Why Choose Revit Basic to Fundamentals Course Course Link In this course you will learn Revit skills for BIM modeling. In-person or live online. Autodesk Revit Architecture training for students to create full 3D architectural project models and set them up in working drawings. Duration: 10hours Method: 1-on-1 method with tailored content and flexible pace, backed by individual support. Schedule: Choose a convenient hour from Mon to Sat between 9 am and 7 pm to create your own schedule. Revit Essentials Training: Learn Revit fundamentals for architecture and structural design, supporting efficient building construction with BIM workflows. Delivery Options: In-class at our center Live online sessions I. Introduction to Revit Overview of Revit and its uses Revit interface and basic tools Navigation and viewport controls Creating and saving projects II. Setting up a Project Creating a new project Setting up project levels and grids Adding site and building information Setting up project units III. Creating Building Elements Creating and modifying walls Adding doors and windows Creating and modifying floors and ceilings Creating roofs and modifying roof shapes Creating stairs and railings IV. Views and Sheets Creating and managing views Creating and managing sheets Adding schedules and tags Creating construction documents V. Annotation and Detailing Adding text and dimensions Creating and modifying detail components Adding symbols and keynote legends Adding annotations to construction documents VI. Conclusion and Next Steps Review of course content Tips for further learning and resources Q&A and feedback Note: The above course outline is just a suggestion, and the course content and duration can be adjusted according to the needs and level of the learners. Detailed Course Outline. 1. Starting a Project Creating a new project and the importance of a template. Understanding project settings and scales Adding levels Adding grids Adding columns 2. Modeling Basics Adding walls Using snaps Wall properties and wall types Using the modified tools Adding doors and windows Using constraints See: Autodesk Seek and Revit City websites 3. Links, Imports, and Groups Working with DWG files Creating topography from a DWG link Understanding CAD inserts Using import tips Creating a group Working with Revit links Managing links 4. Sketch-Based Modeling Components Working with floors Working with roofs Adding openings Working with stairs Working with railings Working with ceilings 5. Complex Walls Creating a custom basic wall type Adding curtain walls Adding curtain grids and mullions 6. Visibility and Graphics Controls Using object styles Working with visibility/graphic overrides Using Hide/Isolate Understanding view range Using the Linework Using cutaway views 7. Rooms Adding rooms Controlling room numbering Understanding room bounding elements 8. Schedules and Tags Understanding tags Adding schedules Modifying schedules Creating a key schedule 9. Annotation and Details Adding text Adding dimensions Adding symbols Adding legend views Creating a detail callout Using detail components Adding filled and masking regions 10. The Basics of Families Understanding familiesUsing reference planes, parameters, and constraints Adding solid geometry Adding void geometry Completing the family 11. Sheets, Plotting, and Publishing Adding sheets Exporting to AutoCAD and JPG
Duration 2 Days 12 CPD hours This course is intended for NetApp Customers, IT Generalists, Academic Alliance Students Overview Explain ONTAP operation system, Use the CLI and OnCommand System Manager to identify storage components, configure storage systems and storage virtual machines for NAS and SAN client access, create FlexVol volumes, qtrees, and LUNs, manage snapshot copies Introduces introductory concepts covered through instructor led discussions and hands-on labs are how to create aggregates, virtual interfaces, snapshots, volumes, qtrees, and storage virtual machines. Getting Started with Data ONTAP List basic storage concepts such as aggregates, RAID groups, volumes, qtrees, and LUNs Describe Data ONTAP features such as Snapshot copies, unified storage, and storage efficiency Describe the similarities and differences between the 7-Mode and clustered Data ONTAP operating systems Use the CLI and GUI for administrative purposes Hardware Basics Describe the NetApp storage system hardware platforms and the types of disks that they support Describe the hardware components of NetApp storage controllers Use OnCommand System Manager or the CLI to identify hardware components in Data ONTAP operating in 7-Mode and the clustered Data ONTAP operating system Creating & Managing Aggregates Describe aggregates and RAID groups Create aggregates in Data ONTAP operating in 7-Mode Create aggregates in the clustered Data ONTAP operating system Manage aggregates Managing NAS Client Access Configure NAS client access in Data ONTAP operating in 7-Mode Configure data storage virtual machines (SVMs*) for NAS client access in clustered Data ONTAP Create FlexVol volumes and qtrees Managing SAN Client Connections Describe SAN protocol implementation in Data ONTAP operating in 7-Mode and the clustered Data ONTAP operating system Use OnCommand System Manager to create iSCSI-attached LUNs Use NetApp SnapDrive for Windows to create and format iSCSI-attached LUNs Access and manage a LUN from a Windows host Managing Volumes Explain the relationship between space guarantees, volumes, and aggregates Define thin provisioning and explain how it is used Define deduplication and describe the benefits that it provides Use OnCommand System Manager to set quotas Managing Snapshot Copies Define the function of Snapshot copies Create and delete a Snapshot copy Create Snapshot policies in the clustered Data ONTAP operating system Restore a volume from a Snapshot copy Create FlexClone volume clones that are backed by Snapshot copies Steps to Certification Recall the steps to NetApp Certification
Duration 4 Days 24 CPD hours This course is intended for This is an intermediate course for individuals responsible for developing and implementing effective storage management techniques. Overview Establish a DFSMS configuration to automatically enforce your installation's storage management policies Convert service level requirements into appropriate parameters for data class, storage class, management class, and storage groups Create and test Automatic Class Selection (ACS) routines Convert volumes and move data to system-managed volumes with DFSMS Data Set Services (DFSMSdss) Specify appropriate management class and storage group parameters for DFSMS Hierarchical Storage Management (DFSMShsm) processing of system-managed data sets Plan to maintain your DFSMS environment using Naviquest Establish procedures to control, manage, and recover the storage management subsystem with ISMF and operator commands Develop a DFSMS implementation plan In this course you will learn how to plan and implement DFSMS and learn how to manage temporary and permanent data sets with an emphasis on disk storage. Course introduction and DFSMS overview Specify the storage administration functions that can be automatically performed by the system Identify the types of data set services that need to be established by negotiating service level agreements Correlate data set service requirements to the SMS configuration components: data class, storage class, management class, storage group, and automatic class selection routines Activating SMS Identify the functions eligible for exploitation with the installation of DFSMS Data Facility Product (DFSMSdfp) and the activation of SMS Create SMS control data sets Code SYS1.PARMLIB operands necessary to bring up SMS Create a minimal configuration Activate a configuration Writing ACS routines Identify the purpose of the ACS routines Develop an understanding of the statements Differentiate between literals and masks Describe the read variables available in the ACS routines Managing temporary data sets Create/alter storage classes and storage groups Identify steps to install and use the starter set Write ACS routines to handle temporary data sets Activate a system to manage temporary data sets Code commands to change volume/group SMS status Issue operator commands to display current status Exploiting DFSMS Describe the purpose of the data class Identify the features that the data class can exploit Create data sets using the space parameter Define Virtual Storage Access Method (VSAM) and volume attributes for data class Identify special data sets and their exploitation through the data class Managing permanent data sets Create/alter data classes, storage classes, management classes, and storage groups Translate current (DFSMShsm) service level agreements to management class parameters Identify alternatives and concerns for standard naming conventions Establish the controls for automatic backup of data sets Establish the controls for automatic volume dump Write ACS routines to manage permanent data Create a configuration that manages permanent data sets Create a new managed data set Identify function of storage class exit provided by Custom-Built Installation Process Offering (CBIPO) and resulting System Management Facility (SMF) records Using Naviquest Create test cases using Naviquest Perform storage administration tasks in batch Create online DFSMS reports Create model commands using Naviquest Use the COPYFILT macro Device preparation and data movement Initialize volumes as system-managed Move data into/out from system-managed control Convert volumes to/from system-managed Move data to utilize new hardware capabilities Controlling DFSMS Code commands to change SMS volume/group status Issue commands to save configurations and use alternate Active Control Data Set (ACDS) Issue command to use alternate Communication Data Set (COMMDS) Issue VARY SMS commands Communicate with the security administrator about storage management requirements Additional considerations Establish a plan for implementing SMS Locate sources of implementation planning checklists Identify the tools available to document the current system Identify multiple site considerations for recovery and exploitation Additional course details: Nexus Humans SS84 IBM DFSMS Implementation training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SS84 IBM DFSMS Implementation course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3.25 Days 19.5 CPD hours This course is intended for This course is intended for IT administrators with a minimum 2-5 years of experiencing working with Microsoft Windows Server, Windows 10, and Office 365 licensing. The course will utilize a pre-provisioned lab environment which includes Microsoft 365 E5 licenses and Enterprise Mobility and Security E5 licenses for each student. Powershell management topics will be discussed where applicable in the respective topics. This course will address Windows devices only enrolled in Intune. Configuring and Licensing Intune Endpoint Manager - quick discussion, portal access Discuss which licenses include Intune Discuss Microsoft Intune device-only subscription Discuss Azure Active Directory basic, P1, P2 licensing Intune setup and overview of capabilities Supported configurations Logging in and using Intune Admin portal via Azure Portal and via Endpoint manager site Configure a domain name (needed to support labs though may be done already for E1B/district) Add users and groups in Azure Portal Configure Azure AD connect and discuss AAD Connect Health Assigning licenses manually, via Powershell, and via AAD groups Set the MDM authority and enable device enrollment Add Apps to Intune - covered in detail in a later topic Configuring device profiles - covered in detail in a later topic Company Portal discussion - covered in detail in a later topic Configure app policies - covered in detail in a later topic Windows device management What is co-management - brief discussion on Endpoint Manager with Configuration Manager Registering, joining, hybrid join to Azure AD Enrollment method capabilities Azure AD joined Azure AD joined with Autopilot (User driven mode) Azure AD joined with Autopilot (Self deploying mode) Autopilot pre-provisioned deployment (formally known as white-glove) Device group tags for profile deployment Troubleshooting Autopilot Policy conflicts Known issues Using Powershell to connect to and manage Intune Software deployment Add apps to Intune Windows Store apps Microsoft Store for Business apps LOB apps - Sideloading Adding Win32 apps Running Powershell Scripts on devices Assigning Apps Monitor Apps Discovered Apps Configure Apps App Configuration Policies Office app policys Custom OMA-URI Policies Troubleshooting Managing devices Windows 10 Feature Updates Update rings to manage updates Mapping drives to SMB shares Discuss OneDrive for Business Manage Enterprise Wireless - Windows Configuration Designer, provisioning packages Implementing Conditional Access - device based, app based Printer management Universal Print Deploying printer settings Remote administration Intune Device Management Inventory Fresh Start Full Scan Remote Lock Restart Sync devices Bulk device actions Teamviewer integration requirements Intune Reporting Accessing Reports Exporting Reports using Graph
Duration 2 Days 12 CPD hours This course is intended for This program is designed for students who have attended successfully the IJOS and JRE courses (prior to April 1, 2017) or the IJOS course (since April 3, 2017) and are working toward JNCIA-JUNOS certification. Overview The objectives for this course follow the requirements for the current JNCIA-JUNOS. At the end of this course, the successful student will be able to: Identify the concepts and functionality of various fundamental elements of networking Identify the concepts, benefits and functionality of the core elements of the Junos OS Identify the concepts, operation and functionality of the Junos user interfaces Identify the main elements for configuring Junos devices Describe how to configure basic components of a Junos device Identify methods of monitoring and maintaining Junos devices Describe monitoring and maintenance procedures for a Junos device Identify basic routing concepts and functionality for Junos devices Describe how to configure and monitor basic routing elements for a Junos device Identify the concepts and functionality of routing policy and firewall filters on Junos devices Describe how to configure and monitor routing policies and firewall filters on a Junos device Apply knowledge of Junos operating system configuration, operations, and functionality to real-world scenarios This two-day course provides students with intermediate switching knowledge and configuration examples using Junos Enhanced Layer 2 Software. Chapter 1: Course Introduction Course Introduction Chapter 2: Layer 2 Switching Ethernet Bridging Basics Terminology and Design Considerations Overview of Enterprise Switching Platforms Enabling and Monitoring Layer 2 Switching Operations Lab 1: Implementing Layer 2 Switching Chapter 3: Virtual Networks Overview of VLANs Configuring and Monitoring VLANs Voice VLAN Native VLAN Routed VLAN Interfaces Lab 2: Implementing Virtual Networks Chapter 4: Routing Instances Routing Instances Overview Configuring and Monitoring Virtual Switches Chapter 5: Spanning Tree Spanning Tree Protocol Rapid Spanning Tree Protocol Configuring and Monitoring STP and RSTP Protection Features: BPDU Protection Protection Features: Loop Protection Protection Features: Root Protection Lab 3: Implementing Spanning Tree Chapter 6: Port Security MAC Limiting Persistent MAC Learning DHCP Snooping Dynamic ARP Inspection (DAI) IP Source Guard Lab 4: Implementing Port Security Chapter 7: Device Security and Firewall Filters Storm Control Firewall Filters Lab 5: Implementing Storm Control and Firewall Filters Chapter 8: Virtual Chassis Overview of Virtual Chassis Configuring and Monitoring a Virtual Chassis Lab 6: Implementing a Virtual Chassis System Chapter 9: High Availability Features Overview of High Availability Networks Link Aggregation Groups Redundant Trunk Groups Graceful Routing Engine Switchover (GRES) Nonstop Active Routing (NSR) Nonstop Bridging (NSB) Lab 7: Implementing High Availability Features
Duration 5 Days 30 CPD hours This course is intended for This course is for IT administrators who will be maintaining and installing software, taking inventory of computers, distributing software updates to computers or remotely managing computers. Overview Upon completion of this course, students will be able to: Discover and import computer and user resources that you want to manage. Deploy the Symantec Management Agent and plug-ins. Gather hardware, software and operating system inventory from managed computers. Maintain a software catalog containing software components. Deliver software to managed computers. Meter software on managed computers. Distribute software updates to managed computers. Remotely manage computers. Analyze gathered data using predefined reports. This hands-on course teaches students the underlying components and concepts of the Symantec Management Platform along with the Symantec Management Console that is used by CMS to perform its management functions. Introduction Course overview The classroom lab environment Understanding the Symantec Client Management Suite Symantec Client Management Suite demonstration Learning about the Symantec Client Management Suite Symantec Management Platform components used by CMS Symantec Management Platform concepts used by CMS How the platform and CMS work The Symantec Management Console Accessing the Symantec Management Console Getting to know the Symantec Management Console Getting to know the enhanced console views Symantec Management Platform Basics Importing computer resources from Active Directory Discover computer resources using Network Discovery Grouping resources Applying CMS policies to resource targets Deploying the Symantec Management Agent Installing the Symantec Management Agent - push method Installing the Symantec Management Agent - pull method Installing solution plug-ins for the Symantec Management Agent Working with the Symantec Management Agent GUI Working with the Symantec Management Agent health settings Gathering Inventory from Managed Computers Introducing Inventory Solution Creating and configuring inventory policies Using inventory tasks Other Inventory Solution capabilities Introducing inventory reports Managing the Software Catalog Preparing the Software Management Framework to support the Software Catalog Populating the Software Catalog with software components Working with software component resources Creating and configuring software products Delivering Software to Managed Computers Choosing a method to deliver software Understanding the software blade of the enhanced console view Managing software deliveries with tasks Installing software using a managed software delivery policy Introducing software management reports Managing Software with Application Metering Understanding Application Metering Tracking software usage on managed computers Metering software with Application Metering policies Application metering reports Managing Organizational Views and Organizational Groups Learning about organizational views and groups Creating custom organizational views and group Managing organizational views and groups Managing Resource Filters and Resource Targets More about resource filters Managing and working with existing filters Creating and modifying filters More about resource targets Working with targets Managing Software Updates on Windows Computers Introducing Patch Management Solution for Windows Preparing your environment for Patch Management Distributing software updates Patch Management Solution reports Managing Virtualized Software Introducing Symantec Workspace Virtualization Installing the Symantec Workspace Virtualization agent Using CMS to deliver virtualized software Remotely Managing Computers Introducing Symantec Remote Access Connector Overview or Real-Time System Manger Remote management reports Managing Policies Getting to know policies Understanding user-based policies Understanding maintenance windows Configuring automation policies Managing shared schedules Managing Jobs and Tasks Overview of task management Creating and scheduling tasks and jobs Overview of Deployment Solution Introducing Deployment Solution Configuring Deployment Solution Creating and managing deployment jobs and tasks Deployment Solution imaging Reporting Introducing reports Using and creating standard reports Configuring and using IT Analytics Solution Site Management Introducing site management Managing sites, subnets and site servers Reviewing site server plug-ins to the Symantec Management Agent Configuring site services Security Learning about security Managing user accounts, security roles, and privileges Managing permissions Additional course details: Nexus Humans Symantec Client Management Suite 7.6 - Administration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Symantec Client Management Suite 7.6 - Administration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Motorsport is as much a business as it is a sport. Our new Master’s Degree programme will provide students with a broad range of modules which examine the national and international aspects of the industry from a commercial perspective. Study an individual module from the MA Business of Motorsport for Continuing Professional Development (CPD).
Duration 4 Days 24 CPD hours This course is intended for This course is designed for network administrators, system administrators, network architects, systems engineers, and technical support engineers who are involved with advanced installation, configuration, maintenance, and basic troubleshooting of Ruckus ICX products. Overview Upon successful completion of this course, the student will be able to: Describe Ruckus ICX hardware Configure and implement management protocols on Ruckus equipment Configure and implement monitoring and reporting features on Ruckus equipment including syslogs and sFlow Perform hardware troubleshooting and support functions Perform firmware upgrades Configure, implement, and maintain Layer 2 STP protocols (RSTP, MSTP, PVST) Configure and manage VLANs, Virtual Ethernet routed interfaces, topology groups, and Q-in-Q Configure, deploy and maintain Link Aggregation Groups (LAGS) Describe, configure, and maintain Multi-Chassis Trunking (MCT) Integrate MCT with VRRPe for redundancy Identify PoE-capable products Configure and manage Ruckus ICX switches in a PoE environment Configure, implement, and maintain the OSPF routing protocol Configure, implement, and maintain QoS This course provides an in-depth study of the Ruckus ICX family of products and how they are utilized in an enterprise network. The course covers core competencies of configuration, operations and maintenance of Ruckus ICX products. This course also covers core L2/L3 protocol configurations including STP family, OSPF, QoS, and Ruckus proprietary protocols and technology including MCT, VRRPe and FDP. This course provides an in-depth study of the Ruckus ICX family of products and how they are utilized in an enterprise network. The course covers core competencies of configuration, operations and maintenance of Ruckus ICX products. This course also covers core L2/L3 protocol configurations including STP family, OSPF, QoS, and Ruckus proprietary protocols and technology including MCT, VRRPe and FDP. Additional course details: Nexus Humans Ruckus ICX 200 Administrator Training Course training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Ruckus ICX 200 Administrator Training Course course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Course Overview Teaching the theory and practise of suicide intervention skills that can be applied in any professional or personal setting, captured in a one-day event accredited by City and Guilds of London. We use only the most experienced suicide prevention trainers to deliver this unique learning experience: for anyone who seeks greater understanding and confidence to intervene with people at risk of suicide. The Suicide First Aid through Understanding Suicide Intervention (SFAUSI) course gives learners the knowledge and tools to understand that suicide is one of the most preventable deaths and some basic skills can help someone with thoughts of suicide stay safe from their thoughts and stay alive. Course Content SFAUSI is comprised of 4 parts, each 90 minutes duration. The programme teaches and practices the skills and knowledge needed to identify someone who may be thinking about suicide and competently intervene to help create suicide- safety as a first aid approach. Part 1 Introduction to: the day; programme; ourselves and suicide prevention Stigma, Survivors of bereavement by suicide and the Hidden Toll Suicide thoughts and suicide behaviour Intention of behaviour Versus Outcome of behaviour Possible Causes of Suicidal thoughts Part 2 Suicide – the Ripple Effect Population-based approach to suicide prevention Partnership working Working with attitudes and values “I’m so glad you told me” - Audio visual Part 3 Meeting the needs of a person who is thinking about suicide Suicide-Safety Guide Step 1 – Recognising suicide and asking about suicide Step 2 – Understanding options Part 4 Step 3 – Safeguarding suicide Suicide-safety and self-care The risk assessment approach Suicide and suicide gestures Future learning Format Taught over 6 hours using tutor facilitated Socratic learning, tutor-led practice session, mini lectures, group work and audio-visual presentations. This is a highly interactive and emotionally engaging learning experience. Pre-training requirement No previous experience or training is necessary. Participants will be asked to self-reflect and empathise with a person having thoughts of suicide. There is no expectation on participants to share personal experiences. Who should attend? Multi-sector managers and practitioners including health, housing, social care, education, criminal justice, call centre operators, private, voluntary and public sector workers and community groups or members. Accreditation Participants can choose to register for the City and Guilds accredited unit of learning for an additional fee of £85 per person. This involves completion of a written assignment.