• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

864 Courses in Cardiff delivered Live Online

Cisco IPv6 Fundamentals, Design and Deployment 3.0 (IP6FD)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Network engineers and technicians that are working in the enterprise sector. Overview - Describe the factors that led to the development of IPv6 and possible uses of this new IP structure - Describe the structure of the IPv6 address format, how IPv6 interacts with data link layer technologies, and how IPv6 is supported in Cisco IOS Software - Implement IPv6 services and applications - Understand the updates to IPv4 routing protocols needed to support IPv6 topologies - Understand multicast concepts and IPv6 multicast specifics - Evaluate the scenario and desired outcome and identify the best transition mechanism for the situation - Describe security issues, how security for IPv6 is different than for IPv4, and emerging practices for IPv6-enabled networks - Describe the standards bodies that define IPv6 address allocation, in addition to one of the leading IPv6 deployment issuesâ€'multihoming - Describe the deployment strategies that service providers might consider when deploying IPv6 - Describe case studies for enterprise, service provider, and branch networks This course is a five-day course aimed at providing network engineers and technicians that are working in the enterprise sector with the knowledge and skills that are needed to study and configure Cisco IOS Software IPv6 features. Introduction to IPv6 Explaining the Rationale for IPv6 Evaluating IPv6 Features and Benefits Understanding Market Drivers IPv6 Operations Understanding the IPv6 Addressing Architecture Describing the IPv6 Header Format Enabling IPv6 on Hosts Enabling IPv6 on Cisco Routers Using ICMPv6 and Neighbor Discovery IPv6 Services IPv6 Mobility Describing DNS in an IPv6 Environment Understanding DHCPv6 Operations Understanding QoS Support in an IPv6 Environment Using Cisco IOS Software Features IPv6-Enabled Routing Protocols Routing with RIPng Examining OSPFv3 Examining Integrated IS-IS Examining EIGRP for IPv6 Understanding MP-BGP Configuring IPv6 Policy-Based Routing Configuring FHRP for IPv6 Configuring Route Redistribution IPv6 Multicast Services Implementing Multicast in an IPv6 Network Using IPv6 MLD IPv6 Transition Mechanisms Implementing Dual-Stack Describing IPv6 Tunneling Mechanisms IPv6 Security Configuring IPv6 ACLs Using IPsec, IKE, and VPNs Discussing Security Issues in an IPv6 Transition Environment Understanding IPv6 Security Practices Configuring Cisco IOS Firewall for IPv6 Deploying IPv6 Examining IPv6 Address Allocation Understanding the IPv6 Multihoming Issue Identifying IPv6 Enterprise Deployment Strategies IPv6 and Service Providers Identifying IPv6 Service Provider Deployment Understanding Support for IPv6 in MPLS Understanding 6VPE Understanding IPv6 Broadband Access Services IPv6 Case Studies Planning and Implementing IPv6 in Enterprise Networks Planning and Implementing IPv6 in Service Provider Networks Planning and Implementing IPv6 in Branch Networks Lab Exercises Lab 2-1: Enabling IPv6 on Hosts Lab 2-2: Using Neighbor Discovery Lab 3-1: Using Prefix Delegation Lab 4-1: Routing with OSPFv3 Lab 4-2: Routing with IS-IS Lab 4-3: Routing with EIGRP Lab 4-4: Routing with BGP and MP-BGP Lab 5-1: Multicasting Lab 6-1: Implementing Tunnels for IPv6 Lab 7-1: Configuring Advanced ACLs Lab 7-2: Implementing IPsec and IKE Lab 7-3: Configuring Cisco IOS Firewall Lab 9-1: Configuring 6PE and 6VPE Configuration Files Summary Lab Activity Solutions Teardown and Restoration Additional course details: Nexus Humans Cisco IPv6 Fundamentals, Design and Deployment 3.0 (IP6FD) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco IPv6 Fundamentals, Design and Deployment 3.0 (IP6FD) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco IPv6 Fundamentals, Design and Deployment 3.0 (IP6FD)
Delivered OnlineFlexible Dates
Price on Enquiry

Apple - Mac Final Cut Pro X - Level 101

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This class is designed for anyone looking to edit professional-quality video with Final Cut Pro X and who prefers hands-on and interactive instruction to best explore its functionality. Overview Start with basic video editing techniques and work all the way through Final Cut Pro's powerful advanced features. Students work with dramatic real-world media to learn the practical techniques used daily in editing projects. Final Cut Pro X is a revolutionary video editing application that makes it possible for beginners and professionals to achieve stunning results. This course teaches students to perform editing functions and becoming familiar with the user interface. Exploring the Final Cut Pro X Interface Following a Workflow Opening Final Cut Pro X Exploring the Interface Using Menus and Shortcuts Viewing and Sorting Events Skimming Clips and Changing Views Viewing and Creating Projects Working in the Project Library Viewing Projects in the Timeline Hiding and Quitting Final Cut Pro Importing Importing Media into an Event Importing Folders as Keyword Collections Analyzing and Correcting Imported Clips Importing from a Camera Importing from the Finder Importing from Other Applications Organizing Clips in an Event Using Metadata to Customize an Event Adding Keywords to Clips Assigning Multiple Keywords to Clips Applying Keywords to a Clip Range Rating, Sorting and Searching Clips Creating Smart Collections Building a Rough Cut Creating a New Project Screening and Marking Clips Appending Clips in the Timeline Viewing and Arranging Clips in the Magnetic Timeline Inserting Clips into the Primary Storyline Changing Edited Clips Connecting Clips to the Primary Storyline Closing your Project Finetuning a Rough CutAdding to the Primary Storyline Duplicating a Project Removing Clip Selections and Adding Gaps Understanding Trimming, Applying the Trim Tool Trimming with Precision Applying Transitions Preparing for Transitions Applying a Video Transition Using the Transitions Browser Modifying Transitions Changing Transition Parameters in the Inspector Adding Transitions to Other Storylines and Compound Clips Exploring Audio Transitions Working with Sound Monitoring and Adjusting Audio in the Timeline Adding Music and Sound Effects, Adjusting Levels in the Audio Inspector Creating Audio Fades Recording a Narration Track Correcting Problem Audio Working with Titles, Generators and Themes Using the Titles Browser Adding a Lower Third Modifying Titles Adding Bumpers and Credits Working with Video Generators Using Themes Retiming and Transforming Clips Understanding Motion Properties Retiming Clips Creating Holds and Variable Speed Segments Applying Preset Speed Effects Transforming an Image Cropping an Image Adding a Ken Burns Effect Creating Keyboard Shortcuts Applying Effects and Enhancing Color Applying Video Effects Modifying Effect Parameters Auditioning and Animating Effects Applying Audio Effects Enhancing Color in Final Cut Pro Exporting and Sharing Your Project Preparing a Project for Exporting and Sharing Detecting Audio Peaks Adjusting Video Levels for Broadcast Exporting Movie File Publishing a Project to Apple Devices Publishing a Project to Video Sharing Sites Exporting an Image from your Project Exporting for Blue-Ray Disc, DVD, or Disk Image Certification Exam Students can take an end user exam to earn Apple Certified Pro, Final Cut Pro X Level One status Additional course details: Nexus Humans Apple - Mac Final Cut Pro X - Level 101 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Apple - Mac Final Cut Pro X - Level 101 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Apple - Mac Final Cut Pro X - Level 101
Delivered OnlineFlexible Dates
Price on Enquiry

VMware Horizon 8: Virtual Desktop Bootcamp

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Operators, administrators, and architects responsible for the creation, maintenance, or delivery of remote and virtual desktop services. Overview By the end of the course, you should be able to meet the following objectives: Recognize the features and benefits of Horizon Use VMware vSphere to create VMs to be used as desktops for Horizon Create and optimize Windows VMs to create Horizon desktops Install and configure Horizon Agent on Horizon desktop Configure and manage the VMware Horizon Client™ systems and connect the client to a VMware Horizon desktop Configure, manage, and entitle desktop pools of full VMs Configure, manage, and entitle pools of instant-clone desktops Create and use Remote Desktop Services (RDS) desktops and application pools Monitor the Horizon environment using Horizon Console Dashboard and Horizon Help Desk Tool Implement a structured approach to troubleshooting Resolve common issues that occur in a Horizon environment Troubleshoot issues with linked and instant clones Configure the Windows client Identify the correct log level for gathering logs Optimize protocols for the best end-user experience VMware Horizon© 8: Virtual Desktop Bootcamp is a five-day combination course of VMware Horizon 8: Skills for Virtual Desktop Management and VMware Horizon 8: Virtual Desktop Troubleshooting. This training combination gives you the skills to deliver virtual desktops and applications through a single virtual desktop infrastructure platform. You build skills in configuring and managing VMware Horizon 8 through a combination of lecture and hands-on labs. You learn how to configure and deploy pools of virtual machines and how to provide a customized desktop environment to end-users. Additionally, you learn how to resolve common issues that occur in a VMware Horizon environment. You engage in a series of lab exercises to bring existing environment issues to resolution. The exercises mirror real-world troubleshooting use cases. These exercises equip learners with the knowledge and practical skills to manage typical challenges faced by virtual desktop administrators and operators. Course Introduction Introductions and course logistics Course objectives Introduction to VMware Horizon Recognize the features and benefits of VMware Horizon Describe the conceptual and logical architecture of VMware Horizon Introduction to Use Case Define a use case for your virtual desktop and application infrastructure Convert customer requirements to use-case attributes vSphere for Horizon 8 Explain basic virtualization concepts Use VMware vSphere© Client? to access your vCenter Server system and VMware ESXi? hosts Create, provision, and remove a virtual machine VMware Horizon Desktops Create a Windows and a Linux virtual machine using vSphere Optimize and prepare Windows and Linux virtual machines to set up VMware Horizon desktop VMs VMware Horizon Agents Outline the configuration choices when installing Horizon Agent on Windows and Linux virtual machines Create a gold master for Windows Horizon desktops VMware Horizon Pools Identify the steps to set up a template for desktop pool deployment List the steps to add desktops to the VMware Horizon© Connection Server? inventory Compare dedicated-assignment and floatingassignment pools Outline the steps to create an automated pool Define user entitlement Explain the hierarchy of global, pool-level, and userlevel policies VMware Horizon Client Options Describe the different clients and their benefits Access Horizon desktop using various Horizon clients and HTML Configure integrated printing, USB redirection, and the shared folders option Configure session collaboration and media optimization for Microsoft Teams Creating and Managing Instant-Clone Desktop Pools List the advantages of instant clones Explain the provisioning technology used for instant-clone desktop pools Set up an automated pool of instant clones Push updated images to instant-clone desktop pools Creating RDS Desktop and Application Pools Explain the difference between an RDS desktop pool and an automated pool Compare and contrast an RDS session host pool, a farm, and an application pool Create an RDS desktop pool and an application ool Access RDS desktops and application from Horizon Client Use the instant clone technology to automate the build-out of RDSH farms Configure load-balancing for RDSHs on a farm Monitoring VMware Horizon Monitor the status of the VMware Horizon components using the Horizon Administrator console dashboard Monitor desktop sessions using the HelpDesk tool Overview of Virtual Desktop Troubleshooting Structured approach to troubleshooting configuration and operational problems Applying troubleshooting methods

VMware Horizon 8: Virtual Desktop Bootcamp
Delivered OnlineFlexible Dates
Price on Enquiry

VMware vRealize Automation: Troubleshooting [V8.6]

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Experienced system administrators and cloud administrators who are already familiar with vRealize Automation Overview By the end of the course, you should be able to meet the following objectives: Learn installation best practices and troubleshoot installation failures Verify the correct DNS configuration Examine main logs and collect log bundles Examine the Kubernetes pods in the vRealize Automation architecture Troubleshoot common errors that prevent successful deployments Troubleshoot YAML code errors in VMware cloud templates Troubleshoot cloudConfig code errors in VMware cloud templates Troubleshoot VMware Identity Manager™ configuration errors Troubleshoot common errors in VMware vRealize Orchestrator™ workflows Use the vRealize Orchestrator debugger Use log outputs from vRealize Orchestrator Troubleshoot problems in custom resources Troubleshoot problems in resource actions Troubleshoot action-based extensibility (ABX) actions Integrate vRealize Automation with VMware vRealize Log Insight™ Integrate vRealize Automation with VMware vRealize Operations Manager™ Use VMware vRealize Lifecycle Manager™ to troubleshoot vRealize Automation problems with licenses and certificates Configure and replace certificates This three-day, hands-on training course provides you with the advanced knowledge, skills, and tools to achieve competency in troubleshooting VMware vRealize Automation™. vRealize Automation can be used to automate the delivery of virtual machines, applications, and personalized IT services across different data centers and hybrid cloud environments. This course will enable you to troubleshoot common problems with hands-on lab problems. Course Introduction Introductions and course logistics Course objectives Troubleshooting vRealize Automation Installation Issues vRealize Automation installation overview vRealize Automation installation best practices Troubleshooting installation failures vRealize Automation General Troubleshooting Verifying the DNS configuration settings in vRealize Automation and vSphere Examining the main logs in the user interface Collecting a log bundle Using vracli commands Examining the pods in the vRealize Automation Kubernetes architecture Dumping a log from a vRealize Automation Kubernetes pod Stopping and restarting a vRealize Automation Kubernetes pod vRealize Automation Cloud Templates and Deployment Troubleshooting Overview of provisioning and placement workflows Examining a deployment history Troubleshooting deployment issues Using deployment Dev mode Troubleshooting YAML code Troubleshooting problems with cloudConfig vRealize Automation Identity Manager Architecture and Cluster Architecture Authentication workflow in vRealize Automation Connector high availability for the authentication Architecture of a VMware Identity Manager cluster Key VMware Identity Manager commands and log files Troubleshooting a VMware Identity Manager problem Key vRealize Automation components Architecture of the vRealize Automation cluster vRealize Automation node failover scenario vRealize Automation cluster shutdown and startup process Virtual machine provisioning workflow Troubleshooting vRealize Orchestrator Workflows Overview of vRealize Orchestrator and vRealize Automation communications Using the vRealize Orchestrator debugger Using vRealize Orchestrator log output Troubleshooting vRealize Orchestrator binding errors Troubleshooting vRealize Orchestrator logic errors Troubleshooting vRealize Orchestrator payload errors Troubleshooting custom resource errors Troubleshooting resource action errors Troubleshooting Action Based Extensibility (ABX) Actions Overview of ABX actions Troubleshooting ABX actions vRealize Automation Integration with vRealize Tools Integrating vRealize Automation and vRealize Log Insight Integrating vRealize Automation and vRealize Operations Manager Using vRealize Operations Manager to monitor vRealize Automation vRealize Automation Certificate Management Managing vRealize Automation certificates Creating certificate requests with vRealize Lifecycle Manager Using Microsoft Certificate Services to create vRealize Automation certificates Replacing vRealize Automation certificates Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware vRealize Automation: Troubleshooting [V8.6] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware vRealize Automation: Troubleshooting [V8.6] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware vRealize Automation: Troubleshooting [V8.6]
Delivered OnlineFlexible Dates
Price on Enquiry

GRC300 SAP Access Control Implementation and Configuration

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course are Application Consultants, Business Process Architects, and Business Process Owners/Team Leads/Power Users. Overview This course will prepare you to:Describe tasks performed by a typical SAP Access Control userDiscuss Harmonization topics as they relate to SAP Access ControlExplain how SAP GRC helps you to address business challengesIdentify authorization risks in typical business processesDescribe the Segregation of Duties Risk Management ProcessDescribe and configure functionality and features for SAP Access Control 10.1Use the SAP Access Control 10.1 application to analyze and manage risk, design and manage roles, and provision and manage usersDescribe the SAP Access Control 10.1 architecture and landscape, SAP Access Control Repository, and Object Level SecurityDescribe the Periodic Access Review processPlan for and manage emergency accessDiscuss the reporting frameworkConfigure workflows, including multi-stage multi-path (MSMP) workflows and BRF+Describe how the different applications of the SAP GRC Solution integrate with each otherDiscuss key steps in the SAP Access Control implementation process In this course, students gain hands-on configuration and implementation experience of SAP Access Control 10.1, as well as important concepts they will need to know in order to prepare for implementation and ongoing access risk prevention. Introduction to SAP Access Control Discussing Business Challenges and Solutions Using SAP Access Control Architecture, Security, and Authorizations Describing the System Architecture Describing Security and Authorizations Shared Configuration Settings Configuring Shared GRC Settings Configuring Shared SAP Access Control Settings Authorization Risks and the Segregation of Duties (SoD) Management Process Identifying Authorization Risks Managing Risk by Segregating Duties SAP Access Control Repository Synchronizing Objects into the Repository Scheduling and Viewing Background Jobs Risk Analysis Maintaining Shared Master Data Configuring and Maintaining the Rule Set Configuring and Using Audit Trail Tracking Using the Risk Analysis Framework Remediating Risks Mitigating Risks Mitigating Multiple Risks at One Time Business Rule Framework Creating Rules in the Business Rule Framework (BRF) Defining Business Rules Multi-Stage, Multi-Path (MSMP) Workflow Describing Multi-Stage, Multi-Path (MSMP) Workflow Maintaining MSMP Workflow Building MSMP Workflow User Provisioning Configuring User Provisioning Settings Configuring Access Request Forms Requesting Access Preparing Roles and Owner Data for MSMP Workflow Creating Simplified Access Requests Reviewing Search Request Results SAP Fiori User Experience (UX) for GRC Describing SAP Fiori UX Role Design and Management Configuring Role Management Configuring Role Methodology Configuring Role Search Attributes Planning for Technical Role Definition Planning for Business Role Definition Consolidating Roles Through Role Mining Performing Role Mass Maintenance Operations Emergency Access Management Describing Emergency Access Management Planning for Emergency Access Monitoring Emergency Access Periodic Access Review Process Planning Periodic Review Monitoring Periodic Review Reports and Custom Fields Use the Reporting Framework SAP Access Control Implementation Using the SAP Access Control Implementation Process Designing the SAP Access Control Solution Planning Upgrade and Migration Configuring SAP Access Control Implementing the SAP Access Control solution Optimizing the SAP Access Control Suite Additional course details: Nexus Humans GRC300 SAP Access Control Implementation and Configuration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the GRC300 SAP Access Control Implementation and Configuration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

GRC300 SAP Access Control Implementation and Configuration
Delivered OnlineFlexible Dates
Price on Enquiry

Business Transformation with Google Cloud

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for Business decision-makers: directors (managers of managers), managers of individual contributors (ICs) or ICs working in non-IT functions/divisions (such as finance, marketing, sales, HR, product design) interested in understanding the applications of Google?s cloud technology for business improvement opportunities and transformational project(s). Through this interactive training, you?ll learn about core cloud business drivers?specifically Google?s cloud?and gain the knowledge/skills to determine if business transformation is right for you and your team, and build short and long-term projects using the ?superpowers? of cloud accordingly. You?ll also find several templates, guides, and resource links through the supplementary student workbook to help you build a custom briefing document to share with your leadership, technical teams or partners. Why cloud technology is revolutionizing business This module introduces cloud technology as a paradigm shift and explains how it?s irrevocably transforming business globally. It defines the fundamental building blocks of cloud technology?compute power and data?and what they mean for you and your business. And finally, it reveals how these building blocks help to create five superpowers using concrete use cases of their transformative abilities for business, education, and government sectors. Foster an innovation culture Cloud is not just about a technological transformation; it's a business and cultural transformation, too. This module explores how the superpowers of the cloud are brought to life through people. It looks specifically at how to organically create and scale innovation through culture and business practices. It offers key principles, drawing examples from Google?s success and real world scenarios, that you can apply in your day-to-day operations. Define the ideal business transformation challenge Previous modules describe the journey with cloud technology to include business and cultural changes as well. This module sets the groundwork to build a transformational solution using cloud technology for your role or your business. This process starts with distinguishing between scaled improvements and transformations. Next, the module demonstrates how to write an ideal challenge question and use insights generated from a data ecosystem to address the challenge. Finally, it introduces a framework that you can use to assess and refine your challenge ideas, preparing you to build a business case in a later module. Build trust with availability, security, and compliance This module addresses common concerns about data privacy and security when migrating to the cloud. It defines key terms - privacy, security, compliance, and reliability - and reveals today?s top cybersecurity challenges and threats. It discusses how data security and compliance can be maintained when data is in the cloud, as illustrated by the Shared Responsibility Model. And finally, it uses a concrete example to explain how learners can build a high-level security program in their own organization. Build a business case for your transformation challenge This module explains how to identify the most transformative solution for your business challenge. It then breaks down steps to achieve the transformational solution through creating smaller projects and plotting them onto a transformation roadmap. It describes how to use the data ecosystem you mapped in a previous module to support your overall project. Finally, it explains step by step how to build a business case and gives tips to help you pitch your project idea to gain buy-in from leadership, teams, and technical partners. Additional course details: Nexus Humans Business Transformation with Google Cloud training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Business Transformation with Google Cloud course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Business Transformation with Google Cloud
Delivered OnlineFlexible Dates
Price on Enquiry

Microsoft Teams for the Remote Business User

By Nexus Human

Duration 0.5 Days 3 CPD hours This course is intended for This course is intended for people who have made the transition to remote working and now wish to fully leverage Microsoft Teams for their day to day business needs. Done in a show and Tell style, this course is designed to give business users a thorough understanding of how to use Teams features from an organizational perspective. Features such as: how to manage communications, file sharing for collaboration, calendar events, conference calling, search functions and other daily tasks. Prerequisites: To ensure your success in this course, you should have end-user skills with any current version of Windows, including being able to open and close applications, navigate basic file structures, and manage files and folders. Overview Overview of Teams Permissions, Access & Restrictions Team Management (Power Users) Team Management (End Users) Communication and Collaboration Searching and Activity Sharing Files Customizing your settings Meetings and Calls Done in a show and Tell style, this course is designed to give business users a thorough understanding of how to use Teams features from an organizational perspective. Overview What is Microsoft Teams? How to Access Microsoft Teams Etiquette for using teams Integration and Storage Capabilities Interface Permissions, Access & Restrictions Owner, Member & Guest Team restrictions Channel restrictions Call Restrictions Team Management (Power Users) Create a Team Access administrator settings Add/delete members to a Team Add/delete a guest user Create and manage Channels Create and manage Private channels Customize Channel tabs Creating Tags Team Management (End Users) Getting your Channel email address Integration with Outlook Leave a Team or Channel Communication and Collaboration Team Conversations Using the New Conversation panel Replying to a conversation Using the interactive options Deleting and editing a conversation Turn off notifications for a conversation Using Mentions and Tags Saving messages Accessing your saved messages Accessing recent chats Create a new Chat for one-2-one Create a new chat for group chats Read Receipts Pop out Chats Searching and Activity Use the search tool to find Specific messages Files People Accessing your Activity Accessing your Feed Filtering your feed and activity Sharing Files Uploading files Viewing files Attaching files to a conversation Sharing a link to a file Edit and Collaborate on files Create files Open files in Teams Online Desktop SharePoint Add a file to a tab Share file outside your organization Customizing your settings Filter Teams Hide channels Channel notifications Channel analytics Changing your Status Setting your status message Controlling the general user settings Controlling your privacy settings Controlling your personal notification settings Controlling your device settings (headphones and microphone) Controlling your call settings Setting your Voicemail message Controlling your app permissions Meetings and Calls Accessing your calendar Calendar views Create a Teams meeting Meeting options Meeting requests and RSVP options Join a Teams meeting Copy join information Create a meeting from Outlook Using the Meet Now option Sharing your screen Changing your background image Adding more people to a meeting Meetings menu Download meeting attendees End meetings for everyone (Organizer only) Accessing your Contacts Accessing your Voicemail Accessing your call history Additional course details: Nexus Humans Microsoft Teams for the Remote Business User training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Microsoft Teams for the Remote Business User course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Microsoft Teams for the Remote Business User
Delivered OnlineFlexible Dates
Price on Enquiry

Managing and Troubleshooting PCs - Part 1

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for If you are getting ready for a career as an entry-level information technology (IT) professional or personal computer (PC) service technician, the CompTIA© A+© Certification course is the first step in your preparation. Overview In this course, you will install, configure, optimize, troubleshoot, repair, upgrade, and perform preventive maintenance on personal computers, digital devices, and operating systems. You will:Identify the hardware components of personal computers and mobile digital devices.Identify the basic components and functions of operating systems.Identify networking and security fundamentals.Identify the operational procedures that should be followed by professional PC technicians.Install, configure, and troubleshoot display devices.Install and configure peripheral components.Manage system components.Manage data storage.Install and configure Microsoft Windows.Optimize and maintain Microsoft Windows.Work with other operating systems.Identify the hardware and software requirements for client environment configurations.Identify network technologies.Install and configure networking capabilities.Support mobile digital devices.Support printers and multifunction devices.Identify security threats, vulnerabilities, and controls.Implement security controls.Troubleshoot system-wide issues. In this course, you will acquire the essential skills and information you will need to install, upgrade, repair, configure, troubleshoot, optimize, and perform preventative maintenance of basic personal computer hardware and operating systems. Hardware Fundamentals Topic A: Personal Computer Components Topic B: Storage Devices Topic C: Mobile Digital Devices Topic D: Connection Interfaces Operating System Fundamentals Topic A: PC and Mobile Operating Systems Topic B: PC Operating System Tools and Utilities Networking & Security Fundamentals Topic A: Network Types Topic B: Network Components Topic C: Common Network Services Topic D: Cloud Concepts Topic E: Security Fundamentals Safety & Operational Procedures Topic A: Basic Maintenance Tools and Techniques Topic B: Personal and Electrical Safety Topic C: Environmental Safety and Materials Handling Topic D: Professionalism and Communication Topic E: Organizational Policies and Procedures Topic F: Troubleshooting Theory Supporting Display Devices Topic A: Install Display Devices Topic B: Configure Display Devices Topic C: Troubleshoot Video and Display Devices Installing & Configuring Peripheral Components Topic A: Install and Configure Input Devices Topic B: Install and Configure Output Devices Topic C: Install and Configure Input/Output Devices Topic D: Install and Configure Expansion Cards Managing System Components Topic A: Identify Motherboard Components and Features Topic B: Install and Configure CPUs and Cooling Systems Topic C: Install Power Supplies Topic D: Troubleshoot System Components Managing Data Storage Topic A: Identify RAM Types and Features Topic B: Troubleshoot RAM Issues Topic C: Install and Configure Storage Devices Topic D: Configure the System Firmware Topic E: Troubleshoot Hard Drives and RAID Arrays Installing & Configuring Microsoft Windows Topic A: Implement Client-Side Virtualization Topic B: Install Microsoft Windows Topic C: Use Microsoft Windows Topic D: Configure Microsoft Windows Topic E: Upgrade Microsoft Windows Optimizing & Maintaining Microsoft Windows Topic A: Optimize Microsoft Windows Topic B: Back Up and Restore System Data Topic C: Perform Disk Maintenance Topic D: Update Software Working with Other Operating Systems Topic A: The OS X Operating System Topic B: The Linux Operating System Customized Client Enviroments Topic A: Types of Common Business Clients Topic B: Custom Client Environments Networking Technologies Topic A: TCP/IP Properties and Characteristics Topic B: TCP/IP Topic C: Internet Connections Topic D: Ports and Protocols Topic E: Networking Tools Installing & Configuring Networking Capabilities Topic A: Configure Basic Windows Networking Topic B: Configure Network Perimeters Topic C: Using Windows Networking Features Topic D: Install and Configure SOHO Networks Supporting Mobile Digital Devices Topic A: Install and Configure Exterior Laptop Components Topic B: Install and Configure Interior Laptop Components Topic C: Other Mobile Devices Topic D: Mobile Device Accessories and Ports Topic E: Mobile Device Connectivity Topic F: Mobile Device Synchronization Topic G: Troubleshoot Mobile Device Hardware Supporting Printers & Multifunction Devices Topic A: Printer and Multifunction Technologies Topic B: Install and Configure Printers Topic C: Maintain Printers Topic D: Troubleshoot Printers Security Threats, Vulnerabilities, and Controls Topic A: Common Security Threats and Vulnerabilities Topic B: General Security Controls Topic C: Mobile Security Controls Topic D: Data Destruction and Disposal Methods Implementing Security Controls Topic A: Secure Operating Systems Topic B: Secure Workstations Topic C: Secure SOHO Networks Topic D: Secure Mobile Devices Troubleshooting System-Wide Issues Topic A: Troubleshoot PC Operating Systems Topic B: Troubleshoot Mobile Device Operating Systems and Applications Topic C: Troubleshoot Wired and Wireless Networks Topic D: Troubleshoot Common Security Issues

Managing and Troubleshooting PCs - Part 1
Delivered OnlineFlexible Dates
Price on Enquiry

Introduction to Writing SQL Queries (TTSQL003)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This is an introductory- level course appropriate for those who are developing applications using relational databases, or who are using SQL to extract and analyze data from databases and need to use the full power of SQL queries. Overview This course combines expert lecture, real-world demonstrations and group discussions with machine-based practical labs and exercises. Working in a hands-on learning environment led by our expert practitioner, attendees will learn to: Maximize the potential of SQL to build powerful, complex and robust SQL queries Query multiple tables with inner joins, outer joins and self joins Construct recursive common table expressions Summarize data using aggregation and grouping Execute analytic functions to calculate ranks Build simple and correlated subqueries Thoroughly test SQL queries to avoid common errors Select the most efficient solution to complex SQL problems A company?s success hinges on responsible, accurate database management. Organizations rely on highly available data to complete all sorts of tasks, from creating marketing reports and invoicing customers to setting financial goals. Data professionals like analysts, developers and architects are tasked with creating, optimizing, managing and analyzing data from databases ? with little room for error. When databases aren?t built or maintained correctly, it?s easy to mishandle or lose valuable data. Our SQL Programming and Database Training Series provides students with the skills they require to develop, analyze and maintain data and in correctly structured, modern and secure databases. SQL is the cornerstone of all relational database operations. In this hands-on course, you learn to exploit the full potential of the SELECT statement to write robust queries using the best query method for your application, test your queries, and avoid common errors and pitfalls. It also teaches alternative solutions to given problems, enabling you to choose the most efficient solution in each situation. Introduction: Quick Tools Review Introduction to SQL and its development environments Using SQL*PLUS Using SQL Developer Using the SQL SELECT Statement Capabilities of the SELECT statement Arithmetic expressions and NULL values in the SELECT statement Column aliases Use of concatenation operator, literal character strings, alternative quote operator, and the DISTINCT keyword Use of the DESCRIBE command Restricting and Sorting Data Limiting the Rows Rules of precedence for operators in an expression Substitution Variables Using the DEFINE and VERIFY command Single-Row Functions Describe the differences between single row and multiple row functions Manipulate strings with character function in the SELECT and WHERE clauses Manipulate numbers with the ROUND, TRUNC and MOD functions Perform arithmetic with date data Manipulate dates with the date functions Conversion Functions and Expressions Describe implicit and explicit data type conversion Use the TO_CHAR, TO_NUMBER, and TO_DATE conversion functions Nest multiple functions Apply the NVL, NULLIF, and COALESCE functions to data Decode/Case Statements Using the Group Functions and Aggregated Data Group Functions Creating Groups of Data Having Clause Cube/Rollup Clause SQL Joins and Join Types Introduction to JOINS Types of Joins Natural join Self-join Non equijoins OUTER join Using Subqueries Introduction to Subqueries Single Row Subqueries Multiple Row Subqueries Using the SET Operators Set Operators UNION and UNION ALL operator INTERSECT operator MINUS operator Matching the SELECT statements Using Data Manipulation Language (DML) statements Data Manipulation Language Database Transactions Insert Update Delete Merge Using Data Definition Language (DDL) Data Definition Language Create Alter Drop Data Dictionary Views Introduction to Data Dictionary Describe the Data Dictionary Structure Using the Data Dictionary views Querying the Data Dictionary Views Dynamic Performance Views Creating Sequences, Synonyms, Indexes Creating sequences Creating synonyms Creating indexes Index Types Creating Views Creating Views Altering Views Replacing Views Managing Schema Objects Managing constraints Creating and using temporary tables Creating and using external tables Retrieving Data Using Subqueries Retrieving Data by Using a Subquery as Source Working with Multiple-Column subqueries Correlated Subqueries Non-Correlated Subqueries Using Subqueries to Manipulate Data Using the Check Option Subqueries in Updates and Deletes In-line Views Data Control Language (DCL) System privileges Creating a role Object privileges Revoking object privileges Manipulating Data Overview of the Explicit Default Feature Using multitable INSERTs Using the MERGE statement Tracking Changes in Data

Introduction to Writing SQL Queries (TTSQL003)
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Implementing Cisco Catalyst 9000 Switches v4.0 (ENC9K)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Network designers Network managers System engineers Overview After taking this course, you should be able to: Review the Cisco Catalyst 9000 Series Switches identify the switches' features and examine the functionalities purpose-built for Cisco DNA and the SD-Access solution. Position the different Cisco Catalyst 9000 Series Switch model types in the network, and map older Cisco Catalyst switches to the 9000 family for migration. Identify the role and value of Cisco Silicon One in a campus environment. Examine management capabilities of the Cisco Catalyst 9000 Series Switches. Describe the scalability and performance features supported by the Cisco Catalyst 9000 Series Switches. Describe the Cisco Catalyst 9000 Series Switch support for security, Quality of Service (QoS), and Internet of Things (IoT) convergence features. Describe automation features, Application Programming Interface (API), Infrastructure as Code, and automation tools supported on Cisco Catalyst 9000 Series switches. Describe the new QoS, IoT, and BGP EVPN Features on Cisco Catalyst 9000 Series Switches. Describe the maintenance features on Cisco Catalyst 9000 Series switches. Explore the SD-Access solution fundamentals, deployment models for the Cisco Catalyst 9000 Series Switch, and the use of Cisco DNA Center to manage infrastructure devices. Automate Day 0 device onboarding with Cisco DNA Center LAN Automation and Network PnP. Describe how to manage and host applications on Cisco Catalyst 9000 Series switches using Cisco DNA Center. Explore a modern approach to cloud-managed networking for Cisco Catalyst 9000 Series switches and wireless access points that uses the Meraki Dashboard and analytics. Describe the Cisco Catalyst 9200 Series Switch architecture, model types, port types, uplink modules, components including power supplies, and other switch features and capabilities. Describe the Cisco Catalyst 9300 Series Switch architecture, model types, port types, uplink modules, and components, including power supplies and stacking cables. Describe the Cisco Catalyst 9400 Series Switches, different modular chassis, supervisor and line card options, architectural components, uplink, and power redundancy, and Multigigabit ports Describe the Cisco Catalyst 9500 Series Switches, model types, switch components, RFID support, architecture, and switch profiles. Describe the Cisco Catalyst 9600 Series Switch architecture, supervisor and line card options, and high availability features. The Implementing Cisco Catalyst 9000 Series Switches (ENC9K) v4.0 course provides you with insight into Cisco Catalyst 9000 Series Switches and its solution components. You will learn about the architecture, capabilities, positioning, and implementation of the Cisco Catalyst 9000 Series switches, as well as the management of the switches using CLI, Cisco DNA Center, and IOS-XE web user GUI. Additionally, you will be introduced to security, cloud, automation, and other important features of Cisco Catalyst 9000 Series switches. Course Outline Introducing the Cisco Catalyst 9000 Series Switches Positioning Cisco Catalyst 9000 Series Switches Cisco Catalyst Silicon One Architecture Exploring Cisco Catalyst 9000 Series Switches Management Capabilities Scale and Performance Features on Cisco Catalyst 9000 Series Switches Security Features on Cisco Catalyst 9000 Series Switches Automation Features on Cisco Catalyst 9000 Series Switches QoS, IoT, and BGP EVPN Features on Cisco Catalyst 9000 Series Switches Maintenance Features on Cisco Catalyst 9000 Series Switches Cisco SD-Access Solution on Cisco Catalyst 9000 Series Switches Application Hosting on Cisco Catalyst 9000 Series Switches Cloud Management for Catalyst 9000 Series Using Meraki Dashboard Automating Network Changes with Cisco DNA Center Introducing Cisco Catalyst 9200 Series Switches Introducing Cisco Catalyst 9300 Series Switches Introducing Cisco Catalyst 9400 Series Switches Introducing Cisco Catalyst 9500 Series Switches Introducing Cisco Catalyst 9600 Series Switches Additional course details: Nexus Humans Cisco Implementing Cisco Catalyst 9000 Switches v4.0 (ENC9K) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Implementing Cisco Catalyst 9000 Switches v4.0 (ENC9K) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Implementing Cisco Catalyst 9000 Switches v4.0 (ENC9K)
Delivered OnlineFlexible Dates
Price on Enquiry