• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

16 Courses in Manchester delivered Live Online

The GDPR Primer for Data Protection Officers

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for A prior understanding of EU Data Protection legislation is recommended. Candidates are typically management professionals and decision-makers who already have responsibility for data protection compliance within their organisation.Co-Requisite Subjects Candidates should have a good understanding of their own organisation?s data management activities through the life cycle from initial acquisition, through the various areas of processing and usage, to eventual removal or destruction. Overview To equip the learner with a foundational understanding of the principles of the General Data Protection Regulation (GDPR) and to provide constructive suggestions on implementing compliant processes. The social, historical and legal background leading to the General Data Protection Regulation (GDPR) The scope and global context of the GDPR The key concepts within the GDPR The definition of all key words and phrases relating to this Data Protection regulation Principle One: The criteria governing fair, open and transparent processing of personal data Principle Two: Purpose Limitation, the challenge of limiting the processing within the context of specified and lawful purposes Principle Three: Minimisation of processing, and ensuring that only that data is processed which is necessary to achieve the purpose. Principle Two: Purpose Limitation, the challenge of limiting the processing within the context of specified and lawful purposes Principle Three: Minimisation of processing, and ensuring that only that data is processed which is necessary to achieve the purpose. Principle Four: Ensuring that any personal data held by the organisation is kept accurate and current, and that any processing of such data is appropriate Principle Five: Management and storage of personal data in a manner that meets regulatory obligations, while minimising the time that the individual remains identifiable Principle Six: The criteria governing safe, secure and confidential processing of personal data in order to protect its integrity Principle Seven: The key roles, responsibilities and accountabilities of those involved in Data Management within an organisation Establishment within a single Member State Joint Controllers Privacy by Design and by Default Nominated Representatives Third-party Contracts and shared liability Logging of data management processes Data Breach Notification obligations Privacy Impact Assessments Overseas transfer of personal data L2.8 The Data Subject Rights, and their implications for the Data Controller and the Data Processor L2.8.1 The ?right to be forgotten? L2.8.2 The right to restriction of processing L2.8.3 The right to object to certain processing L2.8.4 The right to have inaccurate data amended or erased L2.8.5 The right to data portability L2.8.6 The right of access to one?s personal data L2.8.7 Rights in relation to automated decision-making and profiling The role of the Data Protection Officer (DPO) The role of the Data Protection Officer (DPO) Criteria for designating a DPO Tasks of the DPO Position of the DPO within the organisation The role of the Supervisory Authority within the Member State The Lead Supervisory Authority and independence Investigative, corrective and advisory powers Independence of the Supervisory Authority Collaboration with other Supervisory Authorities Codes of Conduct and Certification The role, powers and tasks of the European Data Protection Board (EDPB) The remedies, liabilities and penalties available under the GDPR Right to raise a complaint Right to representation Right to effective judicial remedy Right to compensation and liability Administrative fines of up to ?10m or 2% of GAT Administrative fines of up to ?20m or 4% of GAT Provisions for specific processing situations Freedom of Expression Processing of official documents Processing of National Identification Numbers Processing regarding employment Processing for archiving purposes Processing under obligations of official secrecy Processing of data by religious organisations Preparing for implementation of the GDPR Review of data management policies and procedures Review of data assets and security structures Training and Awareness-raising Data management governance structures Embedding Privacy By Design and Default Codes of Conduct and Certification against standards Breach detection and notification procedures Review of third-party agreements, contracts

The GDPR Primer for Data Protection Officers
Delivered OnlineFlexible Dates
Price on Enquiry

Certified Data Protection Officer Training (CDPO)

By Training Centre

  The IECB Certified Data Protection Officer training course will help you acquire the knowledge and skills to serve as a Data Protection Officer (DPO), allowing you to help organizations understand and implement solutions that meet the compliance requirements of the General Data Protection Regulation (GDPR), as well as a number of other regulatory requirements. The course takes a practical look at the GDPR requirements and advises on the mapping of solutions. In this way, delegates can master the role of the DPO and become competent to inform, advise, and monitor compliance with the GDPR and cooperate with the supervisory authority. About This Course   After attending the training course, you can sit for the exam, and gain the 'Certified Data Protection Officer' credential, which validates that you have the Legal and regulatory knowledge required of a key adviser and practical knowledge to advise organisations how to meet their obligations regarding the GDPR compliance   Learning Outcomes; Acquire a thorough understanding of the basic concepts and components of global Data Protection Regulation(s) Understand the correlation between the General Data Protection Regulation and best practice standards such as ISO 27701 Acquire a thorough understanding of the data protection by design requirements, particularly in relation to the protection of data Interpret the data protection requirements within the context of an organization Understand how to support an organization to plan, implement, manage, monitor and maintain ongoing compliance to the GDPR   Our approach  This training course is based on the practical application of best practices used in exercising the role of the DPO. Course modules include practical examples of the role of DPO. Delegates are encouraged to engage in discussions and exercises. A Case Study which brings the materials to life.   Course agenda   Day 1: Introduction to the GDPR Principles Day 2: The role of the DPO in the determination of a GDPR compliance program Day 3: The role of the DPO in business operations Day 4: Monitoring and maintenance of the GDPR compliance programme, as well as the examination   Prerequisites   A basic understanding of the GDPR will benefit course delegates.  What's Included?   Refreshments & Lunch (Classroom only) Course Slide Deck Official Study Materials CPD Certificate The Exam fees Who Should Attend?   Individuals seeking to move into the role of DPO Team members who define, implement, and maintain a GDPR compliance programme Information Security Managers responsible for the personal data protection of an enterprise and the management of its risks Members of an information security, risk management, or Data Governance team Our Guarantee   We are an approved IECB Training Partner. You can learn wherever and whenever you want with our robust classroom and interactive online training courses. Our courses are taught by qualified practitioners with commercial experience. We strive to give our delegates the hands-on experience. Our courses are all-inclusive with no hidden extras.  The one-off cost covers the training, all course materials, and exam voucher. Our aim: To achieve a 100% first time pass rate on all our instructor-led courses. Our Promise: Pass first time or 'train' again for FREE. *FREE training offered for retakes - come back within a year and train for free, with the exam retake included too. Assessment   All candidates at official training courses will be offered the opportunity to sit the associated exam. For CDPO, this constitutes a 12 question essay type exam which should be completed within 240 minutes. A passing score is achieved at 70%. Accreditation Provided by   This course is Accredited by NACS and Administered by the IECB.

Certified Data Protection Officer Training (CDPO)
Delivered OnlineFlexible Dates
£1,450

Certified Information Privacy Professional (CIPP/E)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Data Protection Officers Data Protection Lawyers Records Managers Information Officers Compliance Officers Human Resource Officers Anyone who uses, processes and maintains personal data Overview The General Data Protection Regulation (GDPR) took effect in 2018. Are you in compliance? There's a lot to know, there's a lot at stake and there's a lot of opportunity for data protection professionals with the right training and education. Achieving a CIPP/E credential shows you have the comprehensive GDPR knowledge, perspective and understanding to ensure compliance and data protection success in Europe-and to take advantage of the career opportunity this sweeping legislation represents. The Certified Information Privacy Manager (CIPM) credential provides the practical day-to-day information to lead an organisation's data protection programme. Adding the CIPM to your CIPP/E puts you at the forefront of ensuring you are ready for the GDPR. The General Data Protection Regulation (GDPR) took effect in 2018. Are you in compliance? There?s a lot to know, there?s a lot at stake and there?s a lot of opportunity for data protection professionals with the right training and education. Achieving a CIPP/E credential shows you have the comprehensive GDPR knowledge, perspective and understanding to ensure compliance and data protection success in Europe?and to take advantage of the career opportunity this sweeping legislation represents. The Certified Information Privacy Manager (CIPM) credential provides the practical day-to-day information to lead an organisation?s data protection programme. Adding the CIPM to your CIPP/E puts you at the forefront of ensuring you are ready for the GDPR. Data protection laws Key European data protection laws and regulatory bodies Evolving toward a harmonised legislative framework Personal Data Understanding and differentiating between types of data as defined by the GDPR Personal, anonymous, pseudonymous and special categories Controllers and Processors Roles and relationships of controllers and processors as defined by the GDPR Processing Personal Data Data processing and GDPR processing principles Applying the GDPR Legal grounds for processing personal data Data subject rights Data subject rights Applying rights Controller and processor obligations Information provision obligations Controller obligations for providing information about data processing activities to data subjects Supervisory authorities as set out in the GDPR Cross-border data transfers Options and obligations under the GDPR for transferring data outside the European Economic Area Adequacy decisions Safeguards and derogations Compliance considerations Applying European data protection laws Legal bases and compliance requirements for processing personal data in practice Processing employee data Surveillance Direct marketing Internet technology and communications Security of processing Considerations and duties of controllers and processors for ensuring security of personal data GDPR specifications for providing notification of data breaches Accountability Accountability requirements Data protection management systems Data protection impact assessments Data protection policies Role of the data protection officer Supervision and enforcement Role, powers and procedures of supervisory authorities Composition and tasks of the European Data Protection Board Role of the European Data Protection Supervisor Remedies, liabilities and penalties for noncompliance as set out in the GDPR Additional course details: Nexus Humans Certified Information Privacy Professional (CIPP/E) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Certified Information Privacy Professional (CIPP/E) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Certified Information Privacy Professional (CIPP/E)
Delivered OnlineFlexible Dates
Price on Enquiry

GDPR Data Protection Officer

By Nexus Human

Duration 4.125 Days 24.75 CPD hours This course is intended for Managers or consultants seeking to prepare and support an organization in planning, implementing, and maintaining a compliance program based on the GDPR DPOs and individuals responsible for maintaining conformance with the GDPR requirements Members of information security, incident management, and/or business continuity teams Technical and compliance experts seeking to prepare for a data protection officer role Expert advisors involved in the security of personal data Overview Understand the concepts of the GDPR and interpret its requirements Understand the content and the correlation between the General Data Protection Regulation and other regulatory frameworks and applicable standards, such as ISO/IEC 27701 and ISO/IEC 29134 Develop the ability to inform, advise, and monitor compliance with the GDPR and cooperate with the supervisory authority Acquire the competence to perform the role and daily tasks of the data protection officer in an organizationit Considering that data breaches have become highly sophisticated in the recent years, the need for data protection has increased as well.Information Security is crucial to the success of any organization since it deals with the protection of sensitive data from unauthorized access, use, replication and destruction. As such, organizations should put in place measures and controls to manage and diminish Information Security risks and comply with GDPR requirements. In case organizations fail to comply with the GDPR requirements, the penalties can reach up to 2% of an organization?s annual turnover. Also, in case of more serious infringements, the penalties can amount to 4% of an organization?s annual revenue. The implementation of a Privacy Framework, on the other hand, will allow professionals to develop and implement reliable controls that are generally accepted.Becoming a Certified Data Protection Officer will enable you to acquire the necessary expertise to understand the risks that could have a negative impact on your organization and implement the required strategic responses based on the GDPR best practices, requirements and principles. Introduction to the GDPR concepts and principles Training course objectives and structure General Data Protection Regulation (GDPR) Core considerations for the GDPR Designation of the DPO and analysis of the GDPR compliance program Designation of the DPO Analysis of the GDPR compliance program Relationship with the top management Data protection policy Register of processing activities Risk management process DPO operations Data protection impact assessment Documentation management Evaluation of the data protection controls Data protection and technology Awareness, training, and communication Monitoring and continual improvement of GDPR compliance Incident management and personal data breaches Monitoring and measuring compliance Data protection internal audit Treatment of nonconformities Continual improvement Closing the training course

GDPR Data Protection Officer
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Implementing Cisco Advanced Call Control and Mobility Services v.1.0 (CLACCM)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for Collaboration engineers and administration professionals in job roles such as: Network administrator Network architect Network designer Network engineer Network manager Overview After taking this course, you should be able to: Analyze and troubleshoot SIP, H.323, and media protocols Implement time-of-day routing, call park, call pickup, and meet-me conferences in Cisco Unified Communications Manager Implement call coverage in Cisco Unified Communications Manager Configure and troubleshoot Cisco Unified Communications Manager Device Mobility Configure and troubleshoot Cisco Unified Communications Manager Extension Mobility Configure and troubleshoot Cisco Unified Communications Manager Unified Mobility Implement Cisco Unified Communications Manager Express for SIP phones Implement globalized call routing within and between Cisco Unified Communications Manager clusters Implement Media Gateway Control Protocol (MGCP) fallback and Survivable Remote Site Telephony (SRST) in Cisco Unified Communications Manager and in Cisco IOS XE gateways Implement Call Admission Control and Automated Alternate Routing (AAR) in Cisco Unified Communications Manager Implement URI calling in Cisco Unified Communications Manager for calls within a cluster and between clusters Troubleshoot multisite Cisco Unified Communications Manager deployments Implement Intercluster Lookup Service (ILS) between Cisco Unified Communications Manager clusters and enable General Data Protection Regulation (GDPR) Configure and troubleshoot Cisco Unified Border Element In this course, you will learn how to use Cisco© Unified Communications Manager features to consolidate your communications infrastructure into a scalable, portable, and secure collaboration solution. This course prepares you for the 300-815 Implementing Cisco Advanced Call Control and Mobility Services (CLACCM) concentration exam and CCNP-Collaboration certification. Course Outline Analyzing and Troubleshooting Signaling and Media Protocols Implementing Cisco Unified Communications Manager Supplemental Services Implementing Call Coverage in Cisco Unified Communications Manager Configuring and Troubleshooting Cisco Unified Communications Manager Device Mobility Configuring and Troubleshooting Cisco Unified Communications Manager Extension Mobility Configuring and Troubleshooting Cisco Unified CM Unified Mobility Implementing Cisco Unified Communications Manager Express Implementing Globalized Call Routing Implementing Remote Site Survivability Implementing Call Admission Control in Cisco Unified Communications Manager Implementing URI Calling in Cisco Unified Communications Manager Troubleshooting Multisite Cisco Unified Communications Manager Deployments Examining Global Dial Plan Replication Configuring and Troubleshooting Cisco Unified Border Element Lab outline Analyze SIP, H.323, and Media Protocols Troubleshoot SIP and Media Protocols Implement Cisco Unified Communications Manager Supplemental Services Implement Call Hunting and Call Queueing in Cisco Unified Communications Manager Configure Device Mobility Troubleshoot Cisco Unified Communications Manager Device Mobility Configure Cisco Unified Communications Manager Extension Mobility Troubleshoot Cisco Unified Communications Manager Extension Mobility Configure Cisco Unified Mobility Troubleshoot Cisco Unified Mobility Implement Endpoints in Cisco Unified Communications Manager Express Implement Endpoint Addressing and Call Routing in Cisco Unified Communications Manager Express Implement Calling Privileges in Cisco Unified Communications Manager Express Implement Hunt Groups, Call Park, and Paging in Cisco United Communications Manager Express Implement Globalized Call Routing Implement TEHO, PSTN Backup, and CoS in a Globalized Call-Routing Deployment Implement MGCP Fallback and Survivable Remote Site Telephony Implement Call Admission Control Implement a URI-Based Dial Plan for Multisite Deployments Troubleshoot Globalized Call Routing Troubleshoot Call Admission Control Implement Global Dial Plan Replication Implement Cisco Unified Border Element Troubleshoot Cisco Unified Border Element

Cisco Implementing Cisco Advanced Call Control and Mobility Services v.1.0 (CLACCM)
Delivered OnlineFlexible Dates
Price on Enquiry

Veeam Availability Suite v11: Configuration and Management (VASv11CM)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is suitable for anyone responsible for configuring, managing or supporting a Veeam Availability Suite v11 environment. Students should be experienced professionals with solid knowledge of servers, storage, networking and virtualization. Overview After completing this course, attendees should be able to: Describe Veeam Availability Suite components usage scenarios and relevance to your environment. Effectively manage data availability in on-site, off-site, cloud and hybrid environments. Ensure both Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs) are met. Configure Veeam Availability Suite to ensure data is protected effectively. Adapt with an organization's evolving technical and business data protection needs. Ensure recovery is possible, effective, efficient, secure and compliant with business requirements. Provide visibility of the business data assets, reports and dashboards to monitor performance and risks. The Veeam© Availability Suite? v11: Configuration and Management training course is a three-day, technical deep dive focused on teaching IT professionals the skills to configure, manage and support a Veeam Availability Suite v11 solution. With extensive hands-on-labs, the class enables administrators and engineers to effectively manage data in an ever-changing technical and business environment, bringing tangible benefit to businesses in the digital world. Introduction Describe RTOs and RPOs, what they mean for your business, how to manage and monitor performance against them The 3-2-1 Rule and its importance in formulating a successful backup strategy Identify key Veeam Availability Suite components and describe their usage scenarios and deployment types Building backup capabilities Backup methods, the appropriate use cases and impact on underlying file systems Create, modify, optimize and delete backup jobs, including Agents and NAS Backup jobs. Explore different tools and methods to maximize environment performance Ensure efficiency by being able to select appropriate transport modes while being aware of the impact of various backup functions on the infrastructure Building replication capabilities Identify and describe the options available for replication and impacts of using them Create and modify replication jobs, outline considerations to ensure success Introduce the new Continuous Data Protection (CDP) policy Secondary backups Simple vs. advanced backup copy jobs, how to create and modify them using best practices to ensure efficient recovery Discuss using tapes for backups Advanced repository capabilities Ensure repository scalability using a capability such as SOBR on-premises and off-site including integration with cloud storage Ensure compatibility with existing deduplication appliances Introduce the new hardened repository Protecting data in the cloud Review how Veeam can protect the data of a cloud native application Review how Veeam Cloud Connect enables you to take advantage of cloud services built on Veeam Review how Veeam can be used to protect your Office 365 data Restoring from backup Ensure you have the confidence to use the correct restore tool at the right time for restoring VMs, bare metal and individual content such as files and folders Utilize Secure Restore to prevent the restoration of malware Describe how to use Staged Restore to comply with things like General Data Protection Regulation (GDPR) before releasing restores to production Identify, describe and utilize the different explores and instant recovery tools and features Recovery from replica Identify and describe in detail, failover features and the appropriate usage Develop, prepare and test failover plans to ensure recovery Disaster recovery from replica to meet a variety of real-world recovery needs Testing backup and replication Testing backups and replicas to ensure you can recover, what you need, when you need to Configure and setup virtual sandbox environments based on backup, replicas and storage snapshots Veeam Backup Enterprise Manager and Veeam ONE Introduce the concept of monitoring your virtual, physical and cloud environments with Veeam Backup Enterprise Manager and Veeam ONE? Configuration backup Locate, migrate or restore backup configuration Additional course details: Nexus Humans Veeam Availability Suite v11: Configuration and Management (VASv11CM) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Veeam Availability Suite v11: Configuration and Management (VASv11CM) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Veeam Availability Suite v11: Configuration and Management (VASv11CM)
Delivered OnlineFlexible Dates
Price on Enquiry

VASCM-11 Veeam Availability Suite v11: Configuration and Management

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is suitable for anyone responsible for configuring, managing or supporting a Veeam Availability Suite v11 environment. Overview After completing this course, attendees should be able to: Describe Veeam Availability Suite components usage scenarios and relevance to your environment. Effectively manage data availability in on-site, off-site, cloud and hybrid environments. Ensure both Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs) are met. Configure Veeam Availability Suite to ensure data is protected effectively. Adapt with an organization's evolving technical and business data protection needs. Ensure recovery is possible, effective, efficient, secure and compliant with business requirements. Provide visibility of the business data assets, reports and dashboards to monitor performance and risks The Veeam© Availability Suite? v11: Configuration and Management training course is a three-day, technical deep dive focused on teaching IT professionals the skills to configure, manage and support a Veeam Availability Suite v11 solution. With extensive hands-on-labs, the class enables administrators and engineers to effectively manage data in an ever-changing technical and business environment, bringing tangible benefit to businesses in the digital world. This course is based on Veeam Availability Suite v11. Introduction Describe RTOs and RPOs, what they mean for your business, how to manage and monitor performance against them The 3-2-1 Rule and its importance in formulating a successful backup strategy Identify key Veeam Availability Suite components and describe their usage scenarios and deployment types Building backup capabilities Backup methods, the appropriate use cases and impact on underlying file systems Create, modify, optimize and delete backup jobs, including Agents and NAS Backup jobs. Explore different tools and methods to maximize environment performance Ensure efficiency by being able to select appropriate transport modes while being aware of the impact of various backup functions on the infrastructure Building replication capabilities Identify and describe the options available for replication and impacts of using them Create and modify replication jobs, outline considerations to ensure success Introduce the new Continuous Data Protection (CDP) policy Secondary backups Simple vs. advanced backup copy jobs, how to create and modify them using best practices to ensure efficient recovery Discuss using tapes for backups Advanced repository capabilities Ensure repository scalability using a capability such as SOBR on-premises and off-site including integration with cloud storage Ensure compatibility with existing deduplication appliances Introduce the new hardened repository Protecting data in the cloud Review how Veeam can protect the data of a cloud native application Review how Veeam Cloud Connect enables you to take advantage of cloud services built on Veeam Review how Veeam can be used to protect your Office 365 data Restoring from backup Ensure you have the confidence to use the correct restore tool at the right time for restoring VMs, bare metal and individual content such as files and folders Utilize Secure Restore to prevent the restoration of malware Describe how to use Staged Restore to comply with things like General Data Protection Regulation (GDPR) before releasing restores to production Identify, describe and utilize the different explores and instant recovery tools and features Recovery from replica Identify and describe in detail, failover features and the appropriate usage Develop, prepare and test failover plans to ensure recovery Disaster recovery from replica to meet a variety of real-world recovery needs Testing backup and replication Testing backups and replicas to ensure you can recover, what you need, when you need to Configure and setup virtual sandbox environments based on backup, replicas and storage snapshots Veeam Backup Enterprise Manager and Veeam ONE Introduce the concept of monitoring your virtual, physical and cloud environments with Veeam Backup Enterprise Manager and Veeam ONE Configuration backup Locate, migrate or restore backup configuration Additional course details: Nexus Humans VASCM-11 Veeam Availability Suite v11: Configuration and Management training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VASCM-11 Veeam Availability Suite v11: Configuration and Management course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VASCM-11 Veeam Availability Suite v11: Configuration and Management
Delivered OnlineFlexible Dates
Price on Enquiry

VEEAM-VMCE Availability Suite v10.0: Configuration and Management

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is suitable for anyone responsible for configuring, managing or supporting a Veeam Availability Suite v10 environment. Overview After completing this course, attendees should be able to: Describe Veeam Availability Suite components usage scenarios and relevance to their own environment. Effectively manage data availability in on-site, off-site, cloud and hybrid environments. Ensure both Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs) are met. Install and configure Veeam Availability Suite into their environment, ensuring data is protected effectively. Adapt with an organization's evolving technical, business and regulatory needs. Ensure recovery is possible, effective, efficient, secure and compliant with business and legal requirements. Provide visibility of the business data assets, and produce effective reports and dashboards to monitor performance and risks. Conduct basic troubleshooting and analysis of their Veeam Availability Suite environment. This three-day, technical deep dive Veeam© Availability Suite? v10: Configuration and Management training course is focused on teaching IT professionals the skills to configure, manage and support a Veeam Availability Suite v10 solution. With extensive hands-on-labs, the class enables administrators and engineers to effectively manage data in an ever-changing technical and business environment, bringing tangible benefit to businesses in the digital world. Introduction Describe RTOs and RPOs, what they mean for your business, how to manage and monitor performance against them The 3-2-1 Rule and its importance in formulating a successful backup strategy Identify key Veeam Availability Suite components and describe their usage scenarios Building Backup Capabilities Backup methods, the appropriate use cases and impact on underlying file systems Create, modify, optimize and delete backup jobs, including NAS Backup jobs. Explore different tools and methods, such as BitLooker? and Deduplication, to maximize environment performance Global Settings and their usage to prevent production performance bottlenecks, encrypt network traffic data and control network jurisdiction Restoring from Backup Identify and describe the different restore tools and their features. Ensure you have the confidence to use the correct restore tool at the right time Using Secure Restore to prevent the restoration of malware Disaster recovery from backup, respond accordingly to a variety of real-world recovery scenarios Backup Copy Jobs Simple vs Advanced Backup Copy Jobs, how to create and modify them using best practices to ensure efficient recovery Utilizing tape jobs, how to create and modify Replication Identify and describe the options available for replication, the use cases and impacts of using Create, modify and delete replication jobs, outline considerations to ensure success Failover Identify and describe in detail, failover features and the appropriate usage Develop, prepare and test failover plans to ensure recovery Disaster recovery from replica, respond accordingly to a variety of real-world recovery scenarios Advanced Repository Capabilities Ensure efficiency by being able to select appropriate transport modes while being aware of the impact of various backup functions on the infrastructure Ensure scalability by integrating off-site S3 storage Ensure compatibility with existing deduplication appliances Testing Backup and Replication Testing backups and replicas to ensure you can recover, what you need, when you need to Configure Veeam DataLabs? and setup sandbox environments based on backup, replicas and storage snapshots Using Veeam DataLabs Staged Restore to manage and comply with General Data Protection Regulation (GDPR) legislation before releasing restores to production Veeam Backup Enterprise Manager Manage multiple Veeam Backup & Replication? installations from a single web console, maintaining a view of your entire virtual environment, ensuring data protection of ROBO and Enterprise environments. Create user and group roles, delegate workloads whilst maintaining data control Enable encryption password loss protection, helping to restore encrypted data in case of lost or forgotten encryption passwords Veeam ONE Monitor your Virtual, Physical and Cloud environments with Veeam ONE? and assess the different views available Configure Veeam ONE for your specific technical and business requirements, describe the alarm options available and how to customize their usage Set up, use and customize Veeam ONE Reporter, creating the reports and dashboards you require technically and for the business Support Locate, migrate or restore backup configuration Identify and locate appropriate support resources Troubleshooting methodology to identify, isolate and remediate support issues Additional course details: Nexus Humans VEEAM-VMCE Availability Suite v10.0: Configuration and Management training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VEEAM-VMCE Availability Suite v10.0: Configuration and Management course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VEEAM-VMCE Availability Suite v10.0: Configuration and Management
Delivered OnlineFlexible Dates
Price on Enquiry

Veeam Certified Architect v11 (VMCE11-A)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is suitable for anyone responsible for configuring, managing or supporting a Veeam Availability Suite v11 environment. This includes Senior Engineers and Architects responsible for creating architectures for Veeam environments. Overview After completing this course, attendees should be able to: Describe Veeam Availability Suite components usage scenarios and relevance to your environment. Effectively manage data availability in on-site, off-site, cloud and hybrid environments. Ensure both Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs) are met. Configure Veeam Availability Suite to ensure data is protected effectively. Adapt with an organization's evolving technical and business data protection needs. Ensure recovery is possible, effective, efficient, secure and compliant with business requirements. Provide visibility of the business data assets, reports and dashboards to monitor performance and risks. Design and architect a Veeam solution in a real-world environment Describe best practices, review an existing infrastructure and assess business/project requirements Identify relevant infrastructure metrics and perform component (storage, CPU, memory) quantity sizing Provide implementation and testing guidelines in line with designs Innovatively address design challenges and pain points, matching appropriate Veeam Backup & Replication features with requirements Veeam Certified Architect is the highest level of Veeam technical certifications. Engineers who complete both Veeam Availability Suite v11: Configuration and Management and Veeam Backup & Replication V11: Architecture and Design programs (courses + exams) will be granted with the 'Veeam Certified Architect' (VMCA) title by Veeam. Introduction Veeam Availability Suite v11: Configuration and Management Describe RTOs and RPOs, what they mean for your business, how to manage and monitor performance against them The 3-2-1 Rule and its importance in formulating a successful backup strategy Identify key Veeam Availability Suite components and describe their usage scenarios and deployment types Building backup capabilities Backup methods, the appropriate use cases and impact on underlying file systems Create, modify, optimize and delete backup jobs, including Agents and NAS Backup jobs. Explore different tools and methods to maximize environment performance Ensure efficiency by being able to select appropriate transport modes while being aware of the impact of various backup functions on the infrastructure Building replication capabilities Identify and describe the options available for replication and impacts of using them Create and modify replication jobs, outline considerations to ensure success Introduce the new Continuous Data Protection (CDP) policy Secondary backups Simple vs. advanced backup copy jobs, how to create and modify them using best practices to ensure efficient recovery Discuss using tapes for backups Advanced repository capabilities Ensure repository scalability using a capability such as SOBR on-premises and off-site including integration with cloud storage Ensure compatibility with existing deduplication appliances Introduce the new hardened repository Protecting data in the cloud Review how Veeam can protect the data of a cloud native application Review how Veeam Cloud Connect enables you to take advantage of cloud services built on Veeam Review how Veeam can be used to protect your Office 365 data Restoring from backup Ensure you have the confidence to use the correct restore tool at the right time for restoring VMs, bare metal and individual content such as files and folders Utilize Secure Restore to prevent the restoration of malware Describe how to use Staged Restore to comply with things like General Data Protection Regulation (GDPR) before releasing restores to production Identify, describe and utilize the different explores and instant recovery tools and features Recovery from replica Identify and describe in detail, failover features and the appropriate usage Develop, prepare and test failover plans to ensure recovery Disaster recovery from replica to meet a variety of real-world recovery needs Testing backup and replication Testing backups and replicas to ensure you can recover, what you need, when you need to Configure and setup virtual sandbox environments based on backup, replicas and storage snapshots Veeam Backup Enterprise Manager and Veeam ONE Introduce the concept of monitoring your virtual, physical and cloud environments with Veeam Backup Enterprise Manager and Veeam ONE? Configuration backup Locate, migrate or restore backup configuration Introduction Veeam Backup & Replication v11: Architecture and Design Review the architecture principles Explore what a successful architecture looks like Review Veeam?s architecture methodology Discovery Analyze the existing environment Uncover relevant infrastructure metrics Uncover assumptions and risks Identify complexity in the environment Conceptual design Review scenario and data from discovery phase Identify logical groups of objects that will share resources based on requirements Create a set of detailed tables of business and technical requirements, constraints, assumptions and risks Review infrastructure data with each product component in mind Create high level design and data flow Logical design Match critical components and features of VBR with requirements Create logical groupings Determine location of components and relationship to logical grouping Aggregate totals of component resources needed per logical grouping Calculate component (storage, CPU, memory) quantity sizing Physical/tangible design Convert the logical design into a physical design Physical hardware sizing Create a list of physical Veeam backup components Implementation and Governance Review physical design and implantation plan Review Veeam deployment hardening Describe the architect?s obligations to the implementation team Provide guidance on implementation specifics that relate to the design Validation and Iteration Provide framework for how to test the design Further develop the design according to a modification scenario

Veeam Certified Architect v11 (VMCE11-A)
Delivered OnlineFlexible Dates
Price on Enquiry

Lexcel Standard Training Requirements Course

By DG Legal

This training is for lawyers and covers key topics to ensure compliance with the Lexcel standard and other regulations.

Lexcel Standard Training Requirements Course
Delivered Online + more
£225 to £300