• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

459 Courses in Cardiff delivered Live Online

Cisco Engineering Cisco Meraki Solutions Part 1 (ECMS1) v2.1

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for After taking this course, you should be able to: Describe cloud architecture, administration, and licensing Understand hardware and features of all product families Implement best practices for troubleshooting and when to contact support Overview After taking this course, you should be able to: Implement core configurations for a full stack solution in the Meraki Dashboard Deploy foundational Meraki product features to meet basic IT requirements Understand and leverage essential Meraki Dashboard tools for troubleshooting The Engineering Cisco Meraki Solutions Part 1 (ECMS1) v2.1 is an introductory course that equips you with the technical knowledge and skills to confidently operate Cisco Meraki solutions as a unified management system of an entire network from a centralized dashboard. Through a full day of instruction including live demos and guided lab practice, you will learn how to implement core configurations for a full stack solution in the Meraki Dashboard and leverage essential Meraki Dashboard tools to enforce device security policies, deploy software and apps, and perform remote, live troubleshooting on managed devices. This is the first of two courses that prepare you for the Cisco Meraki Solutions Specialist certification exam. Describing the Cloud and the Cisco Meraki Dashboard Single Pane of Glass Management Cisco Meraki Full Stack Capabilities Describing Cisco Meraki Products and Administration Cisco Meraki MX Security and SD-WAN Appliance Cisco Meraki MS Switches Describing Cisco Meraki Troubleshooting Cisco Meraki Dashboard Sync and Real-Time Tools Integration of Cisco Meraki Monitoring and Troubleshooting Tools in Existing Systems

Cisco Engineering Cisco Meraki Solutions Part 1 (ECMS1) v2.1
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Administering Cisco Unified Contact Center Enterprise Part 2 v2.0 (AUCCE2)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Channel Partner/Reseller Customer Employee Overview Upon completing this course, the learner will be able to meet these overall objectives: Demonstrate advanced proficiency with add / move / change of the ACD / PBX (agent / skill) environment of UCCE. Demonstrate advanced proficiency with add / move / change of the IVR (prompt / collect) environment of UCCE including both MicroApp and VXML solution scripting (ICM Scripting and Call Studio scripting). Demonstrate effective use of system tools to track and troubleshoot a call within a call flow. The Administering Cisco Unified Contact Center Enterprise Part 2 (AUCCE2) v2.0 is a 5 day instructor-led course presented by training partners to system engineers and customers who will be involved with Day 2 support of a UCCE solution deployed in a CVP comprehensive environment. This course gives the learner an understanding of the requirements, resources and tools required to perform complex adds, moves and changes in the inbound/outbound UCCE environment. This course is intended for those performing advanced administration of the solution, or who may be responsible for Level 2-3 support of the solution. The overall goal of this course is advanced administration of the solution by a deeper exposure into the technical operational requirements and the tools used to configure and ensure functionality. Course Outline Module 1: Cisco Unified Contact Center Enterprise v10 Overview Module 2: CCE Config and Scripting Module 3: CCE (ICM) Advanced Scripting Module 4: Advanced VXML Functionality Module 5: Supporting CCE

Cisco Administering Cisco Unified Contact Center Enterprise Part 2 v2.0 (AUCCE2)
Delivered OnlineFlexible Dates
Price on Enquiry

CNS-231 Deploy and Manage Citrix SD-WAN 11.x

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Built for IT Professionals working with Citrix SD-WAN, with little or no previous SD-WAN experience. Potential students include networking administrators, engineers, and architects interested in learning how to deploy or manage Citrix SD-WAN. Overview Initial configuration and management of Citrix SD-WAN Deployment options available Citrix SD-WAN Orchestrator utilities and considerations Citrix SD-WAN administration, including monitoring and reporting In this three-day course, you will learn how Citrix SD-WAN can simplify branch networking for your organization. You?ll walk away understanding how to configure and manage SD-WAN, including the SD-WAN architecture, deployment options, provisioning, and how to use Citrix SD-WAN Orchestrator in your environment.Additional topics include: branch office deployment, SD-WAN monitoring, reporting, and diagnostics. Citrix SD-WAN Overview Citrix SD-WAN Use Cases Citrix SD-WAN Technical Overview Citrix SD-WAN Management Citrix SD-WAN Architecture Citrix SD-WAN Architecture Citrix SD-WAN Hardware Bypass Citrix SD-WAN Packet Processing Citrix SD-WAN Deployment Citrix SD-WAN Deployment Modes Citrix SD-WAN Branch Office Deployment Citrix SD-WAN Deployment Considerations Citrix SD-WAN Configuration Citrix SD-WAN Configuration Process Citrix SD-WAN Provisioning Citrix SD-WAN Orchestrator Citrix SD-WAN Orchestrator Overview Citrix SD-WAN Orchestrator Customer Onboarding Citrix SD-WAN Orchestrator Configuration Citrix SD-WAN Orchestrator Reporting Citrix SD-WAN Administration Citrix SD-WAN Administrative Tasks Citrix SD-WAN Monitoring Citrix SD-WAN Reporting Citrix SD-WAN Diagnostics

CNS-231 Deploy and Manage Citrix SD-WAN 11.x
Delivered OnlineFlexible Dates
Price on Enquiry

BW310 SAP BW - Enterprise Data Warehousing

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course are Application Consultants, Business Analysts, Business Process Owners/Team Leads/Power Users, Program/Project Managers, Technology Consultants, and Users. In this course, students will gain SAP Netweaver Business Warehouse knowledge necessary for successful implementation and administration within a heterogeneous SAP NetWeaver BW system landscape. Data Warehousing Describing Data Warehouse Systems Describing Data Warehouse Architecture Using the Data Warehousing Workbench Master Data Modeling in SAP BW Describing InfoObjects Creating Characteristic InfoObjects The Loading of Master Data from SAP Data Sources Describing Data Flow Modeling a Master Data Flow Loading a Master Data Flow Modeling with the Graphical Data Flow Tool Loading of Transaction Data from SAP DataSources Describing the Core InfoProviders Creating a Key Figure InfoObject Creating a DataStore Object (DSO) Loading Transaction Data into a Data Store Object Describing the Extended Star Schema of an InfoCube Creating InfoCubes Loading Transaction Data into an InfoCube Master Data Loading from Flat File Data Sources Loading Data From a Flat File Describing the Data Flow in Detail Describing the Data Loading Process in Detail InfoProviders in SAP BW Explaining the InfoProviders Used in SAP BW ? Introduction Creating MultiProviders Usage of SAP BI Content Using BI Content Query Performance Optimization Optimizing Query Performance Monitoring Performance Creating and Filling Aggregates The SAP BW Administration Describing Administrative Tasks and Tools Administrating the InfoCubes Administrating the DataStore Objects Creating Process Chains

BW310 SAP BW - Enterprise Data Warehousing
Delivered OnlineFlexible Dates
Price on Enquiry

FortiGate Security

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Networking and security professionals involved in the management, configuration, administration, and monitoring of FortiGate devices used to secure their organizations' networks. Overview Deploy the appropriate operation mode for your network. Use the GUI and CLI for administration. Identify the characteristics of the Fortinet security fabric. Control network access to configured networks using firewall policies. Apply port forwarding, source NAT, and destination NAT. Authenticate users using firewall policies. Understand encryption functions and certificates. Inspect SSL/TLS-secured traffic to prevent encryption used to bypass security policies. Configure security profiles to neutralize threats and misuse, including viruses, torrents, and inappropriate websites. Apply application control techniques to monitor and control network applications that might use standard or non-standard protocols and ports. Fight hacking and denial of service (DoS). Defend against data leaks by identifying files with sensitive data, and block them from leaving your private network. Offer an SSL VPN for secure access to your private network. Implement a dial-up IPsec VPN tunnel between FortiGate and FortiClient. Collect and interpret log entries. In this three-day course, you will learn how to use basic FortiGate features, including security profiles. Course Outline Module 1. Introduction to FortiGate and the Security Fabric Module 2. Firewall Policies Module 3. Network Address Translation (NAT) Module 4. Firewall Authentication Module 5. Logging and Monitoring Module 6. Certificate Operations Module 7. Web Filtering Module 8. Application Control Module 9. Antivirus Module 10. Intrusion Prevention and Denial of Service Module 11. SSL VPN Module 12. Dial-Up IPsec VPN Module 13. Data Leak Prevention (DLP)

FortiGate Security
Delivered OnlineFlexible Dates
Price on Enquiry

CUIC11.6AU-Cisco Unified Intelligence Center 11.6 for Advanced Users

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The primary audiences for the course are as follows: Cisco technical customers (IT, telephony members, etc.) Cisco technology partners Cisco employees Overview Upon completing this course, the learner will be able to meet these overall objectives: Describe the CUIC High-Level Architecture and Deployment considerations Understanding Cisco Unified Intelligence Center Security, License Types and User Security Describe the installation and function of both the Controller Node Member Nodes. CUIC Configurations as well as how to upgrade the product is discussed. Managing Cisco Unified Intelligence Center Components Understanding Cisco Unified Intelligence Center Administration Describe what a Value List is and its function in CUIC Describe how Value Lists are created Describe what a Collection is and when you would use it when running reports Describe what are Report Definitions Describe the creation of Report Definitions and how to build a new Report using the new Report Definition The Cisco Unified Intelligence Center 11.6 for Advanced Users v1.1 (CUIC11.6AU v1.1) course is a 2-day instructor-led training (ILT) course. Cisco Unified Intelligence Center is a comprehensive, end-to-end reporting solution, designed to simplify the task of creating and modifying reports. It also can manage disparate data sources and, at the same time, to present a consistent user interface and a common tool to access varied data across multiple Cisco product families. Cisco Unified Intelligence Center Overview for the Advanced User Understanding Cisco Unified Intelligence Center Deployment Considerations Understanding Cisco Unified Intelligence Center Security, License Types and User Security Installing Cisco Unified Intelligence Managing Cisco Unified Intelligence Center Components Understanding Cisco Unified Intelligence Center Administration Using CUIC Value Lists and Collections as well as Report Definitions Using Value Lists and Collections Using Report Definitions

CUIC11.6AU-Cisco Unified Intelligence Center 11.6 for Advanced Users
Delivered OnlineFlexible Dates
Price on Enquiry

Enterprise Linux System Admin 2 with Exam Prep

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for IT professionals who have attended Red Hat System Administration I and want the skills to be full-time enterprise Linux administrators and/or earn RHCSA certifications This course focuses on the key tasks needed to become a full time Linux administrator and goes deeper into enterprise Linux administration including file systems and partitioning, logical volumes, SELinux, firewalling, and troubleshooting. Automate installation with Kickstart Automate the installation of Red Hat Enterprise Linux systems with Kickstart Use regular expressions with grep Write regular expressions that, when partnered with grep, will allow you to quickly isolate or locate content within text files. Create and Edit text files with vim Introduce the vim text editor, with which you can open, edit, and save text files. Schedule future Linux tasks Schedule tasks to automatically execute in the future. Manage priority of Linux processes Influence the relative priorities at which Linux processes run. Control access to files with access control lists (ACL) Manage file security using POSIX access control lists. Manage SELinux security Manage the Security Enhanced Linux (SELinux) behavior of a system to keep it secure in case of a network service compromise. Connect to network-defined users and groups Configure systems to use central identity management services. Add disks, partitions, and file systems to a Linux system Manage simple partitions and file systems. Manage logical volume management (LVM) storage Manage logical volumes from the command line. Access networked attached storage with network file system (NFS) Access (secure) NFS shares. Access networked storage with SMB Use autofs and the command line to mount and unmount SMB file systems. Control and troubleshoot the Red Hat Enterprise Linux boot process Limit network communication with firewall, Configure a basic firewall. Comprehensive review Practice and demonstrate knowledge and skills learned in this course.

Enterprise Linux System Admin 2 with Exam Prep
Delivered OnlineFlexible Dates
Price on Enquiry

Salesforce Build and Analyze Customer Journeys using Marketing Cloud (MKT101)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This class is designed for email digital marketers who manage the email channel for their organization. Whether you are new to Marketing Cloud or looking for tips on how to improve your existing customer journeys, this class is a great place to start. No prior knowledge of Marketing Cloud is needed. Overview When you complete this course, you will be able to: Explain compliance concepts to ensure optimal deliverability. Use tools within Marketing Cloud to uphold deliverability standards. Utilize Email Design best practices to ensure the best customer experience. Develop effective, relevant messages using Content Builder. Design and test different delivery methods and options when sending an email message. Design and execute customer journeys using automation tools within Marketing Cloud. Differentiate the use cases for different automation activities in Automation Studio and Journey Builder. Define fundamental data management and structure terminology. Use data segmentation tools to create targeted emails. Apply a simple data model concept to a real-world scenario. Define subscriber statuses, unsubscribe methods, and preferences. Analyze marketing campaigns using common KPIs. Solve a common marketing problem using troubleshooting guidance. Prioritize testing methods and tools to ensure quality control. Explain fundamental account and sending administration. Know where to go for more information, guidance, and support. Describe capabilities across the platform. Start your journey to becoming a Marketing Cloud Specialist. In this 5-day, expert-led class, you will learn how to build customer journeys within Marketing Cloud. Our team of Marketing Cloud pros will walk you through best practices related to executing, monitoring, and analyzing your journeys, arming you with the tools and know-how to design personalized journeys and engage with your customers in a whole new way. Course Outline Introduction to Salesforce Marketing Cloud Administration Subscriber and Data Management Email Message Design and Creation Message Testing, Delivery, and Email Marketing Best Practices Marketing Automation Analytics and Troubleshooting Summary

Salesforce Build and Analyze Customer Journeys using Marketing Cloud (MKT101)
Delivered OnlineFlexible Dates
Price on Enquiry

SonicWall Network Security Professional Course - SNSP - NA

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Security professionals, System engineers, channel partners, service partners, and end users with 1+ years of experience in implementing IT security technologies (Network, Applications, and Systems) and are also SNSAcertified. Overview The students will learn how to monitor, investigate, analyze, and configure SonicWall Next-Gen firewalls running SonicOS to enable advanced functionality related to Secure and Remote Connectivity, Network Optimization, and Threat Prevention. Upon successful completion of the SNSP program, the students will be able to demonstrate SonicWall product expertise and the application skill sets required to mount a proactive, effective defense against current and evolving network and cyber security threats. A key issue affecting an organization?s business productivity and employee efficiency today is its ability to respond to dynamic changes in the cyber threat landscape. Coming up on the heels of the highly successful SNSA program launched earlier this year, SonicWall now presents the SonicWall Network Security Professional (SNSP) course, an expert-level training and certification program that builds on the enterprise security skills learned in the SNSA course. Previously known as the Network Security Advance Administration (NSAA) course, the revamped SNSP curriculum expands on the topics covered in SNSA and features advanced SonicWall firewall configuration and administration tasks aimed at helping enterprises adapt to dynamic security environments. Relevant changes to the curriculum include an enhanced and deeper scope of SonicOS 6.5.x features and functionality, as well as changes in the learning and delivery methodologies to better balance the professional needs of the students and the business requirements for network and cyber security. Course Outline Course Introduction and Overview Configuring VPN Auto Provisioning Configuring Advanced Routing Configuring Advanced Interface Settings Using SonicOS CLI Configuring Capture Client Capturing and Replaying Packets Configuring DPI-SSL/TLS Server Configuring DPI-SSH Configuring App Rules Configuring App Control Configuring Advanced High Availability Excluding Trusted Content Resolving and Reporting False Positives Configuring Content Filtering Implementing Best Practices

SonicWall Network Security Professional Course - SNSP - NA
Delivered OnlineFlexible Dates
Price on Enquiry

Enterprise Linux System Admin 1 Essentials

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for IT professionals across a broad range of disciplines who need to perform essential Linux administration tasks including installation, establishing network connectivity, managing physical storage, and basic security administration. This course relates to Red Hat Enterprise Linux 7 and is designed for IT pros without previous Linux admin experience. The course focuses on providing students with Linux admin 'survival skills' by focusing on core admin tasks. Access the command line Log in to a Linux system and run simple commands using the shell. Manage files from the command line Copy, move, create, delete, and organize files from the bash shell prompt. Getting help in Red Hat Enterprise Linux Resolve problems by using online help systems and Red Hat support utilities. Create, view, and edit text files Create, view, and edit text files from command output or in an editor Manage local Linux users and groups Manage local Linux users and groups, and administer local password policies. Control access to files with Linux file system permissions Set Linux file system permissions on files and interpret the security effects of different permission settings. Monitor and manage Linux processes Obtain information about the system, and control processes running on it. Control services and daemons Control and monitor network services and system daemons using systemd. Configure and secure OpenSSH service Access and provide access to the command line on remote systems securely using OpenSSH. Analyze and store logs Locate and accurately interpret relevant system log files for troubleshooting purposes. Manage Red Hat Enterprise Linux networking Configure basic IPv4 networking on Red Hat Enterprise Linux systems. Archive and copy files between systems Archive files and copy them from one system to another. Install and update software packages Download, install, update, and manage software packages from Red Hat and yum package repositories. Access Linux file systems Access and inspect existing file systems on a Red Hat Enterprise Linux system. Use virtualized systems Create and use Red Hat Enterprise Linux virtual machines with KVM and libvirt.

Enterprise Linux System Admin 1 Essentials
Delivered OnlineFlexible Dates
Price on Enquiry