Duration 2 Days 12 CPD hours This course is intended for Network Video Engineer Voice/UC/Collaboration/Communications Engineer Collaboration Tools Engineer Collaboration Sales/Systems Engineer Overview Install, Configure, and Implement Cisco Emergency Responder (Cisco ER). Configure CUCM for CER Configure Emergency Response Locations (ERLs) Configure Emergency Location Identification Numbers (ELINs) Configure PSAP calls and PSAP CallBack Configure Users and onsite Security Management This is a 2-day hands-on course, where students will Install, Deploy, and Configure Cisco Emergency Responder (Cisco ER) 12.5. Student will also integrate emergency communication system with Cisco Unified Communications Manager. Students will learn how Cisco ER automatically notifies and routes calls to the local public safety answering point (PSAP) operator. Students will configure emergency response locations (ERLs) and emergency location identification numbers (ELINs) in CER to properly route enhanced 911 (E911) calls. You will also examine CER disaster recovery and user management. Cisco Emergency Responder Overview PSAP/ Emergency Calling Overview National Emergency Number Association Legislation and Regulation Service Provider ALI Automatic Number Identification (ANI) Automatic Location Identification (ALI) NENA Emergency Response Location NENA Guidelines for ERLs NENA Emergency Location Identification Number (ELIN) E911 Preparation Cisco Emergency Call Handler Cisco Emergency Responder 11.x Enhancements License Management Emergency Responder Redundancy Clustering CER over the WAN Integration with UC Manager Intrado Architecture CER Wireless Features Overview Installing Cisco Emergency Responder Supported Hardware Platforms CER Virtual Server Requirements Deploy Cisco CER OVF/OVA Installation of CER CER CLI Interface Reset Application Administrator Password Add 2nd CER Server - Subscriber Upgrade VMware Tools on Cisco Emergency Responder Server CER Backup and Restore CER PLM Licensing Unified Communication Manager CER Configuration Cisco Unified Communications Manager Administrator Interfaces Cisco Unified Communications Manager Required Services for CER CUCM SNMP Settings Phone Partition and Calling Search Spaces Partitions for 911 Services CER CUCM Configuration for CTI Route Points and CTI Ports Configure CER Route Patterns for 911 and Security Personal Create Translation Patterns for ELINs Create Emergency Responder Cisco Unified Communications Manager User Location Awareness Overview Configure Wireless Endpoint Tracking Feature on UCM 11.5 Cisco Emergency Responder (CER) Configuration Emergency Responder Interface E.164 Dial Plan Support Cisco Emergency Responder Groups Setup CER Groups CER Telephony Settings for CER Cisco CER License Manager Cisco CER Email Settings Cisco CER - Add Subscriber Onsite Security Alerts for Security Personnel Pager Alert Configuration Configure Emergency Response Location (ERL) Configure Emergency Location Identification Number (ELIN) ERL Migration Tool Configure SNMP Configure Phone Tracking Configure LAN Switch Tracking Configuring IP Subnet-based ERLs Configuring Manual Phone Tracking Emergency Responder User Management Manage Onsite Alerts, ERLs, and ALI Data User and Security Logins CER - Web Alerts CER - ERL Audit Trail Export PS-ALI Records ERL Debug Tool
Duration 1 Days 6 CPD hours This course is intended for This course is intended for people in a variety of roles and fields who have a basic understanding of Microsoft Office and want to incorporate digital note-taking and note collaboration by using OneNote for Windows 10. In addition to creating and modifying OneNote notebooks, this course will introduce you to inserting images and files into notebooks, managing notebooks, and sharing content. Overview In this course, you will develop digital note-taking skills by creating, modifying, and managing OneNote notebooks. You will: Navigate and customize the OneNote for Windows 10 environment. Add and format text, images, tables, and drawing objects in a notebook. Use tags, organize notebooks, and search notebook content. Send and share notebook content. Configure password protection and restore deleted notebook content. In our fast-paced digital world, the need to capture ideas, meeting notes, and to-do items is ever present. Microsoft© OneNote© for Windows© 10 provides a way for you to efficiently create and collect your notes in an electronic notebook. This course will introduce you to using OneNote notebooks to store a wide variety of content in an organized structure, access the content from anywhere, and also share it with others. Getting Started with OneNote Topic A: Navigate the OneNote for Windows 10 Environment Topic B: Customize the OneNote User Interface Adding and Formatting Notebook Content Topic A: Apply Formatting to Notebook Content Topic B: Insert Files Topic C: Insert Tables Topic D: Use Drawing Tools Organizing and Searching Notebooks Topic A: Use Tags Topic B: Organize and Search Notebooks Sending and Sharing OneNote Content Topic A: Share OneNote Content Topic B: Share OneNote Content Using OneDrive Managing Notebook Content Topic A: Configure Password Protection Topic B: Restore Notebook Content
Duration 1 Days 6 CPD hours This course is intended for This course is intended for those responsible for ITAD programs and other IT professionals involved in Asset Management, resource budgeting, finance, software licensing, contract management and strategic planning. Overview Students will learn the best practices in an IT Asset Management Program and align those processes with their organizations' business practices. They will be able to manage overall ITAM programs and demonstrate in-depth knowledge, operational knowledge and competence in asset disposal and process development. The IAITAM Certified IT Asset Disposition (CITAD) course prepares individuals to manage the IT asset disposal process within an organization. Best practices in IT Asset Disposition (ITAD) are broken down from policy management, data security to chain of custody transitioning. Attendees whose job responsibilities include ITAD will take away the knowledge of how to avoid risk of data loss and public exposure that surround a breakdown in ITAD process management. ITAD best practices, financial return, data security global implications and the importance of vendor management are just a few of the topics incorporated in the CITAD course. This course exposes the attendee to numerous concepts for ITAM that are relevant for both direct application and as a means of discussion for those persons who will implement, manage and direct ITAM initiatives for their organizations. This course includes the exam for CITAD certification. Course Outline Disposition Overview Disposition and ITAM Organizational Goals for Disposition ITAM Goals for Disposition Governance of Electronic Disposal Composition of E-Scrap Waste Management Laws Foundation for Disposal Management Policy Topics Relevant to Disposition Asset Standards Benefit Disposal The Role of Automation Data Security Governance Working with Vendors Selecting Vendors Due Diligence The Removal Process Software During Disposition Decision Factors for Retirement The Disposition Processes Financial Management & Measurement Additional course details: Nexus Humans Certified IT Asset Disposal (CITAD) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Certified IT Asset Disposal (CITAD) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This course is recommended for: ? System Administrators ? Patch Administrators ? SA Administrators ? Policy Setters ? IT Managers ? IT or Application Architects ? Data Center Managers ? Application Experts ? Operations Experts ? Deployment Specialists ? Application Deployment Manager Administrators ? QA Team Members and Managers ? Security Administrators ? Other technical personnel who are responsible for data center automation Overview After completing this course, you should be able to: ? Describe the Server Automation (SA) core architecture and key components of SA ? Integrate unmanaged servers into the SA managed environment and discover server information through SA ? Use the Operation System (OS) Provisioning feature of SA to automate the installation of OS onto servers ? Provision virtual servers and manage their server lifecycle through SA ? Create static and dynamic device groups to manage multiple servers as groups ? Manage packages as part of the software management feature in SA ? Use a policy-based management methodology to provision software and manage software updates ? Describe and use Application Deployment Manager (ADM) to manage an application lifecycle using SA ? Use the Application Configuration feature of SA to manage the values in configuration files on managed servers ? Manage patches on various OS platforms using a patch policy or software policy ? Use the Audit and Remediation feature of SA to ensure servers and applications are compliant with defined best practices or corporate policies ? Use the Compliance feature of SA to discover out-of-compliance servers in the managed environment and ensure that they are in compliance with corporate policies ? Use the Global Shell and Global File System (OGFS) features to explore and manage servers in an SA environment ? Create, manage, and execute scripts I SA to manage servers or server groups This five-day course provides the necessary foundation to manage the data center servers and application environment using HP Server Automation (SA) 10. The course covers the key components of SA and their functionality. Course Overview and Introduction to HP Server Automation ? Discuss the IT organization?s preference for automation ? Discuss the main features of HP SA ? Discuss the benefits of using SA ? Describe the distributed architecture of SA Exploring the Architecture and Interfaces ? Define an SA core ? Describe the functionality of each key component of SA ? Describe SA users ? Use the SA client to explore a managed server environment ? Describe the SA core architecture and key components ? Learn how to use the SA interfaces to explore the server environment Agent Functionality and Server Integration ? Differentiate the agent types ? Describe the SA agent functionality ? Specify the requirements for installing an SA agent onto an unmanaged server ? Install an agent onto an unmanaged server using the SA client and manual installation ? Troubleshoot agent installation and communication failures ? Explore the server inventory using the Device Explorer of the SA client ? Describe the Agent Tools feature within SA ? Integrate existing, unmanaged servers into the SA managed environment ? Summarize what server information is collected by the agent ? Explain the server module objects ? Explain agent extensions Provisioning Operating Systems (OS) Using OS Build Plans (OSBPs) ? Describe the Operating System (OS) provisioning feature within SA ? Describe the process of provisioning an OS on a server ? Define and run an OS Build Plan (OSBP) Dynamic Host Configuration Protocol (DHCP) Less or Static IP Provisioning ? Configure and run the Managed Boot Client(s) (MBC) ? Provision Operating Systems (OS) without using Dynamic Host Configuration Protocol (DHCP) (or by using Static IP) Managing Virtualization ? Describe the supported virtualization management features in SA ? Describe the process of provisioning virtual servers for VMware Enterprise Server Xi (VMware ESXi) and Solaris 10 ? Identify the relationship between the hypervisor and its virtual servers ? Manage the lifecycle of VMware Virtual Machines (VMs) ? Manage the lifecycle of Solaris zones ? Integrate with VMware Virtual Center using Virtualization Service (VS) Exploring Device Groups ? Explain device groups and their characteristics ? Describe the different types of device groups supported in SA ? Create static and dynamic device groups using the SA client Exploring Device Groups with Search Results ? Describe the different types of search in the SA client ? Discuss the process to save and retrieve search results ? Create device groups from search results ? Develop sample reports using advanced search Managing Packages ? Describe how to manage packages in SA ? Discuss the supported package types ? Explain how to organize the software library ? Import and export packages into the software repository ? Install and uninstall packages ? Manage Red Hat Package Manager (RPM) packages Software Management ? Describe the use of policy-based software management in SA ? Describe how to manage software policies in SA ? List the software management setup tasks ? Install and uninstall software using software policies ? Manage software updates using software policies Working with Application Deployment Manager (ADM) ? Describe the Application Deployment Manager (ADM) and its functions ? Manage the ADM ? Set permissions for ADM ? Define an application, a target, and a component ? Deploy an application ? Manage an Application Deployment job ? Describe the rollback and undeploy process ? Import and export Application Deployment data from SA Application Configuration Management ? Describe how application configurations are managed in SA ? Describe application configuration components ? Control values using an application configuration inheritance model ? Push application configuration values to servers Managing Patches ? Describe the patch management feature in SA ? View patch information ? Describe UNIX patch management tasks ? Install patches using patch policies on the Windows platform ? Identify Microsoft patch administration tasks ? Manage patches on Red Hat LINUX Working with Audits, Snapshots, and Remediation ? Describe the audit and remediation feature in SA ? Create and run audits ? Configure file audit rules ? Set audit rule exceptions ? View audit results and remediate the differences ? Describe how to use Business Service Automation Essentials (BSAE) Network to run compliance audits Enforcing Compliance ? Define server compliance concepts ? Describe the compliance management feature in SA ? Scan and view the compliance status of servers ? Remediate non-compliant servers Exploring Servers Using the Global Shell and Global File System ? Describe the Global Shell and Opsware Global File System (OGFS) features within SA ? Describe how Global Shell and OGFS features can be used to manage servers within the SA environment ? Describe how to navigate and filter data in the OGFS using the Global Shell ? Use the Remote Shell (ROSH) command to login to a managed server and execute shell scripts on a managed server ? Use the SA remote terminal feature to access and manage servers in the managed environment Scripting with SA ? Describe the script management and execution feature in SA ? Create scripts using the SA client ? Execute ad hoc or saved scripts ? View and download script results ? Describe PowerShell integration with SA ? Explain the Extensible Discovery server module ? Introduce Automation Platform eXtensions (APX) scripting Exploring Reports in SA ? Explain SA reports ? List the reports available in SA ? Generate an SA report ? Explain Business Service Automation (BSA) Essentials basics as a reporting tool OS Provisioning with OS Sequences ? Describe the OS Provisioning feature within SA ? Describe the process of provisioning an OS on a server ? Define and run an OS Sequence
Duration 3 Days 18 CPD hours This course is intended for Students receive comprehensive Microsoft Dynamics exam preparation, becoming familiarized with the Dynamics CRM customization and configuration tools. Aspirants also learn to leverage the platform tools to create custom objects, automate tasks, modify user interface, and perform other such customizations. Overview Configure the Dynamics CRM settingsConfigure different entities and fieldsImplement entity relationships, custom actions, workflows, and dialogsIdentify scenarios for utilizing multiple forms, and design considerations for chartsSet default share views and public views, and configure and manage dashboardsIdentify role-based business processesIdentify and manage business requirements and teams This course explains everything you need to know about customizing and configuring the Dynamics CRM 365 system in accordance with a company?s specific requirements. Introduction to Customization and Configuring Dynamics CRM Talent and Course Introduction Module Overview CRM Overview What is Dynamics Customization and Configuration? CRM Architecture Customization Methodology Module review Obtaining a Dynamics CRM Trial TEST YOUR KNOWLEDGE MODULE 1' Manage Microsoft Dynamics CRM Online Subscriptions Module Overview Configuring CRM Overview of CRM Security User Administration Mailboxes Teams CRM Security Model Module Overview Purpose of the CCRM Security Model Privileges Access Levels Security Roles Hierarchy Security Hierarchy Types Module review Introduction to Solutions Module Overview Solutions Overview Solution Detail Creating and Working with Solutions Working with Solution Assets Exporting Solutions Importing Solutions Module review Entity and Field Customization Module Overview Types Entities Entity Ownership Entity Properties System vs Custom Entities Custom Entities and Security Roles Overview of Fields Field Properties Module review Additional Field Customization Module Overview Creating Fields to Meet Client Needs Calculated Fields Rollup Fields CRM Option Sets Alternate Keys Field Level Security State and Status Reason Transitions Module Review Configure mobile devices Module Overview Types of Relationships How and where they are created Many to Many Relationships Hierarchical Data Entity Mapping Connection and Connection Roles Module Review Customizing Forms Module Overview Form types Qualities of a good form Building a Form Specialized Form Components Access Teams and Sub Grids Working with Navigation Additional Form Types Multiple Forms Form customizations and Mobile Clients Module Review Business Rules Module Overview Business Rules Business Rule Scope Trigger Rules Condition and Actions Else Conditions and Actions Occur When Conditions Are True Module review Views and Visualizations Module Overview Using Views View Customization System View Types Quick Find Customization Charts Customizing Dashboard Themes Module Review Introduction to Processes Module Overview Processes and Automation Workflow Basics Module review Business Process Flows What are CRM Business Process Flows Enabling Business Process Flows Steps Stages and Categories Conditional Branching Module Review Bringing it all Together Module Overview Review of Customization Topics Covered Senario Packaging in a Solution Module review
Duration 5 Days 30 CPD hours This course is intended for Network and security architects and consultants who design the enterprise and data center networks and NSX environments Overview By the end of the course, you should be able to meet the following objectives: Describe and apply a design framework Apply a design process for gathering requirements, constraints, assumptions, and risks Design a VMware vSphere virtual data center to support NSX requirements Create a VMware NSX Manager⢠cluster design Create a VMware NSX Edge⢠cluster design to support traffic and service requirements in NSX Design logical switching and routing Recognize NSX security best practices Design logical network services Design a physical network to support network virtualization in a software-defined data center Create a design to support the NSX infrastructure across multiple sites Describe the factors that drive performance in NSX This five-day course provides comprehensive training on considerations and practices to design a VMware NSX© environment as part of a software-defined data center strategy. This course prepares the student with the skills to lead the design of an NSX environment, including design principles, processes, and frameworks. The student gains a deeper understanding of the NSX architecture and how it can be used to create solutions to address the customer?s business needs. Course Introduction Introduction and course logistics Course objectives NSX Design Concepts Identify design terms Describe framework and project methodology Describe the role of VMware Cloud Foundation? in NSX design Identify customers? requirements, assumptions, constraints, and risks Explain the conceptual design Explain the logical design Explain the physical design NSX Architecture and Components Recognize the main elements in the NSX architecture Describe the NSX management cluster and the management plane Identify the functions and components of management, control, and data planes Describe the NSX Manager sizing options Recognize the justification and implication of NSX Manager cluster design decisions Identify the NSX management cluster design options NSX Edge Design Explain the leading practices for edge design Describe the NSX Edge VM reference designs Describe the bare-metal NSX Edge reference designs Explain the leading practices for edge cluster design Explain the effect of stateful services placement Explain the growth patterns for edge clusters Identify design considerations when using L2 bridging services NSX Logical Switching Design Describe concepts and terminology in logical switching Identify segment and transport zone design considerations Identify virtual switch design considerations Identify uplink profile and transport node profile design considerations Identify Geneve tunneling design considerations Identify BUM replication mode design considerations NSX Logical Routing Design Explain the function and features of logical routing Describe the NSX single-tier and multitier routing architectures Identify guidelines when selecting a routing topology Describe the BGP and OSPF routing protocol configuration options Explain gateway high availability modes of operation and failure detection mechanisms Identify how multitier architectures provide control over stateful service location Identify EVPN requirements and design considerations Identify VRF Lite requirements and considerations Identify the typical NSX scalable architectures NSX Security Design Identify different security features available in NSX Describe the advantages of an NSX Distributed Firewall Describe the use of NSX Gateway Firewall as a perimeter firewall and as an intertenant firewall Determine a security policy methodology Recognize the NSX security best practices NSX Network Services Identify the stateful services available in different edge cluster high availability modes Describe failover detection mechanisms Compare NSX NAT solutions Explain how to select DHCP and DNS services Compare policy-based and route-based IPSec VPN Describe an L2 VPN topology that can be used to interconnect data centers Explain the design considerations for integrating VMware NSX© Advanced Load Balancer? with NSX Physical Infrastructure Design Identify the components of a switch fabric design Assess Layer 2 and Layer 3 switch fabric design implications Review guidelines when designing top-of-rack switches Review options for connecting transport hosts to the switch fabric Describe typical designs for VMware ESXi? compute hypervisors with two pNICs Describe typical designs for ESXi compute hypervisors with four or more pNICs Differentiate dedicated and collapsed cluster approaches to SDDC design NSX Multilocation Design Explain scale considerations in an NSX multisite design Describe the main components of the NSX Federation architecture Describe the stretched networking capability in Federation Describe stretched security use cases in Federation Compare the Federation disaster recovery designs NSX Optimization and DPU-Based Acceleration Describe Geneve Offload Describe the benefits of Receive Side Scaling and Geneve Rx Filters Explain the benefits of SSL Offload Describe the effect of Multi-TEP, MTU size, and NIC speed on throughput Explain the available enhanced datapath modes and use cases List the key performance factors for compute nodes and NSX Edge nodes Describe DPU-Based Acceleration Define the NSX features supported by DPUs Describe the hardware and networking configurations supported with DPUs
Duration 3 Days 18 CPD hours This course is intended for The primary audience for this course is as follows: System administrators Technical solutions architects Systems integrators Channel partners Value-added resellers Customer sales engineers DevOps engineers Sales engineers Systems engineers Technical solutions architects Overview Upon completing this course, the learner will be able to meet these overall objectives: Understand Cisco UCS Management in Cisco Intersight Describe the Cisco UCS Platform including Cisco X-Series Understand Cisco Intersight Workload Optimizer Explain Kubernetes Orchestration with Cisco Intersight Kubernetes Service (IKS) and Cisco UCS Perform Automation Using Cisco Intersight Create Intersight Elements Using Terraform Manage Intersight Using the API Cisco Intersight Overview (DCISO) is a 3-day instructor led course that builds your experience with the administration of Cisco Unified Computing System (UCS) X-Series servers, including using Cisco Intersight for UCS management. This course covers architecture, configuration, and operation of Cisco Intersight©, and is designed to serve the needs of engineers seeking to understand the capabilities of Cisco Intersight for managing data centers from a single management platform.This course will help you:Use SaaS or on-prem version of Cisco Intersight to enable IT organizations to analyze, simplify, and automate their environments in more advanced ways than the prior generations of toolsGain hands-on experience using Cisco IntersightUnderstand the X-Series, B-Series, and C-Series product line similarities and differencesDescribe Cisco Intersight and how it can be used to manage UCS and Cisco Hyperflex©Understand the process for upgrading firmware with Cisco IntersightAdministering server profiles, pools, and policies with Cisco IntersightDescribe how to get started with Cisco Intersight programmability Course Outline Describing Cisco UCS Management in Cisco Intersight Describing the Cisco UCS Platform Describing Cisco Intersight Workloads Describing Automation Options Using Cisco Intersight Additional course details: Nexus Humans Cisco Intersight Overview (DCISO) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Intersight Overview (DCISO) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This course is intended for anyone who is new to software development and wants, or needs, to gain an understanding of the fundamentals of coding and basics of C++ and object-oriented programming concepts. This course is for Non-Developers, or anyone who wants to have a basic understanding of and learn how to code C++ applications and syntax Overview Companies are constantly challenged to keep their applications, development projects, products, services (and programmers!) up to speed with the latest industry tools, skills, technologies and practices to stay ahead in the ever-shifting markets that make up today's fiercely competitive business landscape. The need for application, web and mobile developers and coders is seemingly endless as technologies regularly change and grow to meet the modern needs of demanding industries and clients. C++ and Programming Basics for Non-Programmers is a five-day, basic-level training course geared for IT candidates who have little or no prior experience in computer programming. Throughout this gentle introduction to programming and C++, students will learn to create applications and libraries using C++ using best practices and sound OO development techniques for writing object-oriented programs in C++. Special emphasis is placed on object-oriented concepts and best practices throughout the training. Fundamentals of the Program Development Cycle Computer Architecture The Notion of Algorithms Source Code vs. Machine Code Compile-Time vs. Run-Time Software Program Architecture Standalone Client/Server Distributed Web-Enabled IDE (Interactive Development Environment) Concepts Looping Constructs Counter-Controlled Repetition Sentinel-Controlled Repetition Nested Control Constructs break and continue Statements Structured Programming Best Practices Writing Methods (Functions) Static vs. Dynamic Allocation Declaring Methods Declaring Methods with Multiple Parameters Method-Call Stack Scope of Declarations Argument Promotion and Casting Designing Methods for Reusability Method Overloading Arrays Purpose of Arrays Declaring and Instantiating Arrays Passing Arrays to Methods Multidimensional Arrays Variable-Length Argument Lists Using Command-Line Arguments Using Environment Variables Deeper Into Classes and Objects Controlling Access to Class Members Referencing the Current Object Using this Overloading Constructors Default and No-Argument Constructors Composition of Classes Garbage Collection and Destructors The finalize Method Static Class Members Defining Classes Using Inheritance Application Development Fundamentals Structure of a C++ Program Memory Concepts Fundamental Data Type Declarations Fundamental I/O Concepts Fundamental Operators Arithmetic Operators Logical Operators Precedence and Associativity Building and Deploying a C++ Program Superclasses and Subclasses Advantages of Using Inheritance protected Class Members Constructors in Subclasses Increasing Convenience by Using Polymorphism Purpose of Polymorphic Behavior The Concept of a Signature Abstract Classes and Methods final Methods and Classes Purpose of Interfaces Using and Creating Interfaces Common Interfaces of the C++ API Files and Streams Concept of a Stream Class File Sequential Access Object Serialization to/from Sequential Access Files Fundamental Searching and Sorting Introduction to Searching Algorithms Linear Search Binary Search Introduction to Sorting Algorithms Selection Sort Insertion Sort Merge Sort Fundamental Data Structures Dynamic Memory Allocation Linked Lists Stacks Queues Trees Exception Handling Types of Exceptions Exception Handling Overview Introduction to Classes and Objects Classes, Objects and Methods Object Instances Declaring and Instantiating a C++ Object Declaring Methods set and get Methods Initiating Objects with Constructors Primitive Types vs. Reference Types Flow Control Conditional Constructs Exception Class Hierarchy Extending Exception Classes When to Throw or Assert Exceptions Formatted Output printf Syntax Conversion Characters Specifying Field Width and Precision Using Flags to Alter Appearance Printing Literals and Escape Sequences Formatting Output with Class Formatter Strings, Characters and Regular Expressions Fundamentals of Characters and Strings String Class String Operations StringBuilder Class Character Class StringTokenizer Class Regular Expressions Regular Expression Syntax Pattern Class Matcher Class Fundamental GUI Programming Concepts Overview of Swing Components Displaying Text and Graphics in a Window Event Handling with Nested Classes GUI Event Types and Listener Interfaces Mouse Event Handling Layout Managers Additional course details: Nexus Humans C Plus Plus and Programming Basics for Non-Programmers (TTCP2000) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the C Plus Plus and Programming Basics for Non-Programmers (TTCP2000) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2.5 Days 15 CPD hours
Duration 1 Days 6 CPD hours This course is intended for This course is intended for individuals who want to improve their phone skills. Overview Upon successful completion of this course, students will be more confident in handling the phone, resulting in new customers while retaining current clientele. In this course, students will learn about different types of calls and the etiquette associated with them. Getting Started Housekeeping Items Pre-Assignment Review Workshop Objectives The Parking Lot Action Plan Aspects of Phone Etiquette Phrasing Tone of Voice Speaking Clearly Listen to the Caller Case Study Using Proper Phone Language Please and Thank You Do Not Use Slang Avoid Using the Term ?You? Emphasize What You Can Do, Not What You Can?t Case Study Eliminate Phone Distractions Avoid Eating or Drinking Minimize Multi-Tasking Remove Office Distractions Do Not Let Others Interrupt Case Study Inbound Calls Avoid Long Greeting Messages Introduce Yourself Focus on Their Needs Be Patient Case Study Outbound Calls Be Prepared Identify Yourself and Your Company Give Them the Reason for the Call Keep Caller Information Private Case Study Handling Rude or Angry Callers Stay Calm Listen to the Needs Never Interrupt Identify What You Can Do For Them Handling Interoffice Calls Transferring Calls Placing Callers on Hold Taking Messages End the Conversation Case Study Handling Voicemail Messages Ensure the Voice Mail Has a Proper Greeting Answer Important Messages Right Away Ensure Messages are Delivered to the Right Person When Leaving A Message for Others... Case Study Methods of Training Employees Group Training One-on-One Training Peer Training Job Shadowing Case Study Correcting Poor Telephone Etiquette Screening Calls Employee Evaluations Peer Monitoring Customer Surveys Case Study Wrapping Up Words From The Wise Review Of The Parking Lot Lessons Learned Recommended Reading Completion Of Action Plans And Evaluations