• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

29 Educators providing Courses delivered Live Online

Courses matching "recycle"

Show all 16

PC fundamentals

5.0(3)

By Systems & Network Training

PC fundamentals training course description A basic introductory course for those who have never worked with PCs before. The principle target audience is for those who will become PC support people. What will you learn Cable PCs. Perform preventive maintenance on PCs Run Windows and start applications. Use Microsoft Office applications. Customise Windows. PC fundamentals training course details Who will benefit: Anyone new to PCs. Prerequisites: None. Duration 3 days PC fundamentals training course contents PC hardware Overview of components inside a PC, cabling up a PC, preventive maintenance, cleaning mice, hardware screen controls, booting a PC. Windows overview Versions of Windows, Starting Windows, logging on, shutting down. Using Windows The desktop, the start menu and submenus, getting help, shutting down Windows, switching between applications, sizing and controlling windows, special keys on the keyboard. Accessing files and folders Folders and files, Windows explorer, IE, creating, viewing and manipulating folders, creating, viewing and manipulating files, permissions, bits and bytes, the recycle bin, undeleting and undoing, formatting floppy disks, using floppy disks DOS Accessing DOS, basic DOS commands, drives. Microsoft Office Word documents, Excel spreadsheets, emails, browsing the Internet, printing files, managing print queues. Printing Overview, printing, properties Customisation Customising the task bar, customising the start menu. The control panel, mouse and display properties, Desktop settings, setting the date and time. Networking overview Workgroups and domains, Accessing file and print resources

PC fundamentals
Delivered in Internationally or OnlineFlexible Dates
£1,697

Environmental PPA Cover & eco-clubs

5.0(5)

By Ppa Cover/Clubs/Gcses - Gramacri Ltd

Gramacri deliver outstanding environmental learning cover and clubs for primary schools. Our programme aims to rally and unite young people to make realistic but dynamic change, creating positive impacts for our planet now. All of our sessions are challenging and inspiring, leading the children we teach into a lifelong appreciation of the importance of environment preservation. Our programme not only provides peace of mind that the children are in the safest hands but also comes complete with planning and assessment. Just one less thing for your staff to worry about. In our eco-club children will: learn what to recycle and how; use recycled materials; paint, draw, colour, cut and glue; watch documentaries and tutorials; start and maintain student action campaigns; learn about habitat restoration; engage with green labs; engage with garden activities; connect with nature; clean up trash from local parks or schools yard; monitor recycling bins; learn the art of glass painting.

Environmental PPA Cover & eco-clubs
Delivered OnlineFlexible Dates
£90

55215 SharePoint Online Power User

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is intended for both novice and experienced SharePoint users who wish to make full use of SharePoint Online. Overview #NAME? This course delivers the complete site owner story from start to finish in an engaging and practical way to ensure you have the confidence to plan and create new sites or manage your existing sites in SharePoint Online. Your goal is to learn how to make SharePoint online relevant to your team by using a sites functionality to help you share information and collaborate with your colleagues. During the class, you will also learn best practices and ?what not to do? as you watch live, interactive demonstrations and put theory into practice with hands on exercises in SharePoint Online. 1 - An Introduction to SharePoint Online Introducing Office 365 and SharePoint Getting started with Office 365 The cloud revolution Login to Office 365 What is Office 365 Using the app launcher What is SharePoint Office 365 settings Introducing Office 365 Groups Delve Ownership and Access OneDrive 2 - Creating Sites Planning your sites Create new subsites The Office 365 tenant Site templates Web addresses Apply a them Site collections Building your navigation Create a new site Delete subsites Team site navigation User interface: classic vs modern Site contents: classic vs modern Where does classic come from? 3 - Creating and Managing Web Pages The types of pages found in SharePoint Classic SharePoint pages Modern SharePoint pages How to use classic team site pages Create news and site pages Review features of publishing sites Web parts Save, publish, share and delete pages Communication sites 4 - Working with Apps An introduction to apps Co-authoring Marketplace apps Check In ? Out Adding apps to a site Edit and view file properties Create and manage columns Quick edit view Public and personal views File commands Managing app settings Copy link and Share Content approval Folders Major and minor versioning The recycle bin Document sets Alerts Working with files in a library OneDrive sync Create, Upload and edit files Working with classic lists 5 - Building processes with Flow and PowerApps What are business processes? Design and publish a Flow Classic tools for designing processes Getting started with PowerApps in SharePoint Design and test a classic workflow Enhance data capture with PowerApps Getting started with Flow in SharePoint Test a Flow and PowerApps enriched list 6 - Customizing Security Office 365 Group access Share a file Updating Office 365 Group Security Remove a user Managing access to SharePoint Customizing SharePoint security New sites private vs public Create permission levels and groups Setup access requests Security inheritance Share a site Security best practices 7 - Working with Search Delve Search tips An introduction to SharePoint search Accessing classic search Search in folders, libraries and sites Promoted results Search results 8 - Enterprise Content Management Managed metadata service Information management policies An introduction to content types The records center Create and manage content type In-place records management Deploy content types The content organizer Using content types in apps Durable links The content type hub

55215 SharePoint Online Power User
Delivered OnlineFlexible Dates
£2,380

Certified Data Centre Environmental Sustainability Specialist (CDESS)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course is any IT, facilities or data centre professional who works in and around the data centre and has the responsibility to achieve and improve efficiency and environmental sustainability, whilst maintaining the availability and manageability of the data centre. Overview After completion of the course the participant will be able to: Understand the impact of data centres on the environment Describe the various environmental/energy management standards Understand the purpose and goals of the legally binding international treaties on climate change Implement various sustainable performance metrics and how to use them in the data centre environment Manage data centre environmental sustainability using international standards Set up the measurement, monitoring and reporting of energy usage Use power efficiency indicators in a variety of data centre designs Use best practices for energy savings in the electrical infrastructure and in the mechanical (cooling) infrastructure Use best practices for energy savings for the ICT equipment and data storage Understand the importance of water management and waste management Understand the different ways to use sustainable energy in the data centre Get practical tips and innovative ideas to make a data centre more sustainable The CDESS© course is aimed at providing knowledge of the standards and guidelines related to environmental sustainability, and how to move your data centre (existing or new) to a more environmentally sustainable design and operations. Impact of Data Centres on the Environment Predictions in 2010 Current situation Outlook and commitments What is Environmental Sustainability The importance of sustainability Senior management commitment Environmental sustainability framework Sustainability policies Performance standards and metrics Information policies Transparency Awareness Service charging models Environmental Management Environmental sustainability framework (ISO 14001) Standards and guidelines ? ISO 50001 / ISO 30134 Measurement and categories Baselining Trend analysis Reporting Power Effiðciency Indicators Various eðfficiency indicators Power Usage Effectiveness (PUE) PUE measurement levels Factors affecting PUE Measurement points and intervals PUE in mixed source environments Measuring PUE in a mixed-use building PUE reporting Impact of PUE after optimising IT load Electrical Energy Savings (Electrical) Identifying the starting point for saving energy Sizing of power DC power Generators UPS systems Power Factor (PF) Energy savings on lighting Electrical Energy Savings (Mechanical) Energy savings on the cooling infrastructure Temperature and humidity setpoints Various energy eðcient cooling technologies Energy savings on the airflow Liquid cooling Energy reusage PUE, ERE/ERF and Control Volume Electrical Energy Savings (ICT) Procurement IT equipment energy eðfficiency ITEEsv, SMPE, SMPO IT equipment utilisation Server virtualisation Open compute project Electrical Energy Savings (Data Storage) Data management Data storage management Data storage equipment effiðciency Water Management Water Usage Effectiveness (WUE) Improving WUE Water usage at the power generation source Energy Water Intensity Factor (EWIF) Waste Management Waste management policies Life-cycle assessment (Cradle to the grave) 3 R?s for waste management Reduce Reuse Second-hand market Recycle Sustainable Energy Usage Sustainable energy sources Power purchase agreements Energy attribute certificates Renewable Energy Factor (REF) Matching renewable energy supply and demand Sustainable energy storage Carbon trading Automated Environmental Management Systems Use of AI and machine learning Load migration Data Centre Infrastructure Management (DCIM) solutions

Certified Data Centre Environmental Sustainability Specialist (CDESS)
Delivered OnlineFlexible Dates
£1,500

EC-Council Computer Hacking Forensic Investigator (CHFI) v10.0

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The CHFI course will benefit: Police and other laws enforcement personnel Defense and Military personnel e-Business Security professionals Systems administrators Legal professionals Banking, Insurance and other professionals Government agencies Overview At the end of this course, you will possess the skills needed to: Understand the fundamentals of computer forensics Understand the computer forensic investigation process Describe in detail different types of hard disks and file systems Understand data acquisition and duplication Counteract anti-forensic techniques Leverage forensic skills in Windows, Linux, and Mac Investigate web attacks Understand dark web forensics Deploy forensic techniques for databases, cloud, and networks Investigate email crimes including malware Perform forensics in mobile and IoT environments Every crime leaves a digital footprint, and you need the skills to track those footprints. In this course, students will learn to unravel these pieces of evidence, decode them and report them. From decoding a hack to taking legal action against the perpetrators, they will become an active respondent in times of cyber-breaches. Computer Forensics in Today?s World 1.1. Understand the Fundamentals of Computer Forensics 1.2. Understand Cybercrimes and their Investigation Procedures 1.3. Understand Digital Evidence 1.4. Understand Forensic Readiness, Incident Response and the Role of SOC (Security Operations Center) in Computer Forensics 1.5. Identify the Roles and Responsibilities of a Forensic Investigator 1.6. Understand the Challenges Faced in Investigating Cybercrimes 1.7. Understand Legal Compliance in Computer Forensics Computer Forensics Investigation Process 2.1. Understand the Forensic Investigation Process and its Importance 2.2. Understand the Pre-investigation Phase 2.3. Understand First Response 2.4. Understand the Investigation Phase 2.5. Understand the Post-investigation Phase Understanding Hard Disks and File Systems 3.1. Describe Different Types of Disk Drives and their Characteristics 3.2. Explain the Logical Structure of a Disk 3.3. Understand Booting Process of Windows, Linux and Mac Operating Systems 3.4. Understand Various File Systems of Windows, Linux and Mac Operating Systems 3.5. Examine File System Using Autopsy and The Sleuth Kit Tools 3.6 Understand Storage Systems 3.7. Understand Encoding Standards and Hex Editors 3.8. Analyze Popular File Formats Using Hex Editor Data Acquisition and Duplication 4.1. Understand Data Acquisition Fundamentals 4.2. Understand Data Acquisition Methodology 4.3. Prepare an Image File for Examination Defeating Anti-forensics Techniques 5.1. Understand Anti-forensics Techniques 5.2. Discuss Data Deletion and Recycle Bin Forensics 5.3. Illustrate File Carving Techniques and Ways to Recover Evidence from Deleted Partitions 5.4. Explore Password Cracking/Bypassing Techniques 5.5. Detect Steganography, Hidden Data in File System Structures, Trail Obfuscation, and File Extension Mismatch 5.6. Understand Techniques of Artifact Wiping, Overwritten Data/Metadata Detection, and Encryption 5.7. Detect Program Packers and Footprint Minimizing Techniques 5.8. Understand Anti-forensics Countermeasures Windows Forensics 6.1. Collect Volatile and Non-volatile Information 6.2. Perform Windows Memory and Registry Analysis 6.3. Examine the Cache, Cookie and History Recorded in Web Browsers 6.4. Examine Windows Files and Metadata 6.5. Understand ShellBags, LNK Files, and Jump Lists 6.6. Understand Text-based Logs and Windows Event Logs Linux and Mac Forensics 7.1. Understand Volatile and Non-volatile Data in Linux 7.2. Analyze Filesystem Images Using The Sleuth Kit 7.3. Demonstrate Memory Forensics Using Volatility & PhotoRec 7.4. Understand Mac Forensics Network Forensics 8.1. Understand Network Forensics 8.2. Explain Logging Fundamentals and Network Forensic Readiness 8.3. Summarize Event Correlation Concepts 8.4. Identify Indicators of Compromise (IoCs) from Network Logs 8.5. Investigate Network Traffic 8.6. Perform Incident Detection and Examination with SIEM Tools 8.7. Monitor and Detect Wireless Network Attacks Investigating Web Attacks 9.1. Understand Web Application Forensics 9.2. Understand Internet Information Services (IIS) Logs 9.3. Understand Apache Web Server Logs 9.4. Understand the Functionality of Intrusion Detection System (IDS) 9.5. Understand the Functionality of Web Application Firewall (WAF) 9.6. Investigate Web Attacks on Windows-based Servers 9.7. Detect and Investigate Various Attacks on Web Applications Dark Web Forensics 10.1. Understand the Dark Web 10.2. Determine How to Identify the Traces of Tor Browser during Investigation 10.3. Perform Tor Browser Forensics Database Forensics 11.1. Understand Database Forensics and its Importance 11.2. Determine Data Storage and Database Evidence Repositories in MSSQL Server 11.3. Collect Evidence Files on MSSQL Server 11.4. Perform MSSQL Forensics 11.5. Understand Internal Architecture of MySQL and Structure of Data Directory 11.6. Understand Information Schema and List MySQL Utilities for Performing Forensic Analysis 11.7. Perform MySQL Forensics on WordPress Web Application Database Cloud Forensics 12.1. Understand the Basic Cloud Computing Concepts 12.2. Understand Cloud Forensics 12.3. Understand the Fundamentals of Amazon Web Services (AWS) 12.4. Determine How to Investigate Security Incidents in AWS 12.5. Understand the Fundamentals of Microsoft Azure 12.6. Determine How to Investigate Security Incidents in Azure 12.7. Understand Forensic Methodologies for Containers and Microservices Investigating Email Crimes 13.1. Understand Email Basics 13.2. Understand Email Crime Investigation and its Steps 13.3. U.S. Laws Against Email Crime Malware Forensics 14.1. Define Malware and Identify the Common Techniques Attackers Use to Spread Malware 14.2. Understand Malware Forensics Fundamentals and Recognize Types of Malware Analysis 14.3. Understand and Perform Static Analysis of Malware 14.4. Analyze Suspicious Word and PDF Documents 14.5. Understand Dynamic Malware Analysis Fundamentals and Approaches 14.6. Analyze Malware Behavior on System Properties in Real-time 14.7. Analyze Malware Behavior on Network in Real-time 14.8. Describe Fileless Malware Attacks and How they Happen 14.9. Perform Fileless Malware Analysis - Emotet Mobile Forensics 15.1. Understand the Importance of Mobile Device Forensics 15.2. Illustrate Architectural Layers and Boot Processes of Android and iOS Devices 15.3. Explain the Steps Involved in Mobile Forensics Process 15.4. Investigate Cellular Network Data 15.5. Understand SIM File System and its Data Acquisition Method 15.6. Illustrate Phone Locks and Discuss Rooting of Android and Jailbreaking of iOS Devices 15.7. Perform Logical Acquisition on Android and iOS Devices 15.8. Perform Physical Acquisition on Android and iOS Devices 15.9. Discuss Mobile Forensics Challenges and Prepare Investigation Report IoT Forensics 16.1. Understand IoT and IoT Security Problems 16.2. Recognize Different Types of IoT Threats 16.3. Understand IoT Forensics 16.4. Perform Forensics on IoT Devices

EC-Council Computer Hacking Forensic Investigator (CHFI) v10.0
Delivered OnlineFlexible Dates
£3,495

About this Virtual Instructor Led Training (VILT) The 5 half-day Piping Stress Engineering Virtual Instructor Led Training (VILT) course will systematically expose participants to: The theory and practice of piping stress engineering, with special reference to ASME B 31.1 and ASME B 31.3 Standards. The basic principles and theories of stress and strain and piping stress engineering, through a series of lessons, case study presentations, in-class examples, multiple-choice questions (MCQs) and mandatory exercises. Principal stresses and shear stresses which form the backbone of stress analysis of a material. Expressions for these quantities will be derived using vector algebra from fundamentals. Thermal stress-range, sustained and occasional stresses, code stress equations, allowable stresses, how to increase flexibility of a piping system, cold spring. The historical development of computational techniques from hand calculations in the 1950s to the present-day software. Training Objectives On completion of this VILT course, participants will be able to: Identify potential loads the piping systems and categorise the loads to primary and secondary. Determine stresses that develop in a pipe due to various types of loads and how to derive stress-load relationships, starting from scratch. Treat the primary and secondary stresses in piping system in line with the intent of ASME Standards B 31.1 and B 31.3 and understand how the two codes deal with flexibility of piping systems, concepts of self-springing and relaxation/shake down, displacement stress range and fatigue, what is meant by code compliance. Understand the principles of flexibility analysis, piping elements and their individual effects, flexibility factor, flexibility characteristic, bending of a curved beam and importance of virtual length of an elbow in the flexibility of a piping system. Learn stress intensification factors of bends, branch connections and flanges. Understand how the stresses in the material should be controlled for the safety of the piping system, the user and the environment. Examine how codes give guidance to determine allowable stresses, stress range reduction due to cyclic loading, and effects sustained loads have on fatigue life of piping. Confidently handle terminal forces and moments on equipment. Understand the supplementary engineering standards required to establish acceptance of the equipment terminal loads and what can be done when there are no engineering standard governing equipment terminal loads is available and learn the techniques of local stress analysis. Get a thorough understanding of the concepts and the rules established by the ASME B 31.1 and ASME B 31.3 Standards. Perform flange load analysis calculations based on Kellogg's Equivalent Pressure method & Nuclear Code method. Perform the same using a piping stress analysis software and check for flange stresses and leakage. Confidently undertake formal training of piping stress analysis using any commercial software, with a clear understanding of what happens within the software rather than a 'blind' software training and start the journey of becoming a specialist piping stress engineer.   Target Audience The VILT course is intended for: Recent mechanical engineering graduates who desire to get into the specialist discipline of Piping Stress Engineering. Junior mechanical, chemical, structural and project engineers in the industry who wish to understand the basics of Piping Stress Engineering. Engineers with some process plant experience who desire to progress into the much sought-after specialist disciplines of Piping Stress Engineering. Mechanical, process and structural engineers with some process plant experience who desire to upskill themselves with the knowledge in piping stress engineering and to become a Piping Stress Engineer. Any piping engineer with some pipe stressing experience in the industry who wish to understand the theory and practice of Piping Stress Engineering at a greater depth. A comprehensive set of course notes, practice exercises and multiple-choice questions (MCQs) are included. Participants will be given time to raise questions and participants will be assessed and graded based on responses to MCQs and mandatory exercises. A certificate will be issued to each participant and it will carry one of the three performance levels: Commendable, Merit or Satisfactory, depending on how the participant has performed in MCQs and mandatory exercises. Training Methods The VILT course will be delivered online in 5 half-day sessions comprising 4 hours per day, with 2 breaks of 10 minutes per day. Course Duration: 5 half-day sessions, 4 hours per session (20 hours in total). Trainer Your expert course leader is a fully qualified Chartered Professional Engineer with over 40 years of professional experience in Oil & Gas (onshore and offshore), Petrochemical and Mining industries in engineering, engineering/design management and quality technical management related to plant design and construction. At present, he is assisting a few Perth based oil & gas and mining companies in detail engineering, piping stress analysis, feasibility study and business development work related to plant design. He is a pioneer in piping stress engineering in Western Australia. His recent major accomplishments include the following roles and challenges: Quality Technical Support Manager of USD 54 billion (Gorgon LNG Project). This encompassed management of quality technical services connected with Welding, Welding Related Metallurgy, Non-Destructive Examination, Insulation /Refractory /Coating, AS2885 Pipelines Regulatory Compliance and Pressure Vessel Registration. Regional Piping Practice Lead and Lead Piping Engineer of Hatch Associates. In this role, he was responsible for providing discipline leadership to several mining projects for BHP Billiton (Ravensthorpe), ALCOA-Australia (Alumina), Maáden Saudi Arabia (Alumina), QSLIC China (Magnesium), COOEC China (O&G Gorgon). He was actively involved in the development of piping engineering practice in WA, including training and professional development of graduate, junior and senior engineers. This also includes the formation of the Piping Engineering Specialist Group. Lead Piping/Pipe Stress Engineer on ConocoPhillips' (COP) Bayu Undan Gas Recycle, Condensate production and processing platform. He was able to develop several novel design methodologies for the project and provided training to engineers on how to implement them. These methodologies were commended by COP and the underwriters of the project Lloyds Register of Shipping, UK. Creator of Piping Engineering Professional Course aimed at global engineering community. Professional Affiliations: Fellow, Institution of Mechanical Engineers, UK (IMechE) Fellow, Institution of Engineers, Australia (EA), National Register of Engineers (NER) Member American Society of Mechanical Engineers, USA (ASME) Honorary Life Member, Institution of Engineers, Sri Lanka (IESL)   POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information about post training coaching support and fees applicable for this. Accreditions And Affliations

Piping Stress Engineering
Delivered in Internationally or OnlineFlexible Dates
£1,430 to £2,699

AZ-801T00 Configuring Windows Server Hybrid Advanced Services

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This four-day course is intended for Windows Server Hybrid Administrators who have experience working with Windows Server and want to extend the capabilities of their on-premises environments by combining on-premises and hybrid technologies. Windows Server Hybrid Administrators who already implement and manage on-premises core technologies want to secure and protect their environments, migrate virtual and physical workloads to Azure Iaas, enable a highly available, fully redundant environment, and perform monitoring and troubleshooting. This course teaches IT Professionals to configure advanced Windows Server services using on-premises, hybrid, and cloud technologies. The course teaches IT Professionals how to leverage the hybrid capabilities of Azure, how to migrate virtual and physical server workloads to Azure IaaS, and how to secure Azure VMs running Windows Server. The course also teaches IT Professionals how to perform tasks related to high availability, troubleshooting, and disaster recovery. The course highlights administrative tools and technologies including Windows Admin Center, PowerShell, Azure Arc, Azure Automation Update Management, Microsoft Defender for Identity, Azure Security Center, Azure Migrate, and Azure Monitor. Prerequisites An understanding of the following concepts as related to Windows Server technologies: High availability and disaster recovery Automation Monitoring Troubleshooting 1 - Secure Windows Server user accounts Configure user account rights Protect user accounts with the Protected Users group Describe Windows Defender Credential Guard Block NTLM authentication Locate problematic accounts 2 - Hardening Windows Server Describe Local Password Administrator Solution Configure Privileged Access Workstations Secure domain controllers Analyze security configuration with Security Compliance Toolkit Secure SMB traffic 3 - Windows Server update management Explore Windows Update Outline Windows Server Update Services server deployment options Define Windows Server Update Services update management process Describe the process of Update Management 4 - Secure Windows Server DNS Implement split-horizon DNS Create DNS policies Implement DNS policies Secure Windows Server DNS Implement DNSSEC 5 - Implement Windows Server IaaS VM network security Implement network security groups and Windows IaaS VMs Implement adaptive network hardening Implement Azure Firewall and Windows IaaS VMs Implement Windows firewall with Windows Server IaaS VMs Choose the appropriate filtering solution Deploy and configure Azure firewall using the Azure portal Capture network traffic with network watcher Log network traffic to and from a VM using the Azure portal 6 - Audit the security of Windows Server IaaS Virtual Machines Describe Azure Security Center Enable Azure Security Center in hybrid environments Implement and assess security policies Protect your resources with Azure Security Center Implement Azure Sentinel 7 - Manage Azure updates Describe update management Enable update management Deploy updates View update assessments Manage updates for your Azure Virtual Machines 8 - Create and implement application allowlists with adaptive application control Describe adaptive application control Implement adaptive application control policies 9 - Configure BitLocker disk encryption for Windows IaaS Virtual Machines Describe Azure Disk Encryption and server-side encryption Configure Key Vault for Azure Disk Encryption Encrypt Azure IaaS Virtual Machine hard disks Back up and recover data from encrypted disks Create and encrypt a Windows Virtual Machine 10 - Implement change tracking and file integrity monitoring for Windows IaaS VMs Implement Change Tracking and Inventory Manage Change Tracking and Inventory Manage tracked files Implement File Integrity Monitoring Select and monitor entities Use File Integrity Monitoring 11 - Introduction to Cluster Shared Volumes Determine the functionality of Cluster Shared Volumes Explore the architecture and components of Cluster Shared Volumes Implement Cluster Shared Volumes 12 - Implement Windows Server failover clustering Define Windows Server failover clustering Plan Windows Server failover clustering Implement Windows Server failover clustering Manage Windows Server failover clustering Implement stretch clusters Define cluster sets 13 - Implement high availability of Windows Server VMs Select high-availability options for Hyper-V Consider network load balancing for Hyper-V VMs Implement Hyper-V VM live migration Implement Hyper-V VMs storage migration 14 - Implement Windows Server File Server high availability Explore the Windows Server File Server high-availability options Define Cluster Shared Volumes Implement Scale-Out File Server Implement Storage Replica 15 - Implement scale and high availability with Windows Server VM Describe virtual machine scale sets Implement scaling Implement load-balancing VMs Create a virtual machine scale set in the Azure portal Describe Azure Site Recovery Implement Azure Site Recovery 16 - Implement Hyper-V Replica Define Hyper-V Replica Plan for Hyper-V Replica Configure and implement Hyper-V Replica Define extended replication Define Azure Site Recovery Implement Site Recovery from on-premises site to Azure Implement Site Recovery from on-premises site to on-premises site 17 - Protect your on-premises infrastructure from disasters with Azure Site Recovery Azure Site Recovery overview Workloads supported for protection with Azure Site Recovery Run a disaster recovery drill Failover and failback 18 - Implement hybrid backup and recovery with Windows Server IaaS Describe Azure Backup Implement recovery vaults Implement Azure Backup policies Recover Windows IaaS Virtual Machines Perform file and folder recovery Perform backup and restore of on-premises workloads Manage Azure Virtual Machine backups with Azure Backup service 19 - Protect your Azure infrastructure with Azure Site Recovery What is Azure Site Recovery Prepare for disaster recovery with Azure Site Recovery Run a disaster recovery drill Failover and failback using Azure Site Recovery 20 - Protect your virtual machines by using Azure Backup Azure Backup features and scenarios Back up an Azure virtual machine by using Azure Backup Restore virtual machine data 21 - Active Directory Domain Services migration Examine upgrade vs. migration Upgrade a previous version of Active Directory Domain Services to Windows Server 2022 Migrate to Active Directory Domain Services in Windows Server 2022 from a previous version Explore the Active Directory Migration Tool 22 - Migrate file server workloads using Storage Migration Service Storage Migration Service overview and usage scenarios Storage migration requirements Migrate a server with Storage migration Evaluate storage migration considerations 23 - Migrate Windows Server roles Describe the Windows Server Migration Tools Install the Migration Tools Migrate roles using the Migration Tools 24 - Migrate on-premises Windows Server instances to Azure IaaS virtual machines Plan your migration Describe Azure Migrate Perform server assessment Assess physical servers with Azure Migrate Migrate Windows Server workloads by using Azure Migrate 25 - Upgrade and migrate Windows Server IaaS virtual machines Describe Azure Migrate Migrate Windows Server workloads by using Azure Migrate Describe storage migration Migrate file servers by using Storage Migration Service 26 - Containerize and migrate ASP.NET applications to Azure App Service Azure Migrate App Containerization overview 27 - Monitor Windows Server performance Use Performance Monitor to identify performance problems Use Resource Monitor to review current resource usage Review reliability with Reliability Monitor Implement a performance monitoring methodology Use Data Collector Sets to analyze server performance Monitor network infrastructure services Monitor virtual machines running Windows Server Monitor performance with Windows Admin Center Use System Insights to help predict future capacity issues Optimize the performance of Windows Server 28 - Manage and monitor Windows Server event logs Describe Windows Server event logs Use Windows Admin Center to review logs Use Server Manager to review logs Use custom views Implement event log subscriptions 29 - Implement Windows Server auditing and diagnostics Describe basic auditing categories Describe advanced categories Log user access Enable setup and boot event collection 30 - Troubleshoot Active Directory Recover objects from the AD recycle bin Recover the AD DS database Recover SYSVOL Troubleshoot AD DS replication Troubleshoot hybrid authentication issues 31 - Monitor Windows Server IaaS Virtual Machines and hybrid instances Enable Azure Monitor for Virtual Machines Monitor an Azure Virtual Machine with Azure Monitor Enable Azure Monitor in hybrid scenarios Collect data from a Windows computer in a hybrid environment Integrate Azure Monitor with Microsoft Operations Manager 32 - Monitor your Azure virtual machines with Azure Monitor Monitoring for Azure VMs Monitor VM host data Use Metrics Explorer to view detailed host metrics Collect client performance counters by using VM insights Collect VM client event logs 33 - Troubleshoot on-premises and hybrid networking Diagnose DHCP proble

AZ-801T00 Configuring Windows Server Hybrid Advanced Services
Delivered OnlineFlexible Dates
£2,380

Microsoft 365 for End-users

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The course is targeted at professionals who have never worked with Microsoft 365 before, or who have yet to move beyond its basic functions. The target audience typically includes individuals, professionals, and organizations who are looking to improve their productivity, collaboration, and communication using the suite of applications and services provided by Microsoft 365. This could include office workers, project managers, IT professionals, and small to large-scale businesses who want to maximize the benefits of cloud-based solutions for their daily operations.  Overview Upon successfully completing this course, students will have confidence in using the Microsoft 365 applications. Students will increase their work productivity and decrease time on completing tasks. In this course, students will learn how to use different tools of Microsoft 365 for better online collaboration, including OneDrive, SharePoint, Teams, Excel, Outlook, Word, and PowerPoint. First Steps in Office 365 The Difference Between Office 365 and Microsoft 365 Pros and cons of Microsoft 365 First Steps on mobile devices OneDrive Introduction - What is Microsoft OneDrive? How To Access Microsoft OneDrive? Upload Files Share Files Sync Files Recycle Bin Using OneDrive How To Access Onedrive On Phone? Teams - Simplify Collaboration within Companies Discover new ways to collaborate and communicate An introduction to your central place in Office 365 How to launch and install Teams The Interface of Microsoft Teams Use the Teams window to structure your organization Use Channels to structure the Teams window Use Tabs to access tools and information Communicate with others via Chat Keep track of activities Meetings, video conferencing and screen sharing Share files effectively Manage teams and permissions for organizational structuring Use Teams effectively on mobile devices Final remarks SharePoint Sites Introduction First Steps Document Library - First Steps Document Library - Set and Manage Alerts Document Library - Understanding Versioning Sync Libraries Share a Site Picture Library Lists Calendar Tasks Discussion Board Outlook First Steps in Mail Improved Search Function Work with Folders Settings Working with the Mail App Calendar People Tasks Excel Online Introduction Open and Edit an Excel Online Workbook Limitations of Excel Online Create a New Workbook with Excel Online Edit a Workbook Simultaneously with another Person Working with the Excel AppUse Excel effectively on mobile devices PowerPoint Online Introduction Open a PowerPoint Online Presentation Edit a Presentation Online Limitations of PowerPoint Online Create a Presentation with PowerPoint Online Working with the PowerPoint App Use Power Point effectively on mobile devices Word Online Introduction Open and Edit a Word Document Online Limitations of Word Online Create a New Document Edit a Document Simultaneously Working with the Word App

Microsoft 365 for End-users
Delivered OnlineFlexible Dates
Price on Enquiry

Salesforce Administration Essentials for New Admins in Lightning Experience (ADX201)

By Nexus Human

Duration 3.75 Days 22.5 CPD hours This course is intended for New systems administrators Overview When you complete this course, you will be able to:Customize your application, including page layouts, fields, tabs, and business processes in Lightning Experience.Learn how security settings created in Salesforce Classic are applied in Lightning.Maintain and import clean data in Lightning.Use Lightning features to create high-value reports and dashboards.Understand how workflow automation complies with Lightning This course is the core training that ensures your success with Salesforce Lightning. It?s a must for new administrators, and we recommend completing this course before starting a Salesforce deployment or when taking over an existing deployment. Getting Around the App Data Model and Navigation Lightning Experience Help & Training Getting Your Organization Ready for Users Setting Up the Company Profile Configuring the User Interface Setting Up Activities and Calendars Configuring Search Settings Setting Up Chatter Groups Mobile Access with Salesforce1 Setting Up & Managing Users Managing User Profiles Managing Users Setting Up Chatter Free Users and Invites Troubleshooting Login Issues Security & Data Access Restricting Logins Determining Object Access Setting Up Record Access Creating a Role Hierarchy Dealing with Record Access Exceptions Managing Field-level Security Object Customizations Administering Standard Fields Creating New Custom Fields Creating Selection Fields: Picklists and Lookups Creating Formula Fields Working with Page Layouts Working with Record Types and Business Processes Maintaining Data Quality Managing Data Import Wizards Data Loader Data.com Mass Transfer Backing Up Data Mass Delete and Recycle Bin Reports & Dashboards Running and Modifying Reports Creating New Reports with the Report Builder Working with Report Filters Summarizing with Formulas and Visual Summaries Printing, Exporting, and Emailing Reports Building Dashboards Automation Email Templates Workflow Rules Process Builder Lead Automation Managing the Support Process Managing and Resolving Cases Customizing a Support Process Automating Support Understanding the Salesforce Console for Service Collaborating in the Service Cloud Analyzing Support Data Additional course details: Nexus Humans Salesforce Administration Essentials for New Admins in Lightning Experience (ADX201) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Salesforce Administration Essentials for New Admins in Lightning Experience (ADX201) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Salesforce Administration Essentials for New Admins in Lightning Experience (ADX201)
Delivered OnlineFlexible Dates
Price on Enquiry

Computing - IT Skills for Windows OS (modular) - Online Tuition

5.0(8)

By GLA Tutors Home or Online

Learn everything you need to know to be fully competent with Window OS. This syllabus takes you around the basics and then on another deep dive into all the elements. Discover things you never knew and speed up your experience using Windows OS. Module 1: Introduction to Windows OS • Understanding the Windows operating system • Navigating the Windows interface • Customizing system settings and preferences Module 2: File Management • Managing files and folders in Windows Explorer • Copying, moving, and renaming files • Using the Recycle Bin and data recovery Module 3: Windows Built-in Apps • Using Microsoft Edge for web browsing • Effective web searching using search engines • Email management with Windows Mail • Calendar and task management with Windows Calendar Module 4: Software Installation and Updates • Installing and updating software applications • Managing and uninstalling programs • Windows Store and app installations Module 5: Microsoft Office Basics • Introduction to Microsoft Office suite • Using Microsoft Word for document creation • Basic spreadsheet management with Microsoft Excel Module 6: Microsoft Office Intermediate Skills • Advanced features in Microsoft Word • Creating and formatting spreadsheets in Microsoft Excel • Creating dynamic presentations with PowerPoint Module 7: Multimedia and Graphics • Basic image editing with Paint • Using Windows Photo app for photo management • Creating graphics with Paint 3D Module 8: Productivity and Collaboration • Using OneDrive for cloud-based storage and collaboration • Working with Windows Sticky Notes and To-Do • Collaborative editing with Microsoft Office Online Module 9: Troubleshooting and Maintenance • Identifying and resolving common Windows issues • Using Task Manager for performance monitoring • Maintenance tasks for Windows OS Module 10: Windows Security and Privacy • Overview of Windows security features • Online safety and privacy best practices • Protecting personal data and devices Module 11: Advanced Windows Features • Customizing the Windows Start Menu and Taskbar • Using Cortana for voice commands and search • Virtual desktops and advanced multitasking Module 12: Using AI and Chat GPT • Introduction to AI and Chat GPT technology • Exploring AI-powered features in Windows • Using Chat GPT for productivity and assistance Module 13: Browsing and Search Engines • Effective use of web browsers • Utilizing search engines for research • Online safety and privacy while browsing Module 14: Cybersecurity • Understanding cybersecurity threats • Protecting against malware and phishing attacks • Secure online practices and password management Module 15: Software Installation and Factory Reset • Installing and updating software applications • Factory resetting a Windows device • Data backup and recovery during resets Module 16: Final Projects and Assessment • Culminating projects showcasing Windows OS skills • Practical exams assessing Windows software knowledge and skills • Preparing for industry-recognized certifications (optional) Please note that the duration and depth of each module can vary depending on the level of expertise required and the specific needs of the learners. Additionally, it's important to adapt the curriculum to the learners' proficiency levels, whether they are A Level/GCSE students or adult learners with different experience levels.

Computing - IT Skills for Windows OS (modular) - Online Tuition
Delivered OnlineFlexible Dates
£40