Train the Trainer Recharge: The Healthy Trainer Course Overview This course offers an essential refresh for trainers aiming to enhance their personal wellbeing alongside their professional skills. It focuses on maintaining a healthy balance between the demands of training others and self-care, ensuring trainers remain effective, energised, and confident. Learners will develop strategies to manage their own stress, address challenges confidently, and create positive learning environments. This course equips participants with the ability to engage audiences meaningfully, foster productive feedback, and maintain resilience in dynamic training settings. By the end, trainers will be better prepared to sustain their motivation and deliver impactful sessions while prioritising their own health and wellbeing. Course Description The programme delves into key areas crucial for trainers to maintain optimal performance and wellbeing. It covers techniques for self-management, including stress reduction and emotional regulation, alongside strategies to resolve common challenges encountered in training roles. Emphasis is placed on managing classroom dynamics and engaging diverse audiences effectively. Additionally, learners will explore ways to interpret and respond to feedback constructively to improve delivery and participant outcomes. This course combines reflective learning with evidence-based methods to build resilience, boost trainer confidence, and support continuous professional growth in a balanced, healthy manner. Participants will leave with renewed skills to enhance both their training impact and personal wellbeing. Train the Trainer Recharge: The Healthy Trainer Curriculum Module 01: Welcome to Healthy Trainer Module 02: Manage Yourself Module 03: Manage Your Issues Module 04: Manage Your Classroom Module 05: Manage Your Audience Module 06: Manage Your Feedback (See full curriculum) Who is this course for? Individuals seeking to enhance their trainer wellbeing and effectiveness. Professionals aiming to develop sustainable training practices. Beginners with an interest in personal development and training skills. Trainers wanting to improve audience engagement and feedback management. Career Path Corporate Trainer Learning and Development Specialist Workshop Facilitator Training Coordinator Education Consultant
Masterclasses? Refreshers? Introductions? It depends what you're looking for and where you want to pitch them, but here are six tried-and-tested highly focused sessions that organisations can take individually or as a series, to help develop their teams' project management capabilities one topic at a time. Objectives for each individual session are set out below, as part of the session outlines. Taken together, as a series, however, these modules are an ideal opportunity to develop your team's levels of project management capability maturity, whether that's by introducing them to the basic principles, refreshing them on best practice, or giving them the opportunity to really drill down into a specific area of challenge in your particular operating environment. Session outlines 1 Stakeholder management Session objectives This session will help participants: Understand why stakeholders matter to projects Be able to identify and engage stakeholders Be able to categorise stakeholders by their significance 1 Key principles What does 'stakeholder' mean - in theory? What does this mean in practice? Why stakeholders matter Consequences of missing stakeholders The stakeholder management process:IdentifyAssessPlanEngage 2 Identifying stakeholders Rapid listing CPIG analysis PESTLE analysis Drawing on the knowledge and experience of others Other ways to identify stakeholders 3 Assessing stakeholders Which stakeholders are significant? Stakeholder radar Power-interest maps Power-attitude maps 4 Planning The adoption curve Dealing with obstacles Who should engage which stakeholder? How should the project's organisation be structured? How will communication happen? 5 Engaging Seven principles of stakeholder engagement 2 Requirements and prioritisation Session objectives This session will help participants: Understand how clarity of requirements contributes to project success Use different techniques for prioritising requirements Agree requirements with stakeholders Manage changes to requirements 1 Understanding and managing stakeholder needs and expectations What are 'requirements'? What is 'requirements management'? Sources of requirements - and the role of stakeholders Are stakeholders sufficiently expert to specify their needs? Do they understand the detail of what they want, or do they need help to tease that out? What do stakeholders want to achieve? Working within constraints Prioritising requirements - three techniques 2 MoSCoW prioritisation 'Must have', should have', 'could have, 'won't have this time' When to use MoSCoW 3 The Kano Model Customer satisfaction - 'attractive' and 'must-be' qualities When to use Kano 4 Value-based prioritisation Understanding risk v value Using risk v value to prioritise features and schedules 5 Agreeing requirements Perfect v 'good enough' Establishing acceptance criteria Requirements traceability Agreeing project scope 6 Changing requirements Why requirements change Why change control matters Impact on projects A formal change control process Paying for change - managing change for different types of project 3 Estimating Session objectives This session will help participants: Understand the different purposes estimates satisfy Be able to use different estimating techniques Understand how to achieve different levels of accuracy 1 Key principles What's an estimate? Informed guesswork What needs to be estimated? Costs, resources, effort, duration Tolerances Precision v accuracy 2 Estimating through the lifecycle Start Plan Do 3 Early estimates Comparative ('analogous') estimating Parametric estimating Using multiple estimating techniques 4 Bottom-up estimating Bottom-up ('analytical') estimating Pros Cons 5 Three-point estimating Three-point ('PERT': Programme Evaluation and Review Technique) estimating Uncertainty and the range of estimates Calculating a weighted average Three-point with bottom-up 4 Scheduling Session objectives This session will help participants: Understand how to create a viable schedule Be able to use different forms of schedule Understand the concept of the critical path 1 Key principles The planning horizon Rolling wave planning Release planning 2 Viable scheduling Creating a viable schedule Define the scope Sequence the work Identify the risks and build in mitigations Identify the resources Estimate the effort and durations Check resource availability Refine until a workable schedule is produced 3 Critical path analysis The critical path Network diagrams Sequence logic Practical application:Network diagram with estimated durationsThe 'forward pass'The 'backward pass'Calculating total floatIdentifying the critical pathCalculating free float Gantt charts 5 Risk and issue management Session objectives This session will help participants: Understand the difference between risks and issues Be able to identify and assess risks Understand ways of mitigating risks Manage issues 1 Key principles Understanding risk Threats and opportunities The risk management processPreparation - proactive risk managementThe process - identify, assess, plan, implementStakeholder communication Roles and responsibilities Risk management strategy The risk register Risk appetite 2 Risk identification Brainstorming Interviews Assumption analysis Checklists 3 Risk assessment and prioritisation Probability, impact and proximity Triggers Qualitative risk assessment Qualitative impact assessment Qualitative probability assessment Probability / impact grid Bubble charts Risk tolerance 4 Planning countermeasures To mitigate or not to mitigate? Categories of risk response Avoid and exploit Reduce and enhance Transfer Share Accept Contingency Secondary risks 5 Issue management What is an issue? Tolerances Issues and tolerances The PRINCE2 view of issues Ownership of issues An issue management process Issue register 6 Budgeting and cost control Session objectives This session will help participants: Understand what to include in a budget - and why Choose - and use - the appropriate estimating technique Align the budget with the schedule Understand how to monitor spend and control costs Trouble-shoot effectively to get projects back within budget Session format Flexible. The session can be tailored to the participants' average level of project management maturity - a 60-minute session (delivered virtually) is an effective introduction. A 90-minute session allows for more in-depth treatment. A half-day session (face-to-face or virtual) gives time for a more challenging workshop, particularly to discuss specific cost control issues with any of the participants' current projects. 1 Where is the money coming from? Can we pay from revenue? Do we need to borrow? How long will the project take to pay back? The lifecycle of the budget Through-life costs Stakeholder involvement 2 Estimating costs Reminder: the relationship between estimates Reminder: possible estimating techniques What do we need to estimate?PeopleEquipmentMaterialsFacilities and operating costsWork package estimateEstimated project costs Estimating agile projects 3 Aligning budget and schedule Scheduling and financial periods Spreading the budget 4 Reserves and agreeing the budget Contingency reserve Management reserve Agreeing the budget 5 Cost control Planned spend over time Actual spend over time Work completed over time Evaluating different scenarios: delivery v spend 6 Trouble-shooting Why are we where we are? What has caused the project to spend at the rate it is? Why is it delivering at the rate it is? What are the root causes? What can we do about it?
Duration 5 Days 30 CPD hours This course is intended for The target audience for this textbook is all Oracle professionals, both business and systems professionals. Among the specific groups for whom this textbook will be helpful are: ? Business and non-IT professionals ? Application designers and database developers ? Business Intelligence (BI) analysts and consumers ? Database administrators ? Web server administrators Overview The first portion of this textbook considers the logical models upon which a relational database is based and the various configurations and environments in which you may work with the Oracle database. The next segment focuses on the actual SQL syntax for writing database queries. You will begin with the simplest of queries and then proceed onto moderately complex query scenarios. Finally, this textbook covers the DDL, DML and transaction control portions of the SQL language that allow one to create, maintain and manipulate application database objects and application data. This textbook takes a unique approach to SQL training in that it incorporates data modeling theory, relational database theory, graphical depictions of theoretical concepts and numerous examples of actual SQL syntax into one learning vehicle. Relational Databases & Data Models About Data Models About the Relational Model The Electronics Data Model About the Relational DBMS Selection & Setup of the Database Interface Considering Available Tools Selecting the Appropriate Tool Oracle Net Database Connections Oracle PAAS Database Connections Setup SQL Developer Setup SQL*Plus Setup Jdeveloper Using the Database Interface About Bind & Substitution Variables Using SQL Developer Using SQL*Plus Introduction to the SQL Language About the SQL Language Characteristics of SQL Introducing SQL Using Select SQL Rules The Select Statement The Select Statement Distinct/Unique Keyword Using Alias Names Restricting Results with the Where Clause About Logical Operators Equality Operator Boolean Operators REGEXP_LIKE() In Operator Sorting Data with the Order By Clause About the Order by Clause Multiple Column Sorts Specify the Sort Sequence About Null Values within Sorts Using Column Aliases Pseudo Columns, Functions & Top-N Queries Rowid Pseudo Column ORA_ROWSCN PSEUDO Column ROWNUM Pseudo Column About the Built-In Functions SYSDATE User & UID SESSIONTIMEZONE Function Using the Dual Table Row Limiting & Top-N Queries FETCH First x Rows Only Clause OFFSET x Rows Clause FETCH?PERCENT Clause The WITH TIES Option Joining Tables About Joins Inner Joins Reflexive Join Non-Key Join Outer Join Using the Set Operators About the Set Operators SQL Set Operator Examples UNION Example INTERECT Example MINUS Example UNION All Summary Functions Using Sub-Queries Finding Data with Sub-Queries Standard Sub-Queries Correlated Sub-Queries The EXISTS Operator Aggregating Data within Groups About Summary Groups Find Groups within the Tables Select Data From the Base Tables Select Groups from the Results Use DDL to Create & Manage Tables Create Table Statement Column Data Types Not Null Default Describe Alter Table Statement Drop Table Statement Table DDL Using SQL Developer Alter User Statement Alter Session Statement NLS_Language NLS_Date Use DML to Manipulate Data The Insert Statement The Delete Statement The Update Statement About Transactions Transaction Rollback Transaction Commit Transaction Savepoint The Set Transaction Statement Set Transaction Read Only Statement Rules Understanding the Data Models The Company Data Model The Electronics Data Model About the SQL-99 Standard SQL-92 & SQL-99 Cross Joins Natural Joins Inner Joins Implicit Inner Join Outer Joins Anti Joins Named Sub-Queries Enhancing Groups with Rollup & Cube Using Rollup The Grouping() Function Using Cube SQL Functions: Character Handling What are the SQL Functions? String Formatting Functions UPPER(), LOWER() Example INITCAP() Example Character Codes Functions CHR((), ASCII() Examples PAD & TRIM Functions RPAD() Example RTRIM() Example TRIM() Example String Manipulation Functions DECODE () Example SUBSTR() Example INSTR() Example TRANSLATE() Example REPLACE() Example String Comparison Functions LEAST() Example Phonetic Search Function SOUNDEX() Example SQL Functions: Numeric Handling About the Numeric Data Functions GREATEST() Example ABS() Example ROUND() Example TRUNC() Example SIGN() Example TO_NUMBER() Example & Data ype Conversions NULL VALUES FUNCTIONS NVL() & NVL2() Function NVL() Example (Character) NVL() Example (Numeric Loss of Data) NVL() Example (Numeric Output) NVL2() Example COALESCE() Function NULLIF() Function SQL Functions: Date Handling Date Formatting Functions TO_CHAR() & TO_DATE() Format Patterns TO_CHAR() Examples TO_DATE() Examples EXTRACT() Example Date Arithmetic Functions MONTHS_BETWEEN() Example ADD_MONTHS() Example LAST_DAY() Example NEXT_DAY() Example TRUNC(), ROUND() Dates Example NEW_ TIME() Example About V$TIMEZONE_NAMES CAST() FUNCTION & TIME ZONES Database Objects: About Database Objects About Database Objects About Schemas Making Object References Database Objects: Relational Views About Relations Views The Create View Statement Why Use Views? Accessing Views with DML Maintaining View Definitions Alter View Drop View DDL Using SQL Developer Database Objects: Indexes About Indexes Create & Drop Index Statements Indexes & Performance Data Dictionary Storage Database Objects: Creating Other Objects About Sequences Referencing NEXTVAL Referencing CURRVAL Within the DEFAULT Clause Alter Sequence & Drop Sequence ALTER SEQUENCE DROP SEQUENCE About Identity Columns CREATE TABLE?GENERATED AS IDENTITY ALTER TABLE?GENERATED AS IDENTITY Start With Limit Value ALTER TABLE...DROP IDENTITY About Synonyms CREATE & DROP SYNONYM Statements CREATE SYNONYM DROP SYNONYM Public Vs Private Synonyms CREATE SCHEMA AUTHORIZATION Database Objects: Object Management Using DDL The RENAME Statement TABLESPACE Placement CREATE TABLE?TABLESPACE The Comment Statement The TRUNCATE TABLE Statement Database Objects: Security About Object Security Grant Object Privileges Revoke Object Privileges Object Privileges & SQL Developer Data Integrity Using Constraints About Constraints NOT NULL Constraint NOT NULL Example CHECK Constraint UNIQUE Constraint PRIMARY KEY Constraint REFERENCES Constraint ON DELETE CASCADE Example ON DELETE SET NULL Example Constraints on Existing Tables Constraints & SQL Developer Managing Constraint Definitions RENAMING & DROPPING Constraints ENABLING & DISABLING Constraints DEFERRED Constraint Enforcement SET CONSTRAINTS Handling Constraint Exceptions Constraints with Views DATA Dictionary Storage The Data Dictionary Structure More About the Data Dictionary OBJECT-SPECIFIC Dictionary Views USER_UPDATABLE_COLUMNS The Dictionary Structure METADATA & SQL Developer Additional course details: Nexus Humans Oracle 12c SQL Fundamentals training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Oracle 12c SQL Fundamentals course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
The Special Educational Needs Teaching Assistant Diploma is a professional qualification focussed on the practical application of theoretical knowledge. You will gain knowledge of classroom methodologies, communication skills for teaching and how to safeguard children, along with role-specific competencies such as the SEN code of practice, understanding learning difficulties, supporting children on the autistic spectrum, and managing ADHD and dyslexia in the classroom. We've taken this comprehensive course and broken it down into several manageable modules which we believe will assist you to easily grasp each concept - from the fundamental to the most advanced aspects of the course. It really is a sure pathway to success. Who is the course for? Educators who want to improve their interactive teaching course. People who have an interest in teaching and studying. Entry Requirement: This course is available to all learners, of all academic backgrounds. Learners should be aged 16 or over to undertake the qualification. Good understanding of English language, numeracy and ICT are required to attend this course. CPD Certificate from Course Gate At the successful completion of the course, you can obtain your CPD certificate from us. You can order the PDF certificate for £9 and the hard copy for £15. Also, you can order both PDF and hardcopy certificates for £22. Career path This course opens a new door for you to enter the relevant job market and also gives you the opportunity to acquire extensive knowledge along with required skills to become successful. You will be able to add our qualification to your CV/resume which will help you to stand out in the competitive job industry. Course Curriculum Module 1: Fundamentals of Teaching Understanding the Development of Children and Young Person 01:00:00 Communication and Professional Relationships with Pupils and Family 01:00:00 Safeguarding the Welfare of Children and Young Person 01:00:00 Module 2: Teaching in UK Teaching in the UK 00:10:00 Teachers' Standards in UK 00:10:00 Teachers Pay 00:30:00 The English School System 00:10:00 Evaluation of Schools and Teachers 00:30:00 School Governance 00:15:00 Inclusive Teaching 00:15:00 Module 3: Teacher Training Module 01: Getting Started 00:22:00 Module 02: Understanding Training and Facilitation 00:25:00 Module 03: Gathering Materials 00:12:00 Module 04: Creating a Lesson Plan 00:15:00 Module 05: Choosing Activities 00:15:00 Module 06: Preparing for the Workshop 00:10:00 Module 07: Getting Off on the Right Foot 00:10:00 Module 08: Delivery Tips and Tricks 00:30:00 Module 09: Keeping it Interactive 00:08:00 Module 10: Dealing With Difficult Participants 00:12:00 Module 11: Tackling Tough Topics 00:16:00 Module 12: Wrapping Up 00:12:00 Activities 00:00:00 Module 4: Teaching Methodologies Education - A Group Enterprise 00:20:00 Traits to Develop 00:30:00 Grow the Attention 00:30:00 Learning Good Habits 00:25:00 Importance of Memory 00:30:00 Imagination is Important 00:16:00 Breakdown of Thinking Process 00:30:00 Appreciation - An Aesthetic Emotion 00:20:00 Learning Reflexive Activities 00:35:00 Differing Individuals 01:00:00 Morality Matters 00:30:00 Different Learning Methods 00:15:00 Different Psychological Exercises 00:30:00 Problems, Situations & Solutions 00:20:00 Measuring the Achievements 01:00:00 Module 5: Psychology of Teaching Why Young People Do Not Learn to Study Properly? 00:20:00 The Nature of Study, and Its Principal Factors 00:30:00 Provision for Specific Purposes, as One Factor of Study 00:40:00 The Supplementing of Thought, as a Second Factor of Study 00:15:00 The Organization of Ideas, as a Third Factor in Study 00:30:00 Judging of the Soundness and General Worth of Statements, as a Fourth Factor in Study 00:25:00 Memorizing, as a Fifth Factor in Study 02:00:00 The Using of Ideas, as a Sixth Factor in Study 00:25:00 Provision for a Tentative Rather Than a Fixed Attitude Toward Knowledge, as a Seventh Factor in Study 01:00:00 Provision for Individuality, as an Eighth Factor in Study 00:15:00 Full Meaning of Study: Relation of Study to Children and to the School 00:15:00 Module 6: SEN Teaching Introduction to Special Educational Needs (SEN) 00:05:00 Understand Constructivism in the Classroom and know your role as a teacher 00:10:00 SEN Code of Practice 00:15:00 Get an understanding on SENCO 00:10:00 Classroom Management Strategies for Children with Special Needs 00:05:00 Physical Difficulties, Sensory Difficulties, Cognitive Impairments of Pupils 00:10:00 How to Deal with Pupils with Autism 00:10:00 Understanding Learning Difficulties 00:10:00 Anger Management Methods for Pupils With Special Needs 00:10:00 Teaching Children with Down Syndrome 00:10:00 Conclusion SEN 00:05:00 Module 7: SEN in USA INTRODUCTION to SEN USA 02:00:00 PRINCIPLES OF SPECIAL EDUCATION 01:00:00 SEN CURRICULUM 01:00:00 SEN TEACHING 01:00:00 CONCLUSION to SEN USA 00:15:00 Module 8: ADHD What is ADHD? 00:05:00 Causes of ADHD 00:05:00 Diagnosing ADHD 00:05:00 Treating ADHD 00:05:00 ADHD and Education 00:05:00 Reasonable Adjustments: ADHD 00:10:00 Adults with ADHD 00:10:00 Module 9: Dyslexia What is Dyslexia? 00:10:00 Identifying Dyslexia 00:05:00 Co-occurring Conditions 00:05:00 Diagnosing Dyslexia 00:05:00 Creating Dyslexia Friendly Environment 00:05:00 Solutions for Dyslexia 00:30:00 Module 10: Dealing with Troubled Children YOU AND YOUR CHILD STUDY 01:30:00 THE PROBLEM OF PUNISHMENT 00:30:00 WHEN YOUR CHILD IMAGINES THINGS 00:30:00 WHY KIDS LIE AND WHAT TO DO ABOUT IT 01:00:00 BEING AFRAID 00:30:00 THE FIRST GREAT LAW 00:30:00 THE TRAINING OF THE WILL 01:00:00 HOW CHILDREN REASON ABOUT FUTURE 00:30:00 WORK AND PLAY 01:00:00 CHILDREN'S GANGS, CLUBS, AND FRIENDSHIPS 00:15:00 CHILDREN'S IDEALS AND AMBITIONS 01:00:00 THE STORK OR THE TRUTH 00:30:00 THE GOLDEN AGE OF TRANSITION 00:15:00 HEREDITY AND ENVIRONMENT 01:00:00 FREEDOM AND DISCIPLINE 00:15:00 Mock Exam Mock Exam- Advanced Diploma in Teaching 00:30:00 Final Exam Final Exam- Advanced Diploma in Teaching 00:30:00 Certificate and Transcript Order Your Certificates or Transcripts 00:00:00
Duration 5 Days 30 CPD hours This course is intended for IT professionals with five to eight years of experience in these roles: Data center engineers Network designers Network administrators Network engineers Systems engineers System administrator Consulting systems engineers Technical solutions architects Server administrators Network managers Cisco integrators or partners Overview After taking this course, you should be able to: Describe the Layer 2 and Layer 3 forwarding options and protocols used in a data center Describe the rack design options, traffic patterns, and data center switching layer access, aggregation, and core Describe the Cisco Overlay Transport Virtualization (OTV) technology that is used to interconnect data centers Describe Locator/ID separation protocol Design a solution that uses Virtual Extensible LAN (VXLAN) for traffic forwarding Describe hardware redundancy options; how to virtualize the network, compute, and storage functions; and virtual networking in the data center Describe solutions that use fabric extenders and compare Cisco Adapter Fabric Extender (FEX) with single root input/output virtualization (SR-IOV) Describe security threats and solutions in the data center Describe advanced data center security technologies and best practices Describe device management and orchestration in the data center Describe the storage options for compute function and different Redundant Array of Independent Disks (RAID) levels from a high-availability and performance perspective Describe Fibre Channel concepts, topologies, architecture, and industry terms Describe Fibre Channel over Ethernet (FCoE) Describe security options in the storage network Describe management and automation options for storage networking infrastructure Describe Cisco UCS servers and use cases for various Cisco UCS platforms Explain the connectivity options for fabric interconnects for southbound and northbound connections Describe the hyperconverged solution and integrated systems Describe the systemwide parameters for setting up a Cisco UCS domain Describe role-based access control (RBAC) and integration with directory servers to control access rights on Cisco UCS Manager Describe the pools that may be used in service profiles or service profile templates on Cisco UCS Manager Describe the different policies in the service profile Describe the Ethernet and Fibre Channel interface policies and additional network technologies Describe the advantages of templates and the difference between initial and updated templates Describe data center automation tools The Designing Cisco Data Center Infrastructure (DCID) v7.0 course helps you master design and deployment options focused on Cisco© data center solutions and technologies across network, compute, virtualization, storage area networks, automation, and security. You will learn design practices for the Cisco Unified Computing System? (Cisco UCS©) solution based on Cisco UCS B-Series and C-Series servers, Cisco UCS Manager, and Cisco Unified Fabric. You will also gain design experience with network management technologies including Cisco UCS Manager, Cisco Data Center Network Manager (DCNM), and Cisco UCS Director. This course helps you prepare to take the exam, Designing Cisco Data Center Infrastructure (300-610 DCID) Describing High Availability on Layer 2 Overview of Layer 2 High-Availability Mechanisms Virtual Port Channels Cisco Fabric Path Virtual Port Channel+ Designing Layer 3 Connectivity First Hop Redundancy Protocols Improve Routing Protocol Performance and Security Enhance Layer 3 Scalability and Robustness Designing Data Center Topologies Data Center Traffic Flows Cabling Challenges Access Layer Aggregation Layer Core Layer Spine-and-Leaf Topology Redundancy Options Designing Data Center Interconnects with Cisco OTV Cisco OTV Overview Cisco OTV Control and Data Planes Failure Isolation Cisco OTV Features Optimize Cisco OTV Evaluate Cisco OTV Describing Locator/ID Separation Protocol Locator/ID Separation Protocol Location Identifier Separation Protocol (LISP) Virtual Machine (VM) Mobility LISP Extended Subnet Mode (ESM) Multihop Mobility LISP VPN Virtualization Describing VXLAN Overlay Networks Describe VXLAN Benefits over VLAN Layer 2 and Layer 3 VXLAN Overlay Multiprotocol Border Gateway Protocol (MP-BGP) Ethernet VPN (EVPN) Control Plane Overview VXLAN Data Plane Describing Hardware and Device Virtualization Hardware-Based High Availability Device Virtualization Cisco UCS Hardware Virtualization Server Virtualization SAN Virtualization N-Port ID Virtualization Describing Cisco FEX Options Cisco Adapter FEX Access Layer with Cisco FEX Cisco FEX Topologies Virtualization-Aware Networking Single Root I/O Virtualization Cisco FEX Evaluation Describing Basic Data Center Security Threat Mitigation Attack and Countermeasure Examples Secure the Management Plane Protect the Control Plane RBAC and Authentication, Authorization, and Accounting (AAA) Describing Advanced Data Center Security Cisco TrustSec in Cisco Secure Enclaves Architecture Cisco TrustSec Operation Firewalling Positioning the Firewall Within Data Center Networks Cisco Firepower© Portfolio Firewall Virtualization Design for Threat Mitigation Describing Management and Orchestration Network and License Management Cisco UCS Manager Cisco UCS Director Cisco Intersight Cisco DCNM Overview Describing Storage and RAID Options Position DAS in Storage Technologies Network-Attached Storage Fibre Channel, FCoE, and Internet Small Computer System Interface (iSCSI) Evaluate Storage Technologies Describing Fibre Channel Concepts Fibre Channel Connections, Layers, and Addresses Fibre Channel Communication Virtualization in Fibre Channel SAN Describing Fibre Channel Topologies SAN Parameterization SAN Design Options Choosing a Fibre Channel Design Solution Describing FCoE FCoE Protocol Characteristics FCoE Communication Data Center Bridging FCoE Initialization Protocol FCoE Design Options Describing Storage Security Common SAN Security Features Zones SAN Security Enhancements Cryptography in SAN Describing SAN Management and Orchestration Cisco DCNM for SAN Cisco DCNM Analytics and Streaming Telemetry Cisco UCS Director in the SAN Cisco UCS Director Workflows Describing Cisco UCS Servers and Use Cases Cisco UCS C-Series Servers Fabric Interconnects and Blade Chassis Cisco UCS B-Series Server Adapter Cards Stateless Computing Cisco UCS Mini Describing Fabric Interconnect Connectivity Use of Fabric Interconnect Interfaces VLANs and VSANs in a Cisco UCS Domain Southbound Connections Northbound Connections Disjoint Layer 2 Networks Fabric Interconnect High Availability and Redundancy Describing Hyperconverged and Integrated Systems Hyperconverged and Integrated Systems Overview Cisco HyperFlex? Solution Cisco HyperFlex Scalability and Robustness Cisco HyperFlex Clusters Cluster Capacity and Multiple Clusters on One Cisco UCS Domain External Storage and Graphical Processing Units on Cisco HyperFlex Cisco HyperFlex Positioning Describing Cisco UCS Manager Systemwide Parameters Cisco UCS Setup and Management Cisco UCS Traffic Management Describing Cisco UCS RBAC Roles and Privileges Organizations in Cisco UCS Manager Locales and Effective Rights Authentication, Authorization, and Accounting Two-Factor Authentication Describing Pools for Service Profiles Global and Local Pools Universally Unique Identifier (UUID) Suffix and Media Access Control (MAC) Address Pools World Wide Name (WWN) Pools Server and iSCSI Initiator IP Pools Describing Policies for Service Profiles Global vs. Local Policies Storage and Basic Input/Output System (BIOS) Policies Boot and Scrub Policies Intelligent Platform Management Interface (IPMI) and Maintenance Policies Describing Network-Specific Adapters and Policies LAN Connectivity Controls SAN Connectivity Controls Virtual Access Layer Connectivity Enhancements Describing Templates in Cisco UCS Manager Cisco UCS Templates Service Profile Templates Network Templates Designing Data Center Automation Model-Driven Programmability Cisco NX-API Overview Programmability Using Python Cisco Ansible Module Use the Puppet Agent Additional course details: Nexus Humans Cisco Designing Cisco Data Center Infrastructure v7.0 (DCID) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Designing Cisco Data Center Infrastructure v7.0 (DCID) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Horizon Cloud Service on Microsoft Azure administrators, system integrators, account managers, solutions architects, solutions engineers, sales engineers, and consultants. Overview By the end of the course, you should be able to meet the following objectives: Describe the architecture of Horizon Cloud Service on Microsoft Azure Discuss the initial Microsoft Azure configurations required for the Horizon Cloud Service on Microsoft Azure deployment Discuss Horizon Cloud Service on Microsoft Azure networking concepts Discuss Horizon Cloud Service on Microsoft Azure AD requirements and integration best practices Discuss the integration of Workspace ONE Access with Horizon Cloud Service on Microsoft Azure Discuss the requirements for deploying Horizon Cloud Service on Microsoft Azure Demonstrate how to deploy or upgrade Horizon Cloud Service on Microsoft Azure Identify the Horizon Cloud Service console controls that are available to administrators Identify Horizon Cloud upgrade features and benefits List the steps and considerations to take when setting up a primary VM to be used as an assignable image List the steps to install the user software on the primary VM Describe pools and pool groups Explain the creation process and configuration options for single-session and multisession pools and pool groups Create single-session and multisession assignments and entitlements Explain power management options in the multisession pool groups Manage assignable images on Horizon Cloud Service on Microsoft Azure Identify how to access desktops and application from Horizon Cloud Service on Microsoft Azure Describe the integration of VMware Dynamic Environment Manager with Horizon Cloud Service on Microsoft Azure Manage user personalization and application configurations using the VMware Dynamic Environment Manager management console and application profiler Discuss the usage of App Volumes for Horizon Cloud Service on Microsoft Azure Interpret scalability considerations for Horizon Cloud Service on Microsoft Azure Apply troubleshooting techniques relevant to Horizon Cloud Service and Microsoft Azure Summarize the analytics and monitoring capabilities in Horizon Cloud Service on Microsoft Azure This five-day, hands-on training provides you with the knowledge, skills, and abilities to successfully deploy and manage VMware Horizon© Cloud Service? on Microsoft Azure. This training also teaches you how to use the VMware Horizon Cloud administration console and Microsoft Azure portal. Through a combination of hands-on labs and interactive lectures, you learn how to import and manage images for single and multisession assignments. You also learn how to configure and use the Universal Broker function, VMware App Volumes?, VMware Workspace ONE© Access?, and VMware Dynamic Environment Manager? in the Horizon Cloud Service on Microsoft Azure deployment. Course Introduction Introduction and course logistics Course objectives Introduction to Horizon Cloud Service on Microsoft Azure Discuss the features and benefits of Horizon Cloud Service on Microsoft Azure Identify the available Horizon Cloud and Microsoft licensing options Identify the system architecture components of Horizon Cloud Service on Microsoft Azure Explain how VMware Dynamic Environment Manager is used in Horizon Cloud profile management Describe Horizon Cloud application management using App Volumes Identify the Microsoft Azure configuration prerequisites for a Horizon Cloud integration Identify the main Microsoft Azure components required for a Horizon Cloud deployment Review the virtual machines supported in Horizon Cloud Service on Microsoft Azure Microsoft Azure Networking Requirements Discuss Horizon Cloud connectivity considerations and tasks Explain the networking concepts for Horizon Cloud Service on Microsoft Azure Identify the ports required for local connections, remote connections, and endpoint OS firewall rules Identity Management Explain computer identity type and user identity type Discuss the best practices for Horizon Cloud Service on Microsoft Azure AD integrations Determine the requirements for Horizon Cloud Service on Microsoft Azure AD Describe the benefits of integrating Horizon Cloud with Workspace ONE Access Explain how a user obtains access to an entitled virtual desktop or application from the VMware Workspace ONE© Intelligent Hub catalog Discuss the importance of binding directory with Workspace ONE Access and setting up custom user attribute synchronization Discuss the importance of configuring the Remote App Access client in Workspace ONE Access Demonstrate how to access an entitled Horizon virtual desktop or application in the Workspace ONE Intelligent Hub catalog Deployment and Upgrades Explain the steps and requirements for deploying Horizon Cloud Service on Microsoft Azure Describe the features and benefits of Horizon Edge Describe the differences between internal and external gateways Outline the Horizon Universal Console controls available for administrators Identify the features and benefits of the Horizon Cloud upgrades Creating Images Outline the process and configuration choices for setting up primary VMs Identify the configuration choices for importing primary VMs List the steps to install the user software on the primary VM Explain how to convert a configured primary VM to an assignable image Describe pools and pool groups List the steps for configuring an image to a pool List the steps for configuring an image to a pool group Pool Groups Compare dedicated assignments to floating assignments Outline the steps for creating single-session and multisession assignment Explain the entitlement of pool groups Outline the creation process and configuration options for multisession pools and pool groups Explain the power management selections in the multisession pool groups Compare the rolling maintenance and loadbalancing options Identify the actions related to the multisession groups page Identify the actions to add and assign applications to a user or group Outline the prerequisites for entitling a multisession assignment Access Desktops and Applications Identify the different versions of Horizon Client Describe how to access desktops and remote applications with Horizon Client Describe how to access desktops and remote applications with a browser Compare the remote display protocols that are available for Horizon Cloud Describe the Blast Extreme display protocol codecs List the ideal applications for each Blast Extreme codec Describe the Blast Extreme policy configurations Managing Images Describe images Explain how to manage images VMware Dynamic Environment Manager on Horizon Cloud Service on Microsoft Azure Identify the functional areas of VMware Dynamic Environment Manager and their benefits Explain how to use the VMware Dynamic Environment Manager console and application profiler to manage user personalization and application configurations App Volumes for Horizon Cloud Service on Microsoft Azure Explain how App Volumes works with Horizon Cloud Service on Microsoft Azure Identify the features and benefits of App Volumes in Horizon Cloud Service on Microsoft Azure Identify the interface elements of App Volumes in Horizon Cloud Service on Microsoft Azure Demonstrate how to configure App Volumes in Horizon Cloud Service on Microsoft Azure Scalability Considerations Recognize the scalability settings for Horizon Cloud Service on Microsoft Azure Troubleshooting Horizon Cloud Service on Microsoft Azure Explain the troubleshooting basics for Horizon Cloud Service on Microsoft Azure Identify the analytics and monitoring capabilities of Horizon Cloud Service on Microsoft Azure Explain the troubleshooting basics for Horizon Cloud Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Horizon Cloud Service Next Gen on Microsoft Azure: Deploy and Manage training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Horizon Cloud Service Next Gen on Microsoft Azure: Deploy and Manage course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for Experienced system administrators and network administrators Overview By the end of the course, you should be able to meet the following objectives: Describe the NSX Advanced Load Balancer architecture, components, and main functions Explain the key features and benefits of NSX Advanced Load Balancer Explain and configure local load-balancing constructs such as virtual services, pools, health monitors, and related components Recognize web application breaches and threats Recognize multiple attack vectors such as web scraping, Layer 7 Denial of Service, brute force, and code injections Explain the components of NSX Advanced Load Balancer WAF that build a security pipeline to protect a web application from being attacked Describe how to configure the NSX Advanced Load Balancer WAF components Describe an NSX Advanced Load Balancer WAF operational task such as setting up an application with WAF, tuning the WAF Policy, and working with logs and analytics Explain the NSX Advanced Load Balancer WAF best practices for on-boarding a web application; configuring WAF settings for effective application security Explain how to size the NSX Advanced Load Balancer WAF data plane Explain the WAF Application learning feature, configuration of Application learning, Virtual Patching concepts, common caveats, and troubleshooting while deploying in any environment Recognize NSX Advanced Load Balancer Cloud Services that include threat Intelligence services Describe the Threat Intelligence service provided by NSX Advanced Load Balancer WAF and how the NSX Advanced Load Balancer WAF Threat Intelligence service receives live security threat feed for multiple attack vectors from Cloud Services (formerly Avi Pulse) Describe the NSX Advanced Load Balancer DataScript capabilities for detecting and defending against advance and zero-day attacks. Discuss the relevant NSX Advanced Load Balancer WAF logs and perform basic troubleshooting of applications that are protected by NSX Advanced Load Balancer WAF Explain the NSX Advanced Load Balancer WAF capability to protect Personally Identifiable Information (PII) This three-day course provides comprehensive training to install, configure, and manage a VMware NSX Advanced Load Balancer Web Application Firewall (WAF) solution. This course covers key NSX Advanced Load Balancer WAF features and functionality offered in the NSX Advanced Load Balancer 22.1.3 release for web security and application attack protection. Features include security pipeline, application learning, policy tuning, false positive mitigation, virtual patching, threat intelligence, troubleshooting, logs, analytics, and solution monitoring. Hands-on labs provide access to an NSX Advanced Load Balancer environment to reinforce the skills and concepts presented in the course. Course Introduction Introduction and course logistics Course objectives Introduction to NSX Advanced Load Balancer Illustrate NSX Advanced Load Balancer Explain NSX Advanced Load Balancer architecture and components Describe control plane clustering and high availability Describe data plane high availability mode Understand the common terminologies used with NSX Advanced Load Balancer Explain the NSX Advanced Load Balancer service elements Explain virtual service components and how to configure a virtual service Explain application profiles and network profiles Explain the pool configuration options and how to configure a pool Explain the available load-balancing algorithms Explain and configure SSL profiles and certificates Explain cloud connectors and cloud connector integration modes Explain multiple health monitor types Understand client logs Introduction to Application Security Understand web application security breaches and the implication of breaches Explain common terminologies related to Web Application Security Understand the different teams involved to secure applications Attacking Web Applications Understand the various web application security testing methodologies Understand the OWASP Top 10 vulnerabilities Understand the tools to generate a web application attack Describe a few types of web application attacks Types of Transport Understand different web traffic transport modes Describe web traffic and API traffic NSX Advanced Load Balancer WAF Components Understand the core design principles of NSX Advanced Load Balancer WAF Describe the NSX Advanced Load Balancer WAF components that build the WAF security pipeline Understand the NSX Advanced Load Balancer WAF configuration objects NSX Advanced Load Balancer WAF Operations Examine how to set up an application with WAF Describe considerations for the WAF policy Work with WAF logs and analytics Describe WAF policy tuning Describe the options available to remediate false positive mitigation NSX Advanced Load Balancer WAF Best Practices Describe technical and application considerations for onboarding an application front ended by WAF Describe best practices to remediate false positive mitigation. Describe how to manage a response from a back-end application server and client upload to the application server Describe the consideration for setting the rigidity of a WAF signature rule set Describe the options available to identify client traffic NSX Advanced Load Balancer WAF Sizing Understand how to do WAF data plane sizing in Greenfield and Brownfield deployments NSX Advanced Load Balancer WAF Custom Rules Understand WAF custom rules Describe the need and recommendation for custom rules Describe ModSecurity rules Understand the ModSecurity rule structure and explain how to construct the rule Analyze a sample custom rule for the use-case scenario for in-depth understanding of a custom rule NSX Advanced Load Balancer WAF Application Learning Understand the significance of Application Learning Explain the Positive Security Model architecture Describe the WAF multifaceted Application Learning technique to build an application model for creating positive security rules Describe how to view the data that is learned by the Application learning module Describe the WAF Virtual Patching technique to construct a WAF policy from Dynamic Application Security Testing (DAST) scanner results Understand the conditions for sharing WAF Learning Data and PSM Group in WAF Policy. Malware Protection Through ICAP in NSX Advanced Load Balancer Understand Malicious File Upload Protection and ICAP workflow Describe ICAP configuration and log analytics NSX Advanced Load Balancer IP Reputation Understand IP Reputation concepts and their integration with NSX Advanced Load Balancer Describe IP Reputation configuration, log analytics, and troubleshooting DataScript for Application Security Describe DataScript events and reference Describe application security using DataScript Explain how to troubleshoot DataScript issues Rate Limiting and DOS Describe and configure the NSX Advanced Load Balancer rate limiter technique Describe protection from denial of service (DoS) attacks and distributed DoS (DDoS) attacks in NSX Advanced Load Balancer Explain the Service Engine general advice and guidance for DDOS Bot Management Understand Bots Describe the Bot Management mechanism in NSX Advanced Load Balancer Describe how to configure NSX Advanced Load Balancer Bot Management Managing Personally Identifiable Information in NSX Advanced Load Balancer Understand Personally Identifiable Information (PII) Understand the scope of managing PII in NSX Advanced Load Balancer Describe how to configure the hidden PII in NSX Advanced Load Balancer logs using profiles and WAF rules. Threat Intelligence Introduce the Threat Intelligence service Describe the Threat Intelligence live security threat feed for multiple attack vectors Describe how to configure Threat Intelligence in NSX Advanced Load Balancer Application Programming Interface Security Define Application Programming Interface (API) Security Understand API authentication and authorization using virtual service authentication mechanisms used for a virtual service such as LDAP, SAML, JSON Web Token, and OAUTH Understand API Rate Limiting in NSX Advanced Load Balancer Understand the NSX Advanced Load Balancer WAF Protection for API Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware NSX Advanced Load Balancer: Web Application Firewall Security [V22.x] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware NSX Advanced Load Balancer: Web Application Firewall Security [V22.x] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Most organisations and businesses are trying to navigate the best way back to a functional working framework. But two things need to happen - 1. The working practices need to be efficient, sustainable and compatible for meeting the demands and needs of the organisation; it’s clients, it’s workforce and it’s Leaders 2. The culture needs to be welcoming, authentic and supportive otherwise there will be disenfranchisement and potentially a churn of staff and loss of talent What has been proven to be a very successful approach to mitigate the dangers of demotivated team members and poor efficiency levels is a bespoke ‘Ushering the Team Back to the Workplace’ workshop. Programme Outline Below is a template of an actual Programme that has been delivered very successfully for clients such as the NHS; Claranet; Jotun Paints & Workspace. This, however, can be modified to suit any group or size. It will be designed to reflect the Organisation’s preferred Hybrid working framework and communication systems. The options of having the innovative Real Play technique to help handle delicate conversations is especially effective. The biggest gain is to reconnect the relationships via the activities and exercises, which would be selected carefully. Key commitments and buy-in is always the priority outcomes - which this programme will help deliver in just 1 day. The objectives include: Making the transition back to working as a collaborative team Enhancing the Leadership skills of the team Reviewing/establishing the Hybrid working protocols Galvanising the Team spirit Maintain inclusivity among full-time; part-time and Region based team members Energising and motivational Fun! Exercise – Round the Bend The team are to follow the instructions delivered as they walk (and jump) through the route – always keeping a safe distance apart. The instructions become more complicated as they progress. Debriefing points: Dealing with Change Attention to Detail Adapting approach Optimising results Exercise - Number Crunch (3 x Cohorts of 12/13) The team must be effectively led and motivated to work as one unified group to reach their objective of visiting each numbered location within a very tight deadline. Debriefing points: Support and co-ordination Strategy and planning Adapting approach Optimising results Tutorial – Team Dynamics Tuckman model Phases of Development towards Maturity Exercise - Juggling (3 x Cohorts of 12/13) The group(s) will be invited to optimise the number of ‘clients’ (juggling balls) they can manage at one time. This involves devising a sequence between the group to achieve maximum results without making any mistakes. We introduce different balls which represent different degrees of complexity, challenging the group’s preparation and approach to a variety ‘customers’ needs. Debriefing points: Ensuring effective communication Clarifying the approach for dealing with the unexpected Setting expectations and reviewing delivery Treating every colleague with care and respect Tutorial - Email Etiquette The primary standards – best practices ABSURD model Preparation and planning Top Tips World Cafe The team are split into 5-6 sub-groups – each with a specific review focus:- What recommendations do you have to engage the team back into the Workplace? How do we ensure the framework is efficient? What are the best ways to optimise team working strategically when most/all team members are in the office? What potential barriers are there? How do we accommodate for the Regional team members? What are the benefits to bringing the team back to the workplace? Each session has 2 – 3 rounds with each table’s ‘host’ sharing feedback for applying to the Team Action Plan – or Charter. Debriefing points: Each Syndicate’s recommendations and capture the key actions they generate 'Real Play' We offer an innovative solution to bring real Leadership/team scenarios to life. We use actors who improvise scenarios which have been specified by the group. The group is split the group into 2 sub-groups, one with the Actor, the other with the Trainer. Each group has a brief and has to instruct their Trainer/Actor on how to approach the scenario supplied. The Actor and Trainer perform the role play(s) as instructed by their respective teams; however, during the action they can be paused for further recommendations or direction. The outcome is the responsibility of the team(s) – not the performers Assign 24 x ‘Directors’ (4 for each Player – Phil & Julia – for each Real Play. Potential Real Play Scenarios: Engaging with a team member as to how the new working plans will be applied. Overcoming concerns to the new working practices/framework Addressing issues where a team member feels excluded from the teamworking practices/culture Debrief the Programme Individual Action Plans Team Priorities for application into the workplace
If you are creating videos and either spending loads of time creating the subtitle files or even paying to have them created then look no further. This simple and easy exercise will enable you to create subtitles in seconds and is as easy as copy and paste.