure Recovery Services vault backup options Back up your virtual machines Restore your virtual machines Implement System Center DPM and Azure Backup Server Compare the MARS agent and Azure Backup Server Implement soft delete for your virtual machines Implement Azure Site Recovery 28 - Configure Azure Monitor Describe Azure Monitor key capabilities Describe Azure Monitor components Define metrics and logs Identify monitoring data and tiers Describe activity log events Query the activity log 29 - Configure Azure alerts Describe Azure Monitor alerts Manage Azure Monitor alerts Create alert rules Create action groups 30 - Configure Log Analytics Determine Log Analytics uses Create a Log Analytics workspace Create Kusto (KQL) queries Structure Log Analytics queries 31 - Configure Network Watcher Describe Azure Network Watcher features Review IP flow verify diagnostics Review next hop diagnostics Visualize the network topology

AZ-104T00 Microsoft Azure Administrator
Delivered OnlineFlexible Dates
£2,380

PL-900T00 Microsoft Power Platform Fundamentals

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for Candidates for this exam are users who aspire to improve productivity by automating business processes, analyzing data to produce business insights, and acting more effectively by creating simple app experiences. Overview After completing this course, you will be able to: Describe Microsoft Power Platform components Describe Microsoft Dataverse and connectors Describe cross-cloud scenarios across M365, Dynamics 365, Microsoft Azure and 3rd party services Identify benefits and capabilities of Microsoft Power Platform Identify the basic functionality and business value Microsoft Power Platform components Implement simple solutions with Power Apps, Power Automate, and Power BI Learn the business value and product capabilities of Microsoft Power Platform. Create simple Power Apps, connect data with Dataverse, build a Power BI Dashboard, and automate processes with Power Automate. Module 1: Introduction to Microsoft Power Platform Identify when to use each Microsoft Power Platform component application to create business solution Learn the value of using Microsoft Power Platform to create business solutions Learn the components and features of Microsoft Power Platform Module 2: Introduction to Microsoft Dataverse Microsoft Dataverse Overview Module 3: Get Started with Power Apps Introduction to Power Apps How to build a canvas app How to build a model-driven app Module 4: Get Started with Power Automate Power Automate Overview How to Build an Automated Solution Module 5: Get Started with Power BI Power BI Overview How to Build a Simple Dashboard Module 6: Introduction to Power Virtual Agents Power Virtual Agents overview Additional course details: Nexus Humans PL-900T00 Microsoft Power Platform Fundamentals training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the PL-900T00 Microsoft Power Platform Fundamentals course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

PL-900T00 Microsoft Power Platform Fundamentals
Delivered OnlineFlexible Dates
£1,190

DevSecOps Foundation (DSOF)?

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The target audience for the DevSecOps Foundation course are professionals including: Anyone involved or interested in learning about DevSecOps strategies and automation Anyone involved in Continuous Delivery toolchain architectures Compliance Team Business managers Delivery Staff DevOps Engineers IT Managers IT Security Professionals, Practitioners, and Managers Maintenance and support staff Managed Service Providers Project & Product Managers Quality Assurance Teams Release Managers Scrum Masters Site Reliability Engineers Software Engineers Testers Overview You will learn: The purpose, benefits, concepts, and vocabulary of DevSecOps How DevOps security practices differ from other security approaches Business-driven security strategies and Best Practices Understanding and applying data and security sciences Integrating corporate stakeholders into DevSecOps Practices Enhancing communication between Dev, Sec, and Ops teams How DevSecOps roles fit with a DevOps culture and organization In this course, students will gain a solid understanding of how DevSecOps provides business value, enhancing your business opportunities, and improving corporate value. The core DevSecOps principles taught can support an organizational transformation, increase productivity, reduce risk, and optimize resource usage. This course explains how DevOps security practices differ from other approaches then delivers the education needed to apply changes to your organization. Participants learn the purpose, benefits, concepts, vocabulary and applications of DevSecOps. Most importantly, students learn how DevSecOps roles fit with a DevOps culture and organization. At the course?s end, participants will understand ?security as code? to make security and compliance value consumable as a service. This course prepares you for the DevSecOps Foundation (DSOF) certification. Realizing DevSecOps Outcomes Origins of DevOps Evolution of DevSecOps CALMS The Three Ways Defining the Cyberthreat Landscape What is the Cyber Threat Landscape? What is the threat? What do we protect from? What do we protect, and why? How do I talk to security? Building a Responsive DevSecOps Model Demonstrate Model Technical, business and human outcomes What?s being measured? Gating and thresholding Integrating DevSecOps Stakeholders The DevSecOps State of Mind The DevSecOps Stakeholders What?s at stake for who? Participating in the DevSecOps model Establishing DevSecOps Best Practices Start where you are Integrating people, process and technology and governance DevSecOps operating model Communication practices and boundaries Focusing on outcomes Best Practices to get Started The Three Ways Identifying target states Value stream-centric thinking DevOps Pipelines and Continuous Compliance The goal of a DevOps pipeline Why continuous compliance is important Archetypes and reference architectures Coordinating DevOps Pipeline construction DevSecOps tool categories, types and examples Learning Using Outcomes Security Training Options Training as Policy Experiential Learning Cross-Skilling The DevSecOps Collective Body of Knowledge Preparing for the DevSecOps Foundation certification exam Additional course details: Nexus Humans DevSecOps Foundation (DevOps Institute) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the DevSecOps Foundation (DevOps Institute) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

DevSecOps Foundation (DSOF)?
Delivered OnlineFlexible Dates
£1,495

AZ-140T00 Configuring and Operating Microsoft Azure Virtual Desktop

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Students for AZ-140: Configuring and Operating Microsoft Azure Virtual Desktop are interested in delivering applications on Azure Virtual Desktop and optimizing them to run in multi-session virtual environments. As an Azure Virtual Desktop administrator, you will closely with the Azure Administrators and Architects, along with Microsoft 365 Administrators. Azure Virtual Desktop administrator responsibilities include planning, deploying, packaging, updating, and maintaining the Azure Virtual Desktop infrastructure. They also create session host images, implement and manage FSLogix, monitor Azure Virtual Desktop performance, and automate Azure Virtual Desktop management tasks. This course teaches Azure administrators how to plan, deliver, and manage virtual desktop experiences and remote apps, for any device, on Azure. Lessons include implementing and managing networking for Azure Virtual Desktop, configuring host pools and session hosts, creating session host images, implementing, and managing FSLogix, monitoring Azure Virtual Desktop performance and health, and automating Azure Virtual Desktop management tasks. Students will learn through a mix of demonstrations and hands-on lab experiences deploying virtual desktop experiences and apps on Azure Virtual Desktop and optimizing them to run in multi-session virtual environments. Candidates of this course must have solid Azure administration skills. This course assumes prior experience, including virtualization, networking, identity, storage, backup and restore, and disaster recovery. Students should have knowledge of on-premises virtual desktop infrastructure technologies as they relate to migrating to Azure Virtual Desktop. Students are expected to have used the tools common to the Azure environment, such as the Azure PowerShell and Cloud Shell. 1 - Azure Virtual Desktop Architecture Azure Virtual Desktop for the enterprise Azure Virtual Desktop components Personal and pooled desktops Service updates for Azure Virtual Desktop desktops Azure limitations for Azure Virtual Desktop Virtual machine sizing for Azure Virtual Desktop Azure Virtual Desktop pricing 2 - Design the Azure Virtual Desktop architecture Assess network capacity and speed requirements for Azure Virtual Desktop Azure Virtual Desktop Experience Estimator Recommend an operating system for an Azure Virtual Desktop implementation Balancing host pools Recommendations for using subscriptions and management groups Configure a location for the Azure Virtual Desktop metadata Recommend a configuration for performance requirements 3 - Design for user identities and profiles Select an appropriate licensing model for Azure Virtual Desktop based on requirements Personal and multi-session desktop scenarios Recommend an appropriate storage solution Plan for a desktop client deployment Plan for Azure Virtual Desktop client deployment - Remote Desktop Protocol (RDP) Windows Desktop client to multiple devices Hybrid Identity with Azure Active Directory Plan for Azure Active Directory (AD) Connect for user identities 4 - Implement and manage networking for Azure Virtual Desktop Implement Azure virtual network connectivity Manage connectivity to the internet and on-premises networks Understanding Azure Virtual Desktop network connectivity Implement and manage network security for Azure Virtual Desktop Configure Azure Virtual Desktop session hosts using Azure Bastion Monitor and troubleshoot network connectivity for Azure Virtual Desktop Plan and implement Remote Desktop Protocol Shortpath Configure Remote Desktop Protocol Shortpath for managed networks Configure Windows Defender Firewall with Advanced Security for RDP Shortpath Plan and implement Quality of Service for Azure Virtual Desktop 5 - Implement and manage storage for Azure Virtual Desktop Storage for FSLogix components Configure storage for FSLogix components Configure storage accounts Create file shares Configure disks 6 - Create and configure host pools and session hosts for Azure Virtual Desktop Automate creation of an Azure Virtual Desktop host pool using PowerShell Configure host pool assignment type Customize Remote Desktop Protocol (RDP) properties for a host pool Manage licensing for session hosts that run Windows client Deploying Azure AD-joined virtual machines in Azure Virtual Desktop 7 - Create and manage session host image for Azure Virtual Desktop Create a managed virtual machine (VM) image Modify a session host image Plan for image update and management Create and use an Azure Compute Gallery using the portal Create an Azure Virtual Desktop image by using VM Image Builder Install Microsoft 365 Apps on a master Virtual Hard Disk image Install language packs in Azure Virtual Desktop 8 - Manage access for Azure Virtual Desktop Role-based access control (RBAC) for Azure Virtual Desktop Plan and implement Azure roles and role-based access control (RBAC) for Azure Virtual Desktop Using Azure Virtual Desktop with Microsoft Intune Configuring screen capture protection for Azure Virtual Desktop 9 - Manage security for Azure Virtual Desktop Plan and implement Conditional Access policies for connections to Azure Virtual Desktop Plan and implement multifactor authentication (MFA) in Azure Virtual Desktop Understand Conditional Access policy components Manage security by using Azure Security Center Security posture management and threat protection 10 - Implement and manage FSLogix Plan for FSLogix FSLogix profile containers and Azure files Install FSLogix Storage options for FSLogix profile containers Profile Container vs Office Container Configure Office Containers Installing Microsoft Office using FSLogix application containers Configure Cloud Cache Configure Profile Containers Create a profile container with Azure NetApp Files and capacity pool Manage Rule Sets and application masking 11 - Configure user experience settings Virtual desktop optimization principles Persistent virtual desktop environments Configure user settings through group policies Configure user settings through Endpoint Manager policies Configure session timeout properties Configure device redirections Configure Universal Print Implement the Start Virtual Machine on Connect feature Troubleshoot user profile issues Troubleshoot Azure Virtual Desktop clients 12 - Install and configure apps on a session host MSIX app attach How MSIX app attach works Set up a file share for MSIX app attach Upload MSIX images to Azure NetApp Files in Azure Virtual Desktop How to configure apps for users Using the OneDrive sync app on virtual desktops Using Microsoft Teams on Azure Virtual desktop Publish built-in apps in Azure Virtual Desktop Troubleshoot application issues for Azure Virtual Desktop 13 - Plan for disaster recovery Disaster recovery for Azure Virtual Desktop Virtual machine replication FSLogix configuration 14 - Automate Azure Virtual Desktop management tasks Scale session hosts using Azure Automation Create or update an Azure Automation account Create an Azure Automation Run As account Create the Azure Logic App and execution schedule 15 - Monitor and manage performance and health Monitor Azure Virtual Desktop by using Azure Monitor Log Analytics workspace for Azure Monitor Monitor Azure Virtual Desktop by using Azure Advisor How to resolve Azure Advisor recommendations Diagnose graphics performance issues Additional course details: Nexus Humans AZ-140T00 Configuring and Operating Windows Virtual Desktop on Microsoft Azure training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AZ-140T00 Configuring and Operating Windows Virtual Desktop on Microsoft Azure course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

AZ-140T00 Configuring and Operating Microsoft Azure Virtual Desktop
Delivered OnlineFlexible Dates
£2,380

Architecting on AWS

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is intended for solutions architects, solution-design engineers, developers seeking an understanding of AWS architecting and individuals seeking the AWS Solutions Architect-Associate certification. Overview Identify AWS architecting basic practices. Explore using the AWS management tools: The AWS Console, Command Line Interface (CLI), and CloudFormation in a lab environment. Examine the enforcement of accounts security using policies. Identify the elements that build an elastic, secure, virtual network that includes private and public subnets. Practice building an AWS core networking infrastructure. Determine strategies for a layered security approach to Virtual Private Cloud (VPC) subnets. Identify strategies to select the appropriate compute resources based on business use-cases. Practice building a VPC and adding an Elastic Cloud Compute (EC2) instance in a lab environment. Practice installing an Amazon Relational Database Service (RDS) instance and an Application Load Balancer (ALB) in the VPC you created. Compare and contrast AWS storage products and services, based on business scenarios. Compare and contrast the different types of AWS database services based on business needs. Practice building a highly available, auto-scaling database layer in a lab. Explore the business value of AWS monitoring solutions. Identify the role of monitoring, event driven load balancing, and auto scaling responses, based on usage and needs. Identify and discuss AWS automation tools that will help you build, maintain and evolve your infrastructure. Discuss network peering, VPC endpoints, gateway and routing solutions based on use-cases. Discuss hybrid networking configurations to extend and secure your infrastructure. Discuss the benefits of microservices as an effective decoupling strategy to power highly available applications at scale. Explore AWS container services for the rapid implementation of an infrastructure-agnostic, portable application environment. Identify the business and security benefits of AWS serverless services based on business examples. Practice building a serverless infrastructure in a lab environment. Discuss the ways in which AWS edge services address latency and security. Practice building a CloudFront deployment with an S3 backend in a lab environment. Explore AWS backup, recovery solutions, and best practices to ensure resiliency and business continuity. Build a highly available and secure cloud architecture based on a business problem, in a project-based facilitator-guided lab. Architecting on AWS is for solutions architects, solution-design engineers, and developers seeking an understanding of AWS architecting. In this course, you will learn to identify services and features to build resilient, secure and highly available IT solutions on the AWS Cloud. Architectural solutions differ depending on industry, types of applications, and business size. AWS Authorized Instructors emphasize best practices using the AWS Well-Architected Framework, and guide you through the process of designing optimal IT solutions, based on real-life scenarios. The modules focus on account security, networking, compute, storage, databases, monitoring, automation, containers, serverless architecture, edge services, and backup and recovery. At the end of the course, you will practice building a solution and apply what you have learned with confidence. Prerequisites AWS Cloud Practitioner Essentials classroom or digital training, or Working knowledge of distributed systems Familiarity with general networking concepts Familiarity with IP addressing Working knowledge of multi-tier architectures Familiarity with cloud computing concepts 0 - Introductions & Course Map review Welcome and course outcomes 1 - Architecting Fundamentals Review AWS Services and Infrastructure Infrastructure Models AWS API Tools Securing your infrastructure The Well-Architected Framework Hands-on lab: Explore Using the AWS API Tools to Deploy an EC2 Instance 2 - Account Security Security Principals Identity and Resource-Based Policies Account Federation Introduction to Managing Multiple Accounts 3 - Networking, Part 1 IP Addressing Amazon Virtual Private Cloud (VPC), Patterns and Quotas Routing Internet Access Network Access Control Lists (NACLs) Security Groups 4 - Compute Amazon Elastic Cloud Compute (EC2) EC2 Instances and Instance Selection High Performance Computing on AWS Lambda and EC2, When to Use Which Hands-On Lab: Build Your Amazon VPC Infrastructure 5 - Storage Amazon S3, Security, Versioning and Storage Classes Shared File Systems Data Migration Tools 6 - Database Services AWS Database Solutions Amazon Relational Database Services (RDS) DynamoDB, Features and Use Cases Redshift, Features, Use Cases and Comparison with RDS Caching and Migrating Data Hands-on Lab: Create a Database Layer in Your Amazon VPC Infrastructure 7 - Monitoring and Scaling Monitoring: CloudWatch, CloudTrail, and VPC Flow Logs Invoking Events 8 - Automation CloudFormation AWS Systems Manager 9 - Containers Microservices Monitoring Microservices with X-Ray Containers 10 - Networking Part 2 VPC Peering & Endpoints Transit Gateway Hybrid Networking Route 53 11 - Serverless Architecture Amazon API Gateway Amazon SQS, Amazon SNS Amazon Kinesis Data Streams & Kinesis Firehose Step Functions Hands-on Lab: Build a Serverless Architecture 12 - Edge Services Edge Fundamentals Amazon CloudFront AWS Global Accelerator AWS Web Application Firewall (WAF), DDoS and Firewall Manager AWS Outposts Hands-On Lab: Configure an Amazon CloudFront Distribution with an Amazon S3 Origin 13 - Backup and Recovery Planning for Disaster Recovery AWS Backup Recovery Strategie Additional course details: Nexus Humans Architecting on AWS training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Architecting on AWS course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Architecting on AWS
Delivered OnlineFlexible Dates
£2,025

ISO 31000 Lead Risk Manager

By Training Centre

  Delivered in either Live Online (4 days) or in our Classroom (5 days), the ISO 31000 Lead Risk Manager training enables you to acquire the expertise to support and lead an organization and its team to successfully identify, understand and manage a risk process based on ISO 31000. During this training course, you will also gain comprehensive knowledge of the best practices used to implement a Risk Management framework that provides the foundation for designing, implementing, monitoring, reviewing and continually improving a Risk Management process in an organization. About This Course   After mastering all the necessary concepts of Risk Management, you can sit for the exam and gain "Certified ISO 31000 Lead Risk Manager' credential. By holding this Certificate, you will be able to demonstrate that you have the professional capabilities and competencies to effectively manage a risk process in an organization.   Learning principles;   Acknowledge the correlation between ISO 31000, IEC/ISO 31010 and other standards and regulatory frameworks Master the concepts, approaches, methods and techniques used to manage risk within an organization Learn how to interpret the ISO 31000 principles and guidelines in the specific context of an organization Learn how to establish an effective risk communication plan and a risk recording and reporting process Acquire the expertise to support an organization to effectively manage and monitor risk based on best practices Prerequisites   A fundamental understanding of ISO 31000 and comprehensive knowledge of Risk Management. What's Included?   Refreshments & Lunch (Classroom courses only) Course Slide Deck Official Study Materials CPD Certificate The Exam Who Should Attend?   Managers or consultants seeking to master their skills to support an organization during the implementation of an organization-wide Risk Management framework and process based on the principles and recommendations of ISO 31000 Professionals responsible for the creation and protection of value in organizations through effective management of risks Expert advisors seeking to gain comprehensive knowledge of the key concepts, processes and strategies of Risk Management Risk Management team members Our Guarantee     We are an approved IECB Training Partner. You can learn wherever and whenever you want with our robust classroom and interactive online training courses. Our courses are taught by qualified practitioners with commercial experience. We strive to give our delegates the hands-on experience. Our courses are all-inclusive with no hidden extras.  The one-off cost covers the training, all course materials, and exam voucher. Our aim: To achieve a 100% first time pass rate on all our instructor-led courses. Our Promise: Pass first time or 'train' again for FREE. *FREE training and exam retake offered Accreditation Assessment   The exam consists of a 12 question essay type format, to be completed within 150 minutes and a pass mark of 70% Exam results are provided within 24 hours. Provided by   This course is Accredited by NACS and Administered by the IECB.

ISO 31000 Lead Risk Manager
Delivered OnlineFlexible Dates
£1,450

AZ-040T00 Automating Administration with Powershell

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for IT Professionals who are already experienced in general Windows Server, Windows client, Azure, and Microsoft 365 administration, and who want to learn more about using Windows PowerShell for administration. No prior experience with any version of PowerShell or any scripting language is assumed. This course is also suitable for IT Professionals already experienced in server administration, including Microsoft Exchange Server, Microsoft SharePoint Server, and Microsoft SQL Server. This course provides students with the fundamental knowledge and skills to use PowerShell for administering and automating administration of Windows servers. This course provides students the skills to identify and build the command they require to perform a specific task. In addition, students learn how to build scripts to accomplish advanced tasks such as automating repetitive tasks and generating reports. This course provides prerequisite skills supporting a broad range of Microsoft products, including Windows Server, Windows Client, Microsoft Azure, and Microsoft 365. In keeping with that goal, this course will not focus on any one of those products, although Windows Server, which is the common platform for all of those products, will serve as the example for the techniques this course teaches. Prerequisites Before attending this course, students must have: -Experience with Windows networking technologies and implementation. - Experience with Windows Server administration, maintenance, and troubleshooting. 1 - Review Windows PowerShell Learn about Windows PowerShell Get familiar with Windows PowerShell applications Identify factors to install and use Windows PowerShell Configure the Windows PowerShell console Configure the Windows PowerShell Integrated Scripting Environment (ISE) Use Visual Studio Code with PowerShell 2 - Understand the command syntax in Windows PowerShell Discover the structure of PowerShell cmdlets Discover the parameters for using PowerShell cmdlets Review the tab completion feature in PowerShell Display the About files content in PowerShell 3 - Find commands and Get-Help in Windows PowerShell Define modules in PowerShell Find cmdlets in PowerShell Use command aliases in PowerShell Use Show-Command and Get-Help in PowerShell Interpret the help file contents and update the local help content in PowerShell 4 - Manage Active Directory Domain Services using PowerShell cmdlets Manage user accounts in PowerShell Manage groups and group memberships in PowerShell Manage computer accounts in PowerShell Manage organizational units and Active Directory objects in PowerShell 5 - Manage network service settings for Windows devices using PowerShell cmdlets Manage IP addresses in PowerShell Manage IP routing in PowerShell Manage DNS clients in PowerShell Manage Windows Firewall settings in PowerShell 6 - Manage Windows Server settings using PowerShell cmdlets Automate management tasks using the Group Policy management cmdlets Manage server roles and services using PowerShell cmdlets Manage Hyper-V Virtual Machines using PowerShell cmdlets Manage Internet Information Services using PowerShell cmdlets 7 - Manage settings for a local Windows machine using PowerShell cmdlets Manage Windows 10 using PowerShell Manage permissions with PowerShell 8 - Understand the Windows PowerShell pipeline Review Windows PowerShell pipeline and its output Discover object members in PowerShell Control the formatting of pipeline output 9 - Select, sort, and measure objects using the pipeline Sort and group objects by property in the pipeline Measure objects in the pipeline Select a set of objects in the pipeline Select object properties in the pipeline Create and format calculated properties in the pipeline 10 - Filter objects out of the pipeline Learn about the comparison operators in PowerShell Review basic filter syntax in the pipeline Review advanced filter syntax in the pipeline Optimize the filter performance in the pipeline 11 - Enumerate objects in the pipeline Learn about enumerations in the pipeline Review basic syntax to enumerate objects in the pipeline Review advanced syntax to enumerate objects in the pipeline 12 - Send and pass data as output from the pipeline Write pipeline data to a file Convert pipeline objects to other forms of data representation in PowerShell Control additional output options in PowerShell 13 - Pass pipeline objects Pipeline parameter binding Identify ByValue parameters Pass data by using ByValue Pass data by using ByPropertyName Identify ByPropertyName parameters Use manual parameters to override the pipeline Use parenthetical commands Expand property values 14 - Connect with data stores using PowerShell providers Define Windows PowerShell providers Review the built-in providers in PowerShell Access provider help in PowerShell 15 - Use PowerShell drives in PowerShell Explain PowerShell drives in PowerShell Use PowerShell drive cmdlets in PowerShell Manage the file system in PowerShell Manage the registry in PowerShell Work with certificates in PowerShell Work with other PowerShell drives in PowerShell 16 - Review CIM and WMI Review architecture of CIM and WMI Review repositories in CIM and WMI Locate online class documentation by using CIM and WMI cmdlets 17 - Query configuration information by using CIM and WMI List local repository namespaces and classes by using CIM and WMI Query instances by using commands and WMI Query Language Connect to remote computers by using CIM and WMI cmdlets Query repository classes from remote computers by using CIMSession objects 18 - Query and manipulate repository objects by using CIM and WMI methods Discover methods of repository objects by using CIM and WMI Locate class methods and documentation by using CIM and WMI Invoke methods of repository objects by using CIM and WMI 19 - Manage variables in Windows PowerShell scripts Define variables in Windows PowerShell scripts Create variable names in Windows PowerShell scripts Assign values and types to variables in Windows PowerShell scripts Identify the methods and properties of variables in Windows PowerShell scripts Use string variables and methods in Windows PowerShell scripts Use date variables and methods in Windows PowerShell scripts 20 - Work with arrays and hash tables in Windows PowerShell scripts Define an array in Windows PowerShell scripts Work with array lists in Windows PowerShell scripts Define hash tables in Windows PowerShell Scripts Work with hash tables in Windows PowerShell scripts 21 - Create and run scripts by using Windows PowerShell Review Windows PowerShell scripts Modify scripts in the PowerShell Gallery Create scripts using Windows PowerShell Review the PowerShellGet module in Windows PowerShell Run scripts and set the execution policy in Windows PowerShell Review Windows PowerShell and AppLocker Sign the scripts digitally in Windows PowerShell 22 - Work with scripting constructs in Windows PowerShell Review and use the ForEach loop in Windows PowerShell scripts Review and use the If construct in Windows PowerShell scripts Review and use the Switch construct in Windows PowerShell scripts Review the For construct in Windows PowerShell scripts Review other loop constructs in Windows PowerShell scripts Review Break and Continue in Windows PowerShell scripts 23 - Import data in different formats for use in scripts by using Windows PowerShell cmdlets Use the Get-Content command in Windows PowerShell scripts Use the Import-Csv cmdlet in Windows PowerShell scripts Use the Import-Clixml cmdlet in Windows PowerShell scripts Use the ConvertFrom-Json cmdlet in Windows PowerShell scripts 24 - Use methods to accept user inputs in Windows PowerShell scripts Identify values that might change in Windows PowerShell scripts Use the Read-Host cmdlet in Windows PowerShell scripts Use the Get-Credential cmdlet in Windows PowerShell scripts Use the Out-GridView cmdlet in Windows PowerShell scripts Pass parameters to a Windows PowerShell script 25 - Troubleshoot scripts and handle errors in Windows PowerShell Interpret error messages generated for Windows PowerShell commands Add output to Windows PowerShell scripts Use breakpoints in Windows PowerShell scripts Interpret error actions for Windows PowerShell commands 26 - Use functions and modules in Windows PowerShell scripts Review functions in Windows PowerShell scripts Use variable scope in Windows PowerShell scripts Create modules in Windows PowerShell scripts Use the dot sourcing feature in Windows PowerShell 27 - Manage single and multiple computers by using Windows PowerShell remoting Review the remoting feature of Windows PowerShell Compare remoting with remote connectivity Review the remoting security feature of Windows PowerShell Enable remoting by using Windows PowerShell Use one-to-one remoting by using Windows PowerShell Use one-to-many remoting by using Windows PowerShell Compare remoting output with local output 28 - Use advanced Windows PowerShell remoting techniques Review common remoting techniques of Windows PowerShell Send parameters to remote computers in Windows PowerShell Set access protection to variables, aliases, and functions by using the scope modifier Enable multi-hop remoting in Windows PowerShell 29 - Manage persistent connections to remote computers by using Windows PowerShell sessions Review persistent connections in Windows PowerShell Create and manage persistent PSSessions by using Windows PowerShell Disconnect PSSessions by using Windows PowerShell Review the feature of implicit remoting in Windows PowerShell 30 - Review Azure PowerShell module Review Azure PowerShell Review the benefits of the Azure PowerShell module Install the Azure PowerShell module Migrate Azure PowerShell from AzureRM to Azure Review Microsoft Azure Active Directory module for Windows PowerShell and Azure Active Directory PowerShell for Graph modules 31 - Review the features and tools for Azure Cloud Shell Review the characteristics of Azure Cloud Shell Review the features and tools of Azure Cloud Shell Configure and experiment with Azure Cloud Shell 32 - Manage Azure resources with Windows PowerShell Create a new Azure virtual machine by using Windows PowerShell commands Manage Azure virtual machines by using Windows PowerShell commands Manage Azure related storage by using Azure PowerShell Manage Azure subscriptions by using Azure PowerShell 33 - Manage users, groups, and licenses in Microsoft Entra ID by using Windows PowerShell Review benefits to manage Microsoft 365 services by using Windows PowerShell Connect to the Microsoft 365 tenant by using Windows PowerShell Manage users in Microsoft 365 by using Windows PowerShell Manage groups in Microsoft 365 by using Windows PowerShell Manage roles in Microsoft 365 by using Windows PowerShell Manage licenses in Microsoft 365 by using Windows PowerShell 34 - Manage Exchange Online by using Windows PowerShell Connect to Exchange Online by using Windows PowerShell Manage mailboxes in Exchange Online by using Windows PowerShell Manage resources in Exchange Online by using Windows PowerShell Manage admin roles in Exchange Online by using Windows PowerShell 35 - Manage SharePoint Online by using Windows PowerShell Install and connect to SharePoint Online Management Shell by using Windows PowerShell Manage SharePoint Online users and groups by using Windows PowerShell Manage SharePoint sites by using Windows PowerShell Manage SharePoint Online external user sharing by using Windows PowerShell 36 - Manage Microsoft Teams by using Windows PowerShell Review Microsoft Teams PowerShell module Install the Microsoft Teams PowerShell module Manage teams with Microsoft Teams PowerShell module 37 - Create and manage background jobs using Windows PowerShell Define the types of background jobs in Windows PowerShell Start remote jobs and CIM/WMI jobs in Windows PowerShell Monitor jobs in Windows PowerShell Retrieve results for running jobs in Windows PowerShell 38 - Create and manage scheduled jobs using Windows PowerShell Create and run Windows PowerShell scripts as scheduled tasks Define scheduled jobs in Windows PowerShell Create job option and job trigger objects in Windows PowerShell Create and register a scheduled job in Windows PowerShell Retrieve the results from a scheduled job in Windows PowerShell

AZ-040T00 Automating Administration with Powershell
Delivered OnlineFlexible Dates
£2,975

ISO 22301 Lead Implementer

By Training Centre

  Delivered in either our Live Online (4 days) or in a Classroom environment (5 days), the ISO 22301 Lead Implementer training course enables you to develop the necessary expertise to support an organization in establishing, implementing, managing and maintaining a Business Continuity Management System (BCMS) based on ISO 22301. About This Course   During this training course, you will gain a thorough understanding of the best practices of Business Continuity Management Systems and be able to provide a framework that allows the organization to continue operating efficiently during disruptive events. After mastering all the necessary concepts of Business Continuity Management Systems, you can sit for the exam and gain the "ISO 22301 Lead Implementer' credential. By holding this Certificate, you will demonstrate that you have the practical knowledge and professional capabilities to implement ISO 22301 in an organization.   Learning objectives   Acknowledge the correlation between ISO 22301 and other standards and regulatory frameworks Master the concepts, approaches, methods and techniques used for the implementation and effective management of a BCMS Learn how to interpret the ISO 22301 requirements in the specific context of an organization Learn how to support an organization to effectively plan, implement, manage and maintain a BCMS Acquire the expertise to advise an organization in implementing Business Continuity Management System best practices   Educational approach   This training is based on both theory and best practices used in the implementation of a BCMS Lecture sessions are illustrated with examples based on case studies Practical exercises are based on a case study which includes role playing and discussions Practice tests are similar to the Certification Exam Prerequisites   A foundational understanding of ISO 22301 and knowledge of implementation principles. What's Included?   Refreshments & Lunch (Classroom based only) Course Slide Deck Official Study Materials CPD Certificate The Exam fees Who Should Attend?   Managers or consultants involved in Business Continuity Management Expert advisors seeking to master the implementation of a Business Continuity Management System Individuals responsible for maintaining conformance with BCMS requirements BCMS team members Accreditation Our Guarantee   We are an approved IECB Training Partner. You can learn wherever and whenever you want with our robust classroom and interactive online training courses. Our courses are taught by qualified practitioners with commercial experience. We strive to give our delegates the hands-on experience. Our courses are all-inclusive with no hidden extras.  The one-off cost covers the training, all course materials, and exam voucher. Our aim: To achieve a 100% first time pass rate on all our instructor-led courses. Our Promise: Pass first time or 'train' again for FREE. *FREE training offered for retakes - come back within a year and only pay for the exam. Assessment   The exam is a 12 question essay type. The pass mark for the exam is 70% and should be completed within the 150 minutes allocated. Results are provided within 24 hours of completion. Provided by   This course is Accredited by NACS and Administered by the IECB

ISO 22301 Lead Implementer
Delivered OnlineFlexible Dates
£1,450