• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1485 Courses in Cardiff delivered Live Online

MS Project (Part 1) - Project Initiation and Planning

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is designed for all levels of experience in using Microsoft Project, as well as all levels of experience in project management. In particular, this course is designed for persons who need to author Microsoft Project work schedules including Project Managers and Project Assistants. Overview To be properly introduced, or reintroduced, to Microsoft Project. To gain an understanding of a proven mindset Microsoft Project users should possess each time they open and work Microsoft Project schedules. To gain an understanding of globally accepted project management principles. To be able to effectively apply Microsoft Project into the Initiation and Planning phases of a normal project life cycle. MS Project: Project Initiation and Planning (part 1 of a 3 part series) course provides proven tools and techniques for successfully using Microsoft Project to assist with managing projects. MS Project: Project Initiation and Planning (part 1 of a 3 part series) course provides proven tools and techniques for successfully using Microsoft Project to assist with managing projects.

MS Project (Part 1) - Project Initiation and Planning
Delivered OnlineFlexible Dates
Price on Enquiry

Word - introduction (In-House)

By The In House Training Company

This one-day workshop is designed to give participants an understanding of the fundamentals of Microsoft Word and its commands, with quick ways to enter text, control formatting and edit paragraphs. This course will help participants: Create, manage and save documents, files and folders Create paragraph lists, bulleted and numbered paragraphs Edit, modify and format paragraphs Create and format tables Use shortcuts to navigate documents Format the layout of documents Manage page headers and footers Insert and managing pictures and diagrams within a document Learn time saving tips and tricks to obtain a professional finish to documents Use printing options 1 Creating documents Getting help Creating and saving documents Accessing recently used documents Managing files and folders 2 Entering and editing text Inserting and editing paragraph text Cutting, copying and pasting text Using tool tips to manage content Applying and removing text formatting Correcting spelling and grammar 3 Creating paragraph lists Creating bulleted paragraphs Creating numbered paragraphs Managing bulleted and numbered lists 4 Modifying paragraphs Changing paragraph alignment Indenting a paragraph Adding borders and shading to paragraphs Formatting paragraphs using styles 5 Navigating documents Using shortcuts for navigating documents Using 'Go To' to navigate documents Finding and replacing text Changing to read view 6 Document layout Inserting page breaks Changing page orientation Adjusting page margins Adding borders to pages 7 Page headers and footers Inserting page headers and footers Using header and footer commands Inserting page numbers Using different first page 8 Inserting pictures and diagrams Inserting pictures from your computer Inserting online pictures Flowing text around a picture Changing a picture Inserting SmartArt diagrams Entering text into SmartArt 9 Inserting tables Using tabs to create tables Resizing and repositioning tables Inserting and deleting rows and columns Using a table's commands Changing a tables text direction Formatting tables 10 Printing documents Previewing and printing documents Using the printing tools Printing parts of a document

Word - introduction (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry

WS-013T00 Azure Stack HCI

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is for IT professionals who manage on-premises Windows Server environments and want to use Azure to manage server workloads and run their virtual workloads on Windows Server 2019. They also want to use existing Microsoft System Center products to implement and manage software-defined datacenters with Windows Server 2019. Overview Describe the Azure Stack portfolio, including Azure Stack HCI, Azure Stack Hub, and Azure Stack Edge Describe the Azure Stack HCI core technologies and management tools. Describe the process of a typical Azure Stack HCI implementation. Identify Azure Stack HCI hybrid capabilities. Implement, manage, and maintain workloads on Azure Stack HCI. Plan for and implement Azure Stack HCI Storage, including Storage QoS and Storage Replica. Plan for Azure Stack HCI Networking. Implement Software Defined Networks in Azure Stack HCI. This three-day course WS-013T00-A is intended primarily for IT Professionals who already have significant experience with managing an on-premises Windows Server environment. Its purpose is to cover advanced topics related to Windows Server software-defined datacenter, Azure Stack HCI, and other Azure Stack products. The course also describes the use of existing Microsoft System Center products to implement and manage software-defined datacenters with Windows Server 2019. This course is advanced and is designed for people that want to run their virtual workloads on Windows Server 2019 at medium-to-large scale using software-defined datacenter and hyper-converged principles. Introducing Azure Stack HCI Overview of Azure Stack HCI Overview of Azure Stack HCI technologies Overview of Azure Stack HCI management tools Overview of the Azure Stack HCI hybrid capabilities Operating and maintaining Azure Stack HCI Implementing and managing workloads on Azure Stack HCI Maintaining Azure Stack HCI Planning for and implementing Azure Stack HCI storage Overview of Azure Stack HCI Storage core technologies Planning for Storage Spaces Direct in Azure Stack HCI Implementing a Storage Spaces Direct-based hyper-converged infrastructure Managing Storage Spaces Direct in Azure Stack HCI Planning for and implementing Storage QoS Planning for and implementing Storage Replica Planning for and implementing Azure Stack HCI networking Overview of Azure Stack HCI core networking technologies Overview of network virtualization and Software-Defined Networking Planning for and implementing Switch Embedded Teaming Planning for and implementing Datacenter Firewall Planning for and implementing Software Load Balancing Planning for and implementing RAS Gateways

WS-013T00 Azure Stack HCI
Delivered OnlineFlexible Dates
Price on Enquiry

Thrive Under Pressure: Resilience Skills for Stressful Work Environments

By Eyes Up Training Limited

Transform stress into strength with this 4-week course, enhancing resilience, emotional skills, and effective communication for professionals.

Thrive Under Pressure: Resilience Skills for Stressful Work Environments
Delivered OnlineFlexible Dates
£350

Symantec Endpoint Protection 14.X - Configure And Protect

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is for Network, IT security, and systems administration professionals in a Security Operations position who are tasked with configuring optimum security settings for endpoints protected by Symantec Endpoint Protection 14. Overview At the completion of the course, you will be able to: Protect against Network Attacks and Enforcing Corporate Policies using the Firewall Policy. Blocking Threats with Intrusion Prevention. Introducing File-Based Threats. Preventing Attacks with SEP. Layered Security. Securing Windows Clients. Secure Mac Clients. Secure Linux Clients. Controlling Application and File Access. Restricting Device Access for Windows and Mac Clients. Hardening Clients with System Lockdown. Customizing Policies based on Location. Managing Security Exceptions. This course is designed for the network, IT security, and systems administration professionals in a Security Operations position who are tasked with configuring optimum security settings for endpoints protected by Symantec Endpoint Protection 14. Introduction Course environment Lab environment Introducing Network Threats Describing how Symantec Endpoint Protection protects each layer of the network stack Discovering the tools and methods used by attackers Describing the stages of an attack Protecting against Network Attacks and Enforcing Corporate Policies using the Firewall Policy Preventing network attacks Examining Firewall Policy elements Evaluating built-in rules Creating custom firewall rules Enforcing corporate security policy with firewall rules Blocking network attacks using protection and stealth settings Configuring advanced firewall feature Blocking Threats with Intrusion Prevention Introducing Intrusion Prevention technologies Configuring the Intrusion Prevention policy Managing custom signatures Monitoring Intrusion Prevention events Introducing File-Based Threats Describing threat types Discovering how attackers disguise their malicious applications Describing threat vectors Describing Advanced Persistent Threats and a typical attack scenario Following security best practices to reduce risks Preventing Attacks with SEP Layered Security Virus and Spyware protection needs and solutions Describing how Symantec Endpoint Protection protects each layer of the network stack Examining file reputation scoring Describing how SEP protects against zero-day threats and threats downloaded through files and email Describing how endpoints are protected with the Intelligent Threat Cloud Service Describing how the emulator executes a file in a sandbox and the machine learning engine?s role and function Securing Windows Clients Platform and Virus and Spyware Protection policy overview Tailoring scans to meet an environment?s needs Ensuring real-time protection for clients Detecting and remediating risks in downloaded files Identifying zero-day and unknown threats Preventing email from downloading malware Configuring advanced options Monitoring virus and spyware activity Securing Mac Clients Touring the SEP for Mac client Securing Mac clients Monitoring Mac clients Securing Linux Clients Navigating the Linux client Tailoring Virus and Spyware settings for Linux clients Monitoring Linux clients Providing Granular Control with Host Integrity Ensuring client compliance with Host Integrity Configuring Host Integrity Troubleshooting Host Integrity Monitoring Host Integrity Controlling Application and File Access Describing Application Control and concepts Creating application rulesets to restrict how applications run Monitoring Application Control events Restricting Device Access for Windows and Mac Clients Describing Device Control features and concepts for Windows and Mac clients Enforcing access to hardware using Device Control Discovering hardware access policy violations with reports, logs, and notifications Hardening Clients with System Lockdown What is System Lockdown? Determining to use System Lockdown in Whitelist or Blacklist mode Creating whitelists for blacklists Protecting clients by testing and Implementing System Lockdown Customizing Policies based on Location Creating locations to ensure the appropriate level of security when logging on remotely Determining the criteria and order of assessment before assigning policies Assigning policies to locations Monitoring locations on the SEPM and SEP client Managing Security Exceptions Creating file and folder exceptions for different scan types Describing the automatic exclusion created during installation Managing Windows and Mac exclusions Monitoring security exceptions

Symantec Endpoint Protection 14.X - Configure And Protect
Delivered OnlineFlexible Dates
Price on Enquiry

MS Project (Part 2) - Project Validation, Baseline and Tracking using Microsoft Project

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is designed for all levels of experience in using Microsoft Project, as well as all levels of experience in project management. In particular, this course is designed for persons who need to author Microsoft Project work schedules including Project Managers and Project Assistants, and for management personnel in charge of setting standards for baselining and tracking project data. Overview To gain an understanding of a proven mindset Microsoft Project users should possess each time they open and work Microsoft Project schedules. To gain an understanding of globally accepted project management principles. To be able to effectively apply Microsoft Project into the Execution phase of a normal project life cycle. To gain an understanding of Microsoft Project's baseline capabilities in preparation for analysis and reporting of project data. MS Project: Project Validation, Baseline, and Tracking using Microsoft Project course provides proven tools and techniques for successfully using Microsoft Project to assist with managing projects. MS Project: Project Validation, Baseline, and Tracking using Microsoft Project course provides proven tools and techniques for successfully using Microsoft Project to assist with managing projects.

MS Project (Part 2) - Project Validation, Baseline and Tracking using Microsoft Project
Delivered OnlineFlexible Dates
Price on Enquiry

Certified Agile Process Owner (DevOps Institute)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for - Every organization who has invested in the training of their development team in Scrum and/ or Agile - Process owners - Process managers - Employees and managers responsible for designing, reengineering or improving processes - Consultants guiding their clients through process improvement initiatives - Anyone responsible for: Managing process-related requirements Ensuring the efficiency and effectiveness of processes Maximizing the value of processes Overview -The learning objectives for CAPO include an understanding of: Basic Agile and Agile Service Management concepts Process owner role and responsibilities Managing and prioritizing a process backlog Creating and utilizing user stories Collaborating with process stake holders and other process owners Overseeing Agile process design and improvement activities Managing organizational change activities Monitoring and measuring process performance Conducting process reviews and identifying improvements This course provides guidance into the process Owner responsibilities so they can describe what they are doing as a process and provides the education needed to oversee the design, re-engineering and improvement of IT Service Management (ITSM) processes; particularly in the context of Agile Service Management. Students learn how to apply Scrum practices to Process Owner responsibilities and use Agile and Lean principles and practices to put in place ?just enough? process and how to continually align process performance with overall business goals. This course prepares you for the Certified Agile Process Owner (CAPO)© certification. Please contact the center for outline details Additional course details: Nexus Humans Certified Agile Process Owner (DevOps Institute) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Certified Agile Process Owner (DevOps Institute) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Certified Agile Process Owner (DevOps Institute)
Delivered OnlineFlexible Dates
Price on Enquiry

Symantec Ghost Solution Suite 3.0 - Administration

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is for network and system administrators, IT managers, IT support personnel, and other network operations staff who are responsible for deploying new computers across their organizations, managing ongoing software and hardware configuration tasks for computers, and retiring outdated computers. Overview By the completion of this course, you will be able to: Install and configure Ghost Solution Suite 3.0. Use the Ghost Console to create and use jobs and tasks to manage computes. Configure image deployments. Manage ?unknown? and predefined computers. Perform disk wipes and create disk partitions. Create Windows scripted OS installations. Create PC transplant templates. Capture a computer personality, and deploy personality packages. Perform a computer migration from Win 7 to Win 8.1. This course is designed for the professional tasked with installing, configuring, and managing a Deployment Solution system. Overview of Endpoint Lifecycle Management Introduction to Endpoint Lifecycle Management Phases of Endpoint Lifecycle Management ELM Business Objectives and Goals ELM Solution Mapping to Business Objectives Ghost Solution Suite 3.0 Product Overview Implementation Assessment ELM Requirements Gathering Solution Analysis of ELM Requirements Implementation Design GSS 3.0 Technical Overview Installation Options and Prerequisites Defining the Solution Infrastructure Defining the ELM Solution Configuration Installation and Configuration of the ELM Solution Base Software Installation Navigating the Console Core & Solution Configuration Driver Management Pre-boot Environment Endpoint Identification & Gathering IT Requirements Overview Analyzing and Defining IT Requirements Using ELM to Forecast IT Requirements Endpoint Configuration Standards Endpoint Standards Overview Defining Endpoint Standards Implementation of Endpoint Standards Endpoint Provisioning Endpoint Provisioning Overview Standard Build and Image Methodology Software Compatibility Analysis Software Packaging requirements for use in the ELM Solution Software Quality Assurance Methodology Endpoint Deployment & Staging Endpoint Lifecycle Automation Endpoint Lifecycle Automation Scenario Exercise Backup and restore Automating the backup of a computer image Scripted OS Installation Capturing an image for deployment Automating the creation of a master image Automating the deployment of computer images Software Distribution Software Delivery Methods Software Installation Methods Understanding Software Delivery Reporting and Analysis of Software Distribution Tasks Image and Build Maintenance Image maintenance overview Restoring a computer image Capturing the updated image Updating Jobs Managing Software Upgrades Software Upgrade Process Overview Distribution of Software Updates Supporting the Business Ensuring Business Continuity in an ELM System Endpoint Restoration/Recovery Managing Service Support Activities Endpoint Monitoring & Alerting Endpoint Configuration & Maintenance Automating Problem Resolution Application Self-Healing Desired State Management Hardware Refresh & Migration Hardware Refresh & Migration Process Overview Personality Capture and Restore Gathering Current State Inventory for Requirements and Planning Activities Performing Data capture and storage activities Gathering User state or PC personality information Automating the Migration Process Endpoint Retirement/Disposal Ensuring Compliant Disposal Methods and Procedures End to End Endpoint Lifecycle Use Case Endpoint Management Lifecycle Use Case for GSS Additional course details: Nexus Humans Symantec Ghost Solution Suite 3.0 - Administration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Symantec Ghost Solution Suite 3.0 - Administration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Symantec Ghost Solution Suite 3.0 - Administration
Delivered OnlineFlexible Dates
Price on Enquiry

VMware Cloud Director: Install, Configure, Manage [v10.3]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Customers, cloud architects, systems engineers, data center administrators, and cloud administrators with experience in managed services or managing a service provider environment. Overview By the end of the course, you should be able to meet the following objectives: Deploy VMware Cloud Director Manage VMware Cloud Director to meet the service provider needs Create and manage VMware Cloud Director organizations and vApps to fulfill business needs Create and manage VMware Cloud Director catalogs Transfer virtual machine workloads from VMware vSphere into and out of VMware Cloud Director Configure networking for organizations and vApps with the help of VMware NSX-T Data Center Managing resources from the VMWare Cloud Director console and using VMware vRealize Operations Manager Enabling VM and Named Disk Encryption Creating VM sizing and placement policies Understand vApps and VM operations and actions In this five-day course, you focus on installing, configuring, and managing VMware Cloud Director 10.3. You learn about workload provisioning, the creation of organizations, virtual data centers (VDCs), catalog services that include predefined virtual machines, and on-demand VMware NSX-T Data Center networks.This course also covers interfacing VMware Cloud Director with other systems and the integration and use of VMware vRealize Orchestrator for VMware Cloud Director. You learn about different networks that a system administrator and an organization administrator can configure and use with virtual machines (VMs). This course also discusses how to monitor various VMware Cloud Director objects using VMware vRealize Operations. Course Introduction Introductions and course logistics Course objectives Software-Defined Data Center and VMware Validated Design Define Software Defined Datacenter (SDDC) Discuss VMware offerings for Cloud-Based Services Discuss the deployment options for VMware Cloud Director Discuss VMware Validated Design Recognize the design considerations when creating a cloud environment on the SDDC using VMWare Cloud Foundation vCloud Director Deployment and Configuration Discuss the deployment options for VMware Cloud Director Explain the two-stage deployment of VMware Cloud Director cells Discuss failover mechanisms (automatic and manual) with VMware Cloud Director cells Define switchover, promote, and fencing options of the VMware Cloud Director appliance Understand the VMware Cloud Director appliance enhancements VMware Cloud Director Provider Configuration Describe how the compute resources are provided to VMware Cloud Director Describe how storage is provided to VMware Cloud Director Configure and manage storage for Virtual Datacenters (VDCs) Briefly discuss network pools, external networks, and Tier-0 Gateways Showcase VMware Cloud Director integration with vCenter Server and NSX-T Data Center Describe VMware Cloud Director organizations Understand organization policies Explain how to access an organization using various portals Understand organization VDC Discuss what is Linked Clone and Fast Provisioning Understand the use cases of Allocation Models VMware Cloud Director User, Roles and Quota Management Discuss user-bundle Describe role-based access Explain custom roles and rights Describe and configure LDAP integration with Active Directory Discuss OIDC authentication methods Describe SAML identity provider VMware Cloud Director Virtual Machines and vApps Understand standalone VMs Discuss the VM managing operations Explain VM properties Discuss deployment methods of vApps Discuss the vApp managing operations Discuss the vApp lease policies Understand the vApps and VM actions Explain vApp and VM badges VMware Cloud Director Content Libraries Explain the purpose of catalogs and how to create a catalog organization Define catalog management and sharing catalogs inside and between organizations Explain medias in VMware Cloud Director and its usage Discuss vApp templates Understand vApp template operations Describe the purpose and usage of Open Virtualization Format (OVF) Discuss organization VDC templates VMware Cloud Director Networking Discuss organization VDC networks List the types of organization VDC networks Describe the edge gateway services Explore the services offered by the edge gateway Discuss sub-allocation IP pool and its use cases Discuss DHCP, NAT, load balancer, and firewall services on the edge gateway Discuss SNAT, DNAT, NO SNAT, and NO DNAT use cases Discuss vApp networks List the various types of vApp networks Discuss routed, isolated, and direct vApp networks Managing billing and reports of vCloud Director objects using Tenant vApp VMware Cloud Director Storage and Compute Describe named disks and shared named disks Demonstrate how to attach and detach a named disk and a shared named disk Describe methods of sharing the named disk Discuss the implications of deleting VMs that have an attached named disk Discuss how VMware Cloud Director VMs and disks are encrypted Explain the storage policy capabilities Demonstrate how VM sizing and placement policies are published Discuss vCenter server and VMware Cloud Director IOPS storage policies usage Discuss how to enable and use the storage IOPS limitation in VMware Cloud Director Describe the storage policy supported entities Extensibility and UI Additional Features Explain custom advisories, global search, guided tours, data exporter, keyboard shortcuts, and quick search Understand vcd-cli supported commands Discuss various vcd-cli tools VMware Cloud Director Resource Monitoring Identify log locations for VMware Cloud Director Manage vSphere and cloud resources from VMware Cloud Director Understand monitoring of objects from VMware Cloud Director portals Briefly introduce vRealize Operations Manager Integrate VMware Cloud Director with vRealize Operations Manager Configure VMware Cloud Director Management Pack Understand dashboard, metrics, alerts, alert definition, and reports Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Cloud Director: Install, Configure, Manage [v10.3] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Cloud Director: Install, Configure, Manage [v10.3] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware Cloud Director: Install, Configure, Manage [v10.3]
Delivered OnlineFlexible Dates
Price on Enquiry

C)HISSP-Certified Health Information Systems Security Practitioner Mile 2

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for IS Security Officers Privacy Officers Health IS Managers Risk Managers Information Security Managers Compliance and Privacy Officers Overview Upon completion, the student will be ready to take the Certified Healthcare Information Systems Security Practitioner exam by mile2. In addition, at the end of the CHISSP course, the student will be versed with best practices in the healthcare industry and will be able to establish a framework with current best practices in respects to privacy, regulation and risk management. The Certified Healthcare IS Security Practitioner, C)HISSP certification course covers the skills and knowledge to implement the best IT healthcare practices, as well as, regulatory compliance and standards in the healthcare industry. Because of growing industry regulations and privacy requirements in the healthcare industry, the C)HISSP was developed by Mile2. Graduates of this course have become vital in managing and protecting healthcare data and are tasked to protect patient information by implementing, managing, and assessing proper IT controls for patient health information integrity. Course Outline Intro to the Healthcare Industry Regulatory Environment Healthcare Privacy and Security Policies Information Governance Risk Management Third-Party Risk Management

C)HISSP-Certified Health Information Systems Security Practitioner Mile 2
Delivered OnlineFlexible Dates
Price on Enquiry