About this Course This 5 full-day course presents the most modern statistical and mathematical forecasting frameworks used by practitioners to tackle the load forecasting problem across short time and long time scales. The course presents practical applications to solving forecasting challenges, supported by real life examples from large control areas. It presents the weather impacts on the load forecasts and the methodologies employed to quantify the weather effect and building a repository of weather normal data. A good load forecast methodology must improve its forecasting accuracy and support a consistent load forecasting process. The load forecasting widely used in the power industry has evolved significantly with the advancement and adoption of Artificial Intelligence techniques such as Machine Learning. With the increased penetration of inverter-based resources, the operation of electric grids grew in complexity, leading to load forecasts that are updated more frequently than once a day. Furthermore, several jurisdictions adopted a smaller granularity than the hourly load forecasts in the effort to reduce the forecasting uncertainties. On the generation side, fuel forecasting professionals must meet energy requirements while making allowance for the uncertainty on both the demand and the supply side. This training course will also feature a guest speaker, who is a Ph.D candidate to provide insights into the most modern aspects of Artificial Intelligence in the context of load forecasting. Training Objectives This course offers a comprehensive approach to all aspects of load forecasting: Gain a perspective of load forecasting from both operators in the generating plant and system operators. Understand and review the advanced load forecasting concepts and forecasting methodologies Learn the application of Artificial Neural Networks and Probabilistic Forecasting methods to manage forecasting uncertainties in short time frames Appreciate market segmentation and econometric framework for long term forecasts Find out the most recent practical application of load forecasting as examples from large power companies Get access to recent industry reports and developments Target Audience Energy load forecasting professionals from power plant and system operators Energy planners and energy outlook forecasters and plant operators Fuel procurement professionals Planners and schedulers of thermal generating units Course Level Intermediate Trainer Your expert course instructor is a Utility Executive with extensive global experience in power system operation and planning, energy markets, enterprise risk and regulatory oversight. She consults on energy markets integrating renewable resources from planning to operation. She led complex projects in operations and conducted long term planning studies to support planning and operational reliability standards. Specializing in Smart Grids, Operational flexibilities, Renewable generation, Reliability, Financial Engineering, Energy Markets and Power System Integration, she was recently engaged by the Inter-American Development Bank/MHI in Guyana. She was the Operations Expert in the regulatory assessment in Oman. She is a registered member of the Professional Engineers of Ontario, Canada. She is also a contributing member to the IEEE Standards Association, WG Blockchain P2418.5. With over 25 years with Ontario Power Generation (Revenue $1.2 Billion CAD, I/S 16 GW), she served as Canadian representative in CIGRE, committee member in NSERC (Natural Sciences and Engineering Research Council of Canada), and Senior Member IEEE and Elsevier since the 90ties. Our key expert chaired international conferences, lectured on several continents, published a book on Reliability and Security of Nuclear Power Plants, contributed to IEEE and PMAPS and published in the Ontario Journal for Public Policy, Canada. She delivered seminars organized by the Power Engineering Society, IEEE plus seminars to power companies worldwide, including Oman, Thailand, Saudi Arabia, Malaysia, Indonesia, Portugal, South Africa, Japan, Romania, and Guyana. Our Key expert delivered over 60 specialized seminars to executives and engineers from Canada, Europe, South and North America, Middle East, South East Asia and Japan. Few examples are: Modern Power System in Digital Utilities - The Energy Commission, Malaysia and utilities in the Middle East, GCCIA, June 2020 Assessment of OETC Control Centre, Oman, December 2019 Demand Side management, Load Forecasting in a Smart Grid, Oman, 2019 Renewable Resources in a Smart Grid (Malaysia, Thailand, Indonesia, GCCIA, Saudi Arabia) The Modern Power System: Impact of the Power Electronics on the Power System The Digital Utility, AI and Blockchain Smart Grid and Reliability of Distribution Systems, Cyme, Montreal, Canada Economic Dispatch in the context of an Energy Market (TNB, Sarawak Energy, Malaysia) Energy Markets, Risk Assessment and Financial Management, PES, IEEE: Chicago, San Francisco, New York, Portugal, South Africa, Japan. Provided training at CEO and CRO level. Enterprise Risk methodology, EDP, Portugal Energy Markets: Saudi Electricity Company, Tenaga National Berhad, Malaysia Reliability Centre Maintenance (South East Asia, Saudi Electricity Company, KSA) EUSN, ENERGY & UTILITIES SECTOR NETWORK, Government of Canada, 2016 Connected+, IOT, Toronto, Canada September 2016 and 2015 Smart Grid, Smart Home HomeConnect, Toronto, Canada November 2014 Wind Power: a Cautionary Tale, Ontario Centre for Public Policy, 2010 POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations
The NCSP® 800-53 Practitioner accredited (APMG International), certified (NCSC/GCHQ-UK), and recognized (DHS-CISA-USA) certification course teaches Digital Business, Operational Stakeholders, Auditors, and Risk Practitioners a Fast-Track approach to adopting and adapting the NIST Cybersecurity Framework and its 800-53 controls across an enterprise and its supply chain.The course also teaches candidates how to build a Digital Value Management System (DVMS) CPD overlay model capable of enabling the quick adoption and adaption of new frameworks and models (NIST-CSF, NIST Privacy Framework, CMMC, etc.) that may be required to address internal, external (regulatory), and cyber threat landscape changes. Finally, the course teaches candidates how to ensure the organization's DVMS is designed for use within the organization and auditable by government regulators looking to verify regulatory outcomes. The NCSP Practitioner 800-53 course is designed for both the Implementer and Auditor topics and participants select the exam they want to take (or an additional exam can be ordered to be certified as both an implementer and auditor).
About this Training Course This 5 full-day training course looks at the setup of economic analysis cases, including the estimation of recoverable reserves, production profiles, commodity prices, and project costs - CAPEX, OPEX, taxes, royalties, transportation, depreciation, before-tax (BTAX) cash-flow, after-tax (ATAX) cash-flow and international fiscal regimes (production sharing agreement and concessionary system). The course begins from the basic required parameters of inflation, interest and time value of money. These concepts are then transformed into profitability indicators. Last but not the least, the profitability indicators are then used to make investment decisions. The emphasis of this course is to bridge the gap between theoretical concepts and their practical limitations. The participants will be able to appreciate the amount of information that they never thought of. Another emphasis of this course is also on the use of Excel's financial functions. This understanding is very critical when it comes to building economic cash-flow models. Over the years, we have seen that participants really struggle with using the Excel functions correctly and this leads to mistakes that can be easily avoided. In each session, multiple choice problems are provided to participants to reinforce their understanding of the concepts covered in the course. Many quick or tips not widely known, are also shared with the participants. The concepts covered in this course are not restricted to downstream, upstream or petrochemical projects. These concepts can be used to evaluate any type of investment under consideration. Participants will require access to computers/laptops with Excel to solve problems during the course. Training Objectives Upon completion of this course, participants will be able to fully understand the gas market dynamics and Investment Evaluation. They will be able to: Learn how to reduce exposure and mitigate risks in projects by handling uncertainty Clarify concepts such as time value of money, cash-flow models, capital budgeting, IRR, NPV, income producing investments Maximise the return on investments through good decision-making processes based on the commercial viability of projects Improve their decision process, investment and opportunity analysis Acquire the hands-on experience in building their own economic evaluation models and solving case study-based examples Target Audience The following oil & gas company personnel will benefit from the knowledge shared in this course: Facilities and Planning engineers Project and procurement personnel Oil & gas engineers Geologists Financial Analysts Commercial managers Economists Government officials Business advisors Asset managers E&P managers Product and business development personnel Course Level Basic or Foundation Training Methods Organisational Impact Trainer Your expert course leader is a globally recognised subject matter expert in petroleum/project economics and international gas market analysis. He is a recipient of the 2021 Society of Petroleum Engineers (SPE) International Management Award, an award that recognises individuals who make significant technical and professional contributions to the petroleum engineering profession and to the worldwide oil and gas industry. He has 40 years of diversified experience in petroleum engineering, reservoir engineering, project economics and decision analysis. He had been involved in evaluating multi-billion-dollar oil and gas field development, NGL, LNG, GTL, Aluminum smelter, refinery, petrochemical, power and production sharing projects. He has worked with major oil companies such as Saudi Aramco, ZADCO, Qatar Petroleum and companies in USA. He is a registered professional Engineer in the state of Colorado, USA. He is the author of six books: Petroleum Engineering Handbook for the Practicing Engineer, Vol. I and Vol. II, published by PennWell Books, Tulsa, Oklahoma, USA. Project Economics and Decision Analysis, Vol. I and Vol. II, published by PennWell Books, Tulsa, Oklahoma, USA. These books are used as textbooks in universities worldwide to teach petroleum economics to undergraduates and graduate students. Tip & Tricks in Excel based Financial Modeling, Vol. 1 & 2, published by Business Expert Press, New York, USA. He has also authored several papers in the Oil & Gas Journal, The Log Analyst, World Oil, SPE Journals, and Oil & Gas Financial Journal. He has delivered lectures in more than 25 countries around the globe. He has always received excellent feedback, as an expert presenter, from the participants of his courses. Daily daily_agenda POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations
A UK Chocolate Week Special Online Event A Craft Chocolate Book Club: So Late in the Day Join us for a unique online book club with a delicious twist — a guided discussion of Claire Keegan’s So Late in the Day paired with a tasting of craft chocolate chosen to deepen our experience and understanding of both the book and chocolate. How it Works Book your place (£10 per person) and register for the Zoom meeting. Read the book — at just 47 pages, it’s a quick but powerful read. Prepare your chocolate: Either select your own bars that you feel connect with the book, or purchase a curated sample pack of the chocolates I’ve paired with the story (available at checkout with postage included). Join the event — we’ll begin by discussing the book, then taste and share our chocolate experiences together. The Book Claire Keegan’s So Late in the Day is technically a short story, but it offers so much to reflect on. Set in Dublin, it follows a young man’s thoughts on his intended wedding day. Through Cathal and his French girlfriend Sabine, Keegan explores gender dynamics with sharp insight and emotional depth. There is so much for us to talk about. The Chocolate For this session’s pairings, I’ve sourced the following: Neary Nogs Old Fashioned Neary Nogs Madagascar 65% Charlotte Flower Meadowsweet flowers and plain chocolate (Pump Street Solomon Islands 72%) A mystery bar from Tosier Chocolate, to be revealed closer to the event You’re welcome to use these pairings or bring your own choices — if you do, you’ll have the chance to share your selections and tasting impressions during the discussion. Giving Back We gain so much pleasure from reading — but for some, it is a gift that has never been given to them. Instead, the absence of reading skills is a significant barrier to progress in life, both in opportunities and in relationships. Your £10 ticket fee (after event platform costs) will be donated to the Shannon Trust’s Turning Pages programme, which helps people in prison learn to read and build brighter futures. Learn more here: Shannon Trust. Questions? Feel free to get in touch: Kathryn — cocoaencounters@gmail.com
Definitive Nagios training course description Nagios is an open source application designed to provide system and network monitoring. This hands on course gives a comprehensive coverage of using Nagios to provide monitoring of Linux, Windows and network devices. The course is based on Nagios core but contact us if you would like Nagios XI. What will you learn Install Nagios. Configure Nagios. Monitor Windows, Linux and Cisco (and other network equipment) using Nagios. Configure notifications Definitive Nagios training course details Who will benefit: Technical staff working with Nagios. Prerequisites: None. Duration 2 days Definitive Nagios for engineers Nagios architecture Downloading Nagios, Installing Nagios, Nagios core, plugins, frontends, addons. Nagios XI. Nagios Fusion. Hands on Installing Nagios. Getting started with Nagios Nagios files, nagios.cfg, minimal.cfg. Starting and stopping Nagios. Hands on Controlling Nagios. Using Nagios Nagios web interface. Maps, Hosts, host groups, services, service groups, problems. Reports. Configuration. Hands on Using the web interface. Monitoring Linux systems SSH, NRPE. Hands on Monitoring Linux system health. Monitoring Windows systems Installing NSClient++, Configuring NSClient++, check_nt plugin, monitoring uptime, CPU, memory, disks, services, processes. Hands on Monitoring Windows system health. Monitoring network devices SNMP architecture, MIBs. Polling. Hands on Configuring Nagios for SNMP. Agents Configuring Cisco devices for SNMP support, communities, traps, syslog. Hands on Monitoring network devices. Nagios alerts and notifications SNMP traps. Email notifications, SMS alerts other messaging
EXPERT – MASTERCLASS 8 CPD POINTS 1 DAY INTENSIVE COURSE ONLINE or IN-CLINIC NOTE! After booking we will contact you for scheduling the exact course date! Courses dates are subject to change due to mentors availability. We will inform you via email if a date becomes available! DERMAGRAFT AND ENRICHED NANO-MICROFAT TRANSFER FOR FACE, NECK & HANDS – VOLUMIZATION & REJUVINATION WHAT IS MICROFAT AND NANOFAT GRAFTING FOR FACE AND NECK LIFT? Microfat and enriched nanofat graft transfer (also known as autologous fat transfer or lipoinjection), to the face and the neck is a minimally invasive, short-lasting procedure with rapid recovery, and can be done under local anaesthesia. Following completion of the procedure, the patient can return to the normal daily life activities. But firstly, we need to clearly explain what the terms microfat and nanofat grafts mean…. Microfat is defined a small-diameter fat particle and is used to improve the appearance of wrinkles, grooves and the lack of volume and sagginess of the skin of the face and neck, in response to the aging process. Similarly, nanofat, is referred to as the smallest diameter fat particle. The main advantage of the nanofat is that it contains cells that have the ability to differentiate in any type of body cell. Stem cells – as they are called- play a very important role in the process of rejuvenation, as they can differentiate into cells called fibroblasts which in turn produce collagen thus making the skin firmer and more youthful in appearance. The Course can be divided into two stages: 1. In the first stage, fat cells will be obtained from one or more parts of the body and are then purified and injected into the face and the neck. The doctor will identify an area in your body where the fat will be obtained from. This area is usually the flanks, but fat can also be obtained from other areas such as the abdomen, and the outer and inner thighs. You will be given enough local anaesthesia to numb the area where the fat will be harvested from. Then, a small-diameter cannula called microcannula connected to a special vacuum syringe will be gently introduced under the skin to obtain the fat. During this process, you should not feel any pain, the local anaesthetic will have made you numb. After the fat is harvested, it will contain a mixture of fat cells, blood, water, and local anaesthetic. Therefore, this fat will not be pure. This mixture of fat, blood, water and local anaesthetic will then become filtered into a special filtering and processing device whereby all the blood, water and local anaesthetic are being washed out, so that pure fat remains. This fat is then further processed by passing it through special filters whereby it becomes a smaller-sized fat particle known as microfat and nanofat graft. You need to be medically qualified as a doctor, dentist, nurse, pharmacist or paramedic with full governing body registration and have completed a Foundation Filler Course and to have administered a number of cases. Additional information ATTENDANCE ONLINE (theory), IN-CLINIC (Practice) COURSE LEVEL EXPERT | Masterclass Course
Duration 5 Days 30 CPD hours This course is intended for This course is intended for novice database developers, database administrators, Business Intelligence developers, report creators, and application developers who have an understanding of relational database concepts and have basic Windows navigation skills. Overview Create single table SELECT queries Create multiple table SELECT queries Filter and sort data Insert, update, and delete data Query data using built-in functions Create queries that aggregate data Create subqueries Create queries that use table expressions Use UNION, INTERSECT, and EXCEPT on multiple sets of data Implement window functions in queries Use PIVOT and GROUPING SETS in queries Use stored procedures in queries Add error handling to queries Use transactions in queries This five-day instructor-led course is intended for IT professionals who wish to use the Transact-SQL language to query and configure Microsoft SQL Server. Students are typically database developers and database administrators, but might also be Business Intelligence developers, report creators, or application developers. In this course, students learn how to query single tables, join data from multiple tables, filter and sort data, modify data, use procedures and functions, and implement error handling. Prerequisites Basic understanding of relational databases. Basic Windows knowledge. Module 1: Introduction to Transact-SQL What is Transact-SQL The SELECT statement The WHERE clause Sorting results Calculations CASE expressions Module 2: Joining tables with Transact-SQL The JOIN clause Inner joins Outer joins Self joins and cross joins Module 3: Filtering and sorting results Implement the ORDER BY clause Filter data with the WHERE clause Limit the number of rows returned by a query Implement NULL logic Module 4: SQL Server data types Understand data types Implement string data types Implement temporal data types Module 5: Inserting, updating and deleting data Insert new records Update existing records Delete data Module 6: Using SQL Server functions with Transact-SQL Understand function types in SQL Server Convert data using functions Implement logical functions Work with NULL data using functions Module 7: Aggregating data with Transact-SQL Implement aggregation in SQL Server Group records in SQL Server Filter aggregated data Module 8: Implement subqueries with Transact-SQL Implement scalar and multi-valued sub-queries Implement correlated subqueries Implement existence checks with subqueries Module 9: Create queries that use table expressions Create views Create table-valued functions Implement derived tables Implement common table expressions Module 10: Use UNION, INTERSECT, EXCEPT and APPLY on multiple sets of data Write queries with the UNION operator Write queries with the INTERSECT and EXCEPT operators Write queries with the APPLY operator Module 11: Implement window functions in queries Understand window functions Impement window functions Module 12: Use PIVOT and grouping sets in queries Implement PIVOT in queries Implement grouping sets in queries Module 13: Use stored procedures in queries Query data with stored procedures Interact with stored procedures using input and output parameters Write simple stored procedures Pass dynamic SQL to SQL Server Module 14: Implement programming features in Transact-SQL Understand T-SQL programming elements Implement loops and conditions in T-SQL queries Module 15: Add error handling to queries Understand SQL Server error handling Implemet structured exception handling Module 16: Use transactions in queries Understand database transactions Implement transactions in T-SQL
Duration 5 Days 30 CPD hours This course is intended for Students in this course are interested in Azure development or in passing the Microsoft Azure Developer Associate certification exam. This course teaches developers how to create end-to-end solutions in Microsoft Azure. Students will learn how to implement Azure compute solutions, create Azure Functions, implement and manage web apps, develop solutions utilizing Azure storage, implement authentication and authorization, and secure their solutions by using KeyVault and Managed Identities. Students will also learn how to connect to and consume Azure services and third-party services, and include event- and message-based models in their solutions. The course also covers monitoring, troubleshooting, and optimizing Azure solutions. Prerequisites To be successful in this course, learners should have the following: Hands-on experience with Azure IaaS and PaaS solutions, and the Azure Portal. Experience writing in an Azure supported language at the intermediate level. (C#, JavaScript, Python, or Java) Ability to write code to connect and perform operations on, a SQL or NoSQL database product. (SQL Server, Oracle, MongoDB, Cassandra or similar) Experience writing code to handle authentication, authorization, and other security principles at the intermediate level. A general understanding of HTML, the HTTP protocol and REST API interfaces. 1 - Explore Azure App Service Examine Azure App Service Examine Azure App Service plans Deploy to App Service Explore authentication and authorization in App Service Discover App Service networking features 2 - Configure web app settings Configure application settings Configure general settings Configure path mappings Enable diagnostic logging Configure security certificates 3 - Scale apps in Azure App Service Examine autoscale factors Identify autoscale factors Enable autoscale in App Service Explore autoscale best practices 4 - Explore Azure App Service deployment slots Explore staging environments Examine slot swapping Swap deployment slots Route traffic in App Service 5 - Explore Azure Functions Discover Azure Functions Compare Azure Functions hosting options Scale Azure Functions 6 - Develop Azure Functions Explore Azure Functions development Create triggers and bindings Connect functions to Azure services 7 - Explore Azure Blob storage Explore Azure Blob storage Discover Azure Blob storage resource types Explore Azure Storage security features Discover static website hosting in Azure Storage 8 - Manage the Azure Blob storage lifecycle Explore the Azure Blob storage lifecycle Discover Blob storage lifecycle policies Implement Blob storage lifecycle policies Rehydrate blob data from the archive tier 9 - Work with Azure Blob storage Explore Azure Blob storage client library Create a client object Manage container properties and metadata by using .NET Set and retrieve properties and metadata for blob resources by using REST 10 - Explore Azure Cosmos DB Identify key benefits of Azure Cosmos DB Explore the resource hierarchy Explore consistency levels Choose the right consistency level Explore supported APIs Discover request units 11 - Work with Azure Cosmos DB Explore Microsoft .NET SDK v3 for Azure Cosmos DB Create stored procedures Create triggers and user-defined functions Explore change feed in Azure Cosmos DB 12 - Manage container images in Azure Container Registry Discover the Azure Container Registry Explore storage capabilities Build and manage containers with tasks Explore elements of a Dockerfile 13 - Run container images in Azure Container Instances Explore Azure Container Instances Run containerized tasks with restart policies Set environment variables in container instances Mount an Azure file share in Azure Container Instances 14 - Implement Azure Container Apps Explore Azure Container Apps Explore containers in Azure Container Apps Implement authentication and authorization in Azure Container Apps Manage revisions and secrets in Azure Container Apps Explore Dapr integration with Azure Container Apps 15 - Explore the Microsoft identity platform Explore the Microsoft identity platform Explore service principals Discover permissions and consent Discover conditional access 16 - Implement authentication by using the Microsoft Authentication Library Explore the Microsoft Authentication Library Initialize client applications 17 - Implement shared access signatures Discover shared access signatures Choose when to use shared access signatures Explore stored access policies 18 - Explore Microsoft Graph Discover Microsoft Graph Query Microsoft Graph by using REST Query Microsoft Graph by using SDKs Apply best practices to Microsoft Graph 19 - Implement Azure Key Vault Explore Azure Key Vault Discover Azure Key Vault best practices Authenticate to Azure Key Vault 20 - Implement managed identities Explore managed identities Discover the managed identities authentication flow Configure managed identities Acquire an access token 21 - Implement Azure App Configuration Explore the Azure App Configuration service Create paired keys and values Manage application features Secure app configuration data 22 - Explore API Management Discover the API Management service Explore API gateways Explore API Management policies Create advanced policies Secure APIs by using subscriptions Secure APIs by using certificates 23 - Explore Azure Event Grid Explore Azure Event Grid Discover event schemas Explore event delivery durability Control access to events Receive events by using webhooks Filter events 24 - Explore Azure Event Hubs Discover Azure Event Hubs Explore Event Hubs Capture Scale your processing application Control access to events Perform common operations with the Event Hubs client library 25 - Discover Azure message queues Choose a message queue solution Explore Azure Service Bus Discover Service Bus queues, topics, and subscriptions Explore Service Bus message payloads and serialization Explore Azure Queue Storage Create and manage Azure Queue Storage and messages by using .NET 26 - Monitor app performance Explore Application Insights Discover log-based metrics Instrument an app for monitoring Select an availability test Troubleshoot app performance by using Application Map 27 - Develop for Azure Cache for Redis Explore Azure Cache for Redis Configure Azure Cache for Redis Interact with Azure Cache for Redis by using .NET 28 - Develop for storage on CDNs Explore Azure Content Delivery Networks Control cache behavior on Azure Content Delivery Networks Interact with Azure Content Delivery Networks by using .NET
Duration 5 Days 30 CPD hours This course is intended for This course is intended for Enterprise network staff responsible for help desk support, system administration, and network design. Overview At Course Completion: - Features and functions of Group Policy - Use Group Policy management tools to manage security policies - Design a Group Policy infrastructure - Group Policy processing architecture - Back up, restore, import, and copy Group Policy Objects through the Group Policy - Management Console - Use Windows PowerShell to manage Group Policy - Implement security using Group Policy - Configure the desktop environment with Group Policy - Configure roaming profiles and Folder Redirection - Assign and publish software packages - Implement AppLocker and software restriction policies - Create and deploy Administrative Templates - Configure Group Policy preferences In this course, you will learn how to reduce costs and increase efficiencies in your network. You will discover how to consolidate the administration of an enterprise IT infrastructure with Group Policy, and you will learn to control and manage computer systems and domain users running Windows Server 2016 and Windows clients. Create Group Policies, implement administrative and security templates, and determine best practices when deploying software packages. Walk away with the experience and tools needed to optimize your enterprise systems and networks, implement administrative and security templates, and determine best practices when deploying software packages. 1 - Introduction to Configuration Management Configuration Management Overview Configuration Management Using Group Policy Group Policy Features Introduced with Later Versions of Windows Using Windows PowerShell in the Configuration Management Process 2 - Using Group Policy Management Tools Local and Domain Policies Using Group Policy Management Console Understanding Group Policy Refresh 3 - Designing a Group Policy Infrastructure Design Stages for a Group Policy Infrastructure Planning your Group Policy Design Designing Your Group Policy Solution Deploying Your Group Policy Solution Managing Your Group Policy Solution 4 - Understanding the Architecture of Group Policy Processing Group Policy Components in AD DS Understanding the Group Policy Deployment Order Modifying Group Policy Processing 5 - Troubleshooting and Backing Up GPOs Using Group Policy Troubleshooting Tools Integration of RSoP Functionality Group Policy Logging Options Backing Up, Restoring, Importing, and Copying GPOs Building Migration Tables 6 - Securing Windows Using Group Policy Exploring the Windows Security Architecture Securing User Accounts Exploring Security Policies Windows Firewall with Advanced Security Implementing Domain Security Security Policy Options for Window Client and Windows Server 7 - Implementing Application Security Using Group Policy Managing UAC Settings Defending Against Malware Using AppLocker to Restrict Software Implementing Windows App Security Settings 8 - Configuring the Desktop Environment with Group Policy Exploring Script Types and Controlling Script Execution Defining the Desktop, Start Menu, and Taskbar Settings Defining the Control Panel Settings Defining the Windows Components Settings Configuring the Printer Management and Pruning Settings Defining the Network Settings Discovering the new Group Policy Settings 9 - Implementing User State Virtualization Configuring Folder Redirection Managing Offline Files Implementing User Experience Virtualization OneDrive for Business 10 - Assigning and Publishing Software Packages Using MSI Packages to Distribute Software Using Group Policy as a Software Deployment Method Deploying Software Setting Up Distribution Points Using the Systems Center Configuration Manager to Distribute Software 11 - Configuration Management with Windows PowerShell Introducing Windows PowerShell Using Windows PowerShell Writing PowerShell Scripts Windows PowerShell Library for Group Policy Windows PowerShell-Based Logon Scripts 12 - Implementing PowerShell Desired State Configuration Introducing Group Policy Preferences Comparing Preferences and Policy Settings Options for Applying Preferences Configure Preference Settings 13 - Configuring Group Policy Preferences Introducing Group Policy Preferences Comparing Preferences and Policy Settings Options for Applying Preferences Configuring Preferences Settings Additional course details: Nexus Humans 50255 Managing Windows Environments with Group Policy training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the 50255 Managing Windows Environments with Group Policy course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours This course is intended for Students in this course are interested in designing and implementing DevOps processes or in passing the Microsoft Azure DevOps Solutions certification exam. This course provides the knowledge and skills to design and implement DevOps processes and practices. Students will learn how to plan for DevOps, use source control, scale Git for an enterprise, consolidate artifacts, design a dependency management strategy, manage secrets, implement continuous integration, implement a container build strategy, design a release strategy, set up a release management workflow, implement a deployment pattern, and optimize feedback mechanisms Prerequisites Successful learners will have prior knowledge and understanding of: Cloud computing concepts, including an understanding of PaaS, SaaS, and IaaS implementations. Both Azure administration and Azure development with proven expertise in at least one of these areas. Version control, Agile software development, and core software development principles. It would be helpful to have experience in an organization that delivers software. AZ-104T00 - Microsoft Azure Administrator AZ-204T00: Developing Solutions for Microsoft Azure 1 - Introduction to DevOps What is DevOps? Explore the DevOps journey Identify transformation teams Explore shared goals and define timelines 2 - Choose the right project Explore greenfield and brownfield projects Decide when to use greenfield and brownfield projects Decide when to use systems of record versus systems of engagement Identify groups to minimize initial resistance Identify project metrics and key performance indicators (KPIs) 3 - Describe team structures Explore agile development practices Explore principles of agile development Define organization structure for agile practices Explore ideal DevOps team members Enable in-team and cross-team collaboration Select tools and processes for agile practices 4 - Choose the DevOps tools What is Azure DevOps? What is GitHub? Explore an authorization and access strategy Migrate or integrate existing work management tools Migrate or integrate existing test management tools Design a license management strategy 5 - Plan Agile with GitHub Projects and Azure Boards Link GitHub to Azure Boards Configure GitHub Projects Manage work with GitHub Project boards Customize Project views Collaborate using team discussions Agile Plan and Portfolio Management with Azure Boards 6 - Introduction to source control Explore DevOps foundational practices What is source control? Explore benefits of source control Explore best practices for source control 7 - Describe types of source control systems Understand centralized source control Understand distributed source control Explore Git and Team Foundation Version Control Examine and choose Git Understand objections to using Git Describe working with Git locally 8 - Work with Azure Repos and GitHub Migrate from TFVC to Git Use GIT-TFS Develop online with GitHub Codespaces 9 - Structure your Git Repo Explore monorepo versus multiple repos Implement a change log 10 - Manage Git branches and workflows Explore branch workflow types Explore feature branch workflow Explore Git branch model for continuous delivery Explore GitHub flow Explore fork workflow Version Control with Git in Azure Repos 11 - Collaborate with pull requests in Azure Repos Collaborate with pull requests Examine GitHub mobile for pull request approvals 12 - Identify technical debt Examine code quality Examine complexity and quality metrics Measure and manage technical debt Integrate other code quality tools Plan effective code reviews 13 - Explore Git hooks Implement Git hooks 14 - Plan foster inner source Explore foster inner source Implement the fork workflow Describe inner source with forks 15 - Manage Git repositories Work with large repositories Purge repository data Manage releases with GitHub Repos Automate release notes with GitHub 16 - Explore Azure Pipelines Explore the concept of pipelines in DevOps Describe Azure Pipelines Understand Azure Pipelines key terms 17 - Manage Azure Pipeline agents and pools Choose between Microsoft-hosted versus self-hosted agents Explore job types Explore predefined agent pool Understand typical situations for agent pools Communicate with Azure Pipelines Communicate to deploy to target servers Examine other considerations Describe security of agent pools Configure agent pools and understanding pipeline styles 18 - Describe pipelines and concurrency Understand parallel jobs Estimate parallel jobs Describe Azure Pipelines and open-source projects Explore Azure Pipelines and Visual Designer Describe Azure Pipelines and YAML 19 - Explore continuous integration Learn the four pillars of continuous integration Explore benefits of continuous integration Describe build properties Enable Continuous Integration with Azure Pipelines 20 - Implement a pipeline strategy Configure agent demands Implement multi-agent builds Explore source control types supported by Azure Pipelines 21 - Integrate with Azure Pipelines Describe the anatomy of a pipeline Understand the pipeline structure Detail templates Explore YAML resources Use multiple repositories in your pipeline 22 - Introduction to GitHub Actions What are Actions? Explore Actions flow Understand workflows Describe standard workflow syntax elements Explore events Explore jobs Explore runners Examine release and test an action 23 - Learn continuous integration with GitHub Actions Describe continuous integration with actions Examine environment variables Share artifacts between jobs Examine Workflow badges Describe best practices for creating actions Mark releases with Git tags Create encrypted secrets Use secrets in a workflow Implement GitHub Actions for CI/CD 24 - Design a container build strategy Examine structure of containers Work with Docker containers Understand Dockerfile core concepts Examine multi-stage dockerfiles Examine considerations for multiple stage builds Explore Azure container-related services Deploy Docker containers to Azure App Service web apps 25 - Introduction to continuous delivery Explore traditional IT development cycle What is continuous delivery? Move to continuous delivery Understand releases and deployments Understand release process versus release 26 - Create a release pipeline Describe Azure DevOps release pipeline capabilities Explore release pipelines Explore artifact sources Choose the appropriate artifact source Examine considerations for deployment to stages Explore build and release tasks Explore custom build and release tasks Explore release jobs Configure Pipelines as Code with YAML 27 - Explore release recommendations Understand the delivery cadence and three types of triggers Explore release approvals Explore release gates Use release gates to protect quality Control Deployments using Release Gates 28 - Provision and test environments Provision and configure target environments Configure automated integration and functional test automation Understand Shift-left Set up and run availability tests Explore Azure Load Testing Set up and run functional tests 29 - Manage and modularize tasks and templates Examine task groups Explore variables in release pipelines Understand variable groups 30 - Automate inspection of health Automate inspection of health Explore events and notifications Explore service hooks Configure Azure DevOps notifications Configure GitHub notifications Explore how to measure quality of your release process Examine release notes and documentation Examine considerations for choosing release management tools Explore common release management tools 31 - Introduction to deployment patterns Explore microservices architecture Examine classical deployment patterns Understand modern deployment patterns 32 - Implement blue-green deployment and feature toggles What is blue-green deployment? Explore deployment slots Describe feature toggle maintenance 33 - Implement canary releases and dark launching Explore canary releases Examine Traffic Manager Understand dark launching 34 - Implement A/B testing and progressive exposure deployment What is A/B testing? Explore CI-CD with deployment rings 35 - Integrate with identity management systems Integrate GitHub with single sign-on (SSO) Explore service principals Explore Managed Identity 36 - Manage application configuration data Rethink application configuration data Explore separation of concerns Understand external configuration store patterns Examine Key-value pairs Examine App configuration feature management Integrate Azure Key Vault with Azure Pipelines Manage secrets, tokens and certificates Examine DevOps inner and outer loop Integrate Azure Key Vault with Azure DevOps Enable Dynamic Configuration and Feature Flags 37 - Explore infrastructure as code and configuration management Explore environment deployment Examine environment configuration Understand imperative versus declarative configuration Understand idempotent configuration 38 - Create Azure resources using Azure Resource Manager templates Why use Azure Resource Manager templates? Explore template components Manage dependencies Modularize templates Manage secrets in templates Deployments using Azure Bicep templates 39 - Create Azure resources by using Azure CLI What is Azure CLI? Work with Azure CLI 40 - Explore Azure Automation with DevOps Create automation accounts What is a runbook? Understand automation shared resources Explore runbook gallery Examine webhooks Explore source control integration Explore PowerShell workflows Create a workflow Examine checkpoint and parallel processing 41 - Implement Desired State Configuration (DSC) Understand configuration drift Explore Desired State Configuration (DSC) Explore Azure Automation State configuration (DSC) Examine DSC configuration file Explore hybrid management Implement DSC and Linux Automation on Azure 42 - Implement Bicep What is Bicep? Install Bicep Understand Bicep file structure and syntax 43 - Introduction to Secure DevOps Describe SQL injection attack Understand DevSecOps Explore Secure DevOps Pipeline Explore key validation points Explore continuous security validation Understand threat modeling 44 - Implement open-source software Explore how software is built What is open-source software Explore corporate concerns with open-source software components Explore common open-source licenses Examine license implications and ratings 45 - Software Composition Analysis Inspect and validate code bases for compliance Explore software composition analysis (SCA) Integrate Mend with Azure Pipelines Implement GitHub Dependabot alerts and security updates Integrate software composition analysis checks into pipelines Examine tools for assess package security and license rate Interpret alerts from scanner tools Implement security and compliance in an Azure Pipeline 46 - Static analyzers Explore SonarCloud Explore CodeQL in GitHub Manage technical debt with SonarCloud and Azure DevOps 47 - OWASP and Dynamic Analyzers Plan Implement OWASP Secure Coding Practices Explore OWASP ZAP penetration test Explore OWASP ZAP results and bugs 48 - Security Monitoring and Governance Implement pipeline security Explore Microsoft Defender for Cloud Examine Microsoft Defender for Cloud usage scenarios Explore Azure Policy Understand policies Explore initiatives Explore resource locks Explore Azure Blueprints Understand Microsoft Defender for Identity 49 - Explore package dependencies What is dependency management? Describe elements of a dependency management strategy Identify dependencies Understand source and package componentization Decompose your system Scan your codebase for dependencies 50 - Understand package management Explore packages Understand package feeds Explore package feed managers Explore common public package sources Explore self-hosted and SaaS based package sources Consume packages Publish packages Package management with Azure Artifacts 51 - Migrate consolidating and secure artifacts Identify existing artifact repositories Migrate and integrating artifact repositories Secure access to package feeds Examine roles Examine permissions Examine authentication 52 - Implement a versioning strategy Understand versioning of artifacts Explore semantic versioning Examine release views Promote packages Explore best practices for versioning 53 - Introduction to GitHub Packages Publish packages Install a package Delete and restore a package Explore package access control and visibility 54 - Implement tools to track usage and flow Understand the inner loop Explore Azure Monitor and Log Analytics Examine Kusto Query Language (KQL) Explore Application Insights Implement Application Insights Monitor application performance with Application Insights 55 - Develop monitor and status dashboards Explore Azure Dashboards Examine view designer in Azure Monitor Explore Azure Monitor workbooks Explore Power BI Build your own custom application 56 - Share knowledge within teams Share acquired knowledge within development teams Integrate with Azure Boards Share team knowledge using Azure Project Wiki 57 - Design processes to automate application analytics Explore rapid responses and augmented search Integrate telemetry Examine monitoring tools and technologies 58 - Manage alerts, blameless retrospectives and a just culture Examine when get a notification Explore how to fix it Explore smart detection notifications Improve performance Understand server response time degradation Reduce meaningless and non-actionable alerts Examine blameless retrospective Develop a just culture