• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

25738 Courses in Cardiff delivered Online

ISO 27701 Lead Implementer

By Training Centre

  Delivered in either our Live Online (4 days) or in our Classroom (5 days), the ISO/IEC 27701 Lead Implementer training course enables you to develop the necessary expertise to assist an organization to establish, implement, maintain and continually improve a Privacy Information Management System (PIMS) based on ISO/IEC 27701 by enhancing an existing ISMS based on ISO/IEC 27001 and the guidance of ISO/IEC 27002. About This Course   This training course is designed to prepare its participants implement a Privacy Information Management System (PIMS) in compliance with the requirements and guidance of the ISO/IEC 27701. Moreover, you will gain a comprehensive understanding of the best practices of privacy information management and learn how to manage and process data while complying with various data privacy regimes.   After mastering the implementation and management of a Privacy Information Management System (PIMS), you can sit for the exam and gain the "Certified ISO/IEC 27701 Lead Implementer' credential. The internationally recognized Certificate proves that you have the practical knowledge and professional capabilities to implement the ISO/IEC 27701 requirements in an organization.   Learning objectives   Master the concepts, approaches, methods and techniques used for the implementation and effective management of a PIMS. Learn about the correlation between ISO/IEC 27701, ISO/IEC 27001, ISO/IEC 27002 and other standards and regulatory frameworks. Understand the operation of a PIMS based on ISO/IEC 27701 and its principal processes. Learn how to interpret the requirements of ISO/IEC 27701 in the specific context of an organization. Develop the expertise to support an organization in effectively planning, implementing, managing, monitoring and maintaining a PIMS.   Education approach   This training course is based on both theory and best practices used in the implementation of PIMS. Lecture sessions are illustrated with examples based on case studies. Practical exercises are based on a case study which includes role playing and discussions. Practice tests are similar to the Certification Exam Prerequisites   A fundamental understanding of information security and comprehensive knowledge of the ISMS implementation principles What's Included?   Refreshments & Lunch (Classroom courses only) Course Slide Deck Official Study Guides CPD Certificate The Exam fees   Who Should Attend?   Managers and consultants involved in privacy and data management Expert advisors seeking to master the implementation of a Privacy Information Management System Individuals responsible and accountable for Personally Identifiable Information (PII) within organizations Individuals responsible for maintaining conformance with data privacy regimes requirements PIMS team members Accreditation Our Guarantee     We are an approved IECB Training Partner. You can learn wherever and whenever you want with our robust classroom and interactive online training courses. Our courses are taught by qualified practitioners with commercial experience. We strive to give our delegates the hands-on experience. Our courses are all-inclusive with no hidden extras.  The one-off cost covers the training, all course materials, and exam voucher. Our aim: To achieve a 100% first time pass rate on all our instructor-led courses. Our Promise: Pass first time or 'train' again for FREE. *FREE training and exam retake offered Assessment   The exam consists of a 12 question essay type format, to be completed within 150 minutes and achieve a pass mark of 70%. Exam results are provided within 24 hours. Provided by   This course is Accredited by NACS and Administered by the IECB.

ISO 27701 Lead Implementer
Delivered OnlineFlexible Dates
£1,450

ISO 27005 Lead Risk Manager

By Training Centre

  Delivered in either Live Online (4 days) or in our Classroom (5 days), the ISO/IEC 27005 Lead Risk Manager training enables you to acquire the necessary expertise to support an organization in the risk management process related to all assets of relevance for Information Security using the ISO 27005 standard as a reference framework. During this training course, you will gain a comprehensive knowledge of a process model for designing and developing an Information Security Risk Management program. The training will also contain a thorough understanding of best practices of risk assessment methods such as OCTAVE, EBIOS, MEHARI and harmonized TRA. This training course supports the implementation process of the ISMS framework presented in the ISO/IEC 27001 standard. About This Course   After mastering all the necessary concepts of Information Security Risk Management based on ISO/IEC 27005, you can sit for the exam and gain the "Certified ISO/IEC 27005 Lead Risk Manager' credential. By holding this credential, you will be able to demonstrate that you have the practical knowledge and professional capabilities to support and lead a team in managing Information Security Risks.   Learning objectives Master the concepts, approaches, methods and techniques that enable an effective risk management process based on ISO/IEC 27005 Acknowledge the correlation between Information Security risk management and security controls Learn how to interpret the requirements of ISO/IEC 27001 in Information Security Risk Management Acquire the competence and skills to effectively advise organizations on Information Security Risk Management best practices Acquire the knowledge necessary for the implementation, management and maintenance of an ongoing risk management program Educational approach This training is based on both theory and best practices used in Information Security Risk Management Lecture sessions are illustrated with examples based on cases studies Practical exercises are based on a case study which includes role playing and discussions Practice tests are similar to the Certification Exam Who Should Attend?   Information Security risk managers Information Security team members Individuals responsible for Information Security, compliance, and risk within an organization Individuals implementing ISO/IEC 27001, seeking to comply with ISO/IEC 27001 or individuals who are involved in a risk management program IT consultants IT professionals Information Security officers Privacy officers What's Included?   Official Course Slide decks Candidate pack Exam fees Prerequisites   A foundational understanding of ISO/IEC 27005 and knowledge of Risk Assessment and Information Security. Our Guarantee     We are an approved IECB Training Partner. You can learn wherever and whenever you want with our robust classroom and interactive online training courses. Our courses are taught by qualified practitioners with commercial experience. We strive to give our delegates the hands-on experience. Our courses are all-inclusive with no hidden extras.  The one-off cost covers the training, all course materials, and exam voucher. Our aim: To achieve a 100% first time pass rate on all our instructor-led courses. Our Promise: Pass first time or 'train' again for FREE. *FREE training and exam retake offered Accreditation Assessment   The exam for this course is a 12 question essay type. The pass mark is 70% and should be achieved within the allotted 150 minute exam timeframe. Exam results are provided within 24 hours. Provided by   This course is Accredited by NACSand Administered by the IECB

ISO 27005 Lead Risk Manager
Delivered OnlineFlexible Dates
£1,450

CertNexus Certified CyberSec First Responder (CFR-410)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed primarily for cybersecurity practitioners preparing for or who currently perform job functions related to protecting information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. It is ideal for those roles within federal contracting companies and private sector firms whose mission or strategic objectives require the execution of Defensive Cyber Operations (DCO) or DoD Information Network (DoDIN) operation and incident handling. This course focuses on the knowledge, ability, and skills necessary to provide for the defense of those information systems in a cybersecurity context, including protection, detection, analysis, investigation, and response processes. Overview In this course, you will identify, assess, respond to, and protect against security threats and operate a system and network security analysis platform. You will: Assess cybersecurity risks to the organization. Analyze the threat landscape. Analyze various reconnaissance threats to computing and network environments. Analyze various attacks on computing and network environments. Analyze various post-attack techniques. Assess the organization's security posture through auditing, vulnerability management, and penetration testing. Collect cybersecurity intelligence from various network-based and host-based sources. Analyze log data to reveal evidence of threats and incidents. Perform active asset and network analysis to detect incidents. Respond to cybersecurity incidents using containment, mitigation, and recovery tactics. Investigate cybersecurity incidents using forensic analysis techniques. This course covers network defense and incident response methods, tactics, and procedures that are in alignment with industry frameworks such as NIST 800-61r2 (Computer Security Incident Handling Guide), US-CERT's National Cyber Incident Response Plan (NCIRP), and Presidential Policy Directive (PPD)-41 on Cyber Incident Coordination. It is ideal for candidates who have been tasked with the responsibility of monitoring and detecting security incidents in information systems and networks, and for executing standardized responses to such incidents. The course introduces tools, tactics, and procedures to manage cybersecurity risks, defend cybersecurity assets, identify various types of common threats, evaluate the organization's security, collect and analyze cybersecurity intelligence, and remediate and report incidents as they occur. This course provides a comprehensive methodology for individuals responsible for defending the cybersecurity of their organization. This course is designed to assist students in preparing for the CertNexus CyberSec First Responder (Exam CFR-410) certification examination. What you learn and practice in this course can be a significant part of your preparation. In addition, this course and subsequent certification (CFR-410) meet all requirements for personnel requiring DoD directive 8570.01-M position certification baselines: CSSP Analyst CSSP Infrastructure Support CSSP Incident Responder CSSP Auditor The course and certification also meet all criteria for the following Cybersecurity Maturity Model Certification (CMMC) domains: Incident Response (IR) Audit and Accountability (AU) Risk Management (RM) Lesson 1: Assessing Cybersecurity Risk Topic A: Identify the Importance of Risk Management Topic B: Assess Risk Topic C: Mitigate Risk Topic D: Integrate Documentation into Risk Management Lesson 2: Analyzing the Threat Landscape Topic A: Classify Threats Topic B: Analyze Trends Affecting Security Posture Lesson 3: Analyzing Reconnaissance Threats to Computing and Network Environments Topic A: Implement Threat Modeling Topic B: Assess the Impact of Reconnaissance Topic C: Assess the Impact of Social Engineering Lesson 4: Analyzing Attacks on Computing and Network Environments Topic A: Assess the Impact of System Hacking Attacks Topic B: Assess the Impact of Web-Based Attacks Topic C: Assess the Impact of Malware Topic D: Assess the Impact of Hijacking and Impersonation Attacks Topic E: Assess the Impact of DoS Incidents Topic F: Assess the Impact of Threats to Mobile Security Topic G: Assess the Impact of Threats to Cloud Security Lesson 5: Analyzing Post-Attack Techniques Topic A: Assess Command and Control Techniques Topic B: Assess Persistence Techniques Topic C: Assess Lateral Movement and Pivoting Techniques Topic D: Assess Data Exfiltration Techniques Topic E: Assess Anti-Forensics Techniques Lesson 6: Assessing the Organization's Security Posture Topic A: Implement Cybersecurity Auditing Topic B: Implement a Vulnerability Management Plan Topic C: Assess Vulnerabilities Topic D: Conduct Penetration Testing Lesson 7: Collecting Cybersecurity Intelligence Topic A: Deploy a Security Intelligence Collection and Analysis Platform Topic B: Collect Data from Network-Based Intelligence Sources Topic C: Collect Data from Host-Based Intelligence Sources Lesson 8: Analyzing Log Data Topic A: Use Common Tools to Analyze Logs Topic B: Use SIEM Tools for Analysis Lesson 9: Performing Active Asset and Network Analysis Topic A: Analyze Incidents with Windows-Based Tools Topic B: Analyze Incidents with Linux-Based Tools Topic C: Analyze Indicators of Compromise Lesson 10: Responding to Cybersecurity Incidents Topic A: Deploy an Incident Handling and Response Architecture Topic B: Mitigate Incidents Topic C: Hand Over Incident Information to a Forensic Investigation Lesson 11: Investigating Cybersecurity Incidents Topic A: Apply a Forensic Investigation Plan Topic B: Securely Collect and Analyze Electronic Evidence Topic C: Follow Up on the Results of an Investigation Additional course details: Nexus Humans CertNexus Certified CyberSec First Responder (CFR-410) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CertNexus Certified CyberSec First Responder (CFR-410) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CertNexus Certified CyberSec First Responder (CFR-410)
Delivered OnlineFlexible Dates
£3,495

Tripod Beta Practitioner - Bronze Level

By EnergyEdge - Training for a Sustainable Energy Future

About this VILT Tripod can be used in any area of business where the organisation has a management system in place to prevent unwanted events e.g., health, safety, environment, quality, security, productivity, project management, and many more Tripod Beta is one of several tools based on Tripod's fundamental principles. Tripod Beta is based on proven theories, man years of academic research, and testing in the workplace. The Swiss Cheese Model originated from this work. Features of the methodology are: 1) the Tripod Beta diagram; it provides an easy-to-read summary of the entire investigation on a single page, 2) it accommodates deficiencies in leadership and worker participation, 3) it accommodates deficiencies in human behaviour, and 4) it highlights missing controls (not just controls that failed). Quality throughout all aspects of Tripod is assured by the Stichting Tripod Foundation (STF) and the Energy Institute. The participants will gain a theoretical understanding of the Tripod Beta methodology and terminology. They will be able to read Tripod diagrams and reports, and be able to assist incident investigation/analysis as a team member. This is the first step to becoming an accredited silver or gold practitioner. Tripod Beta Practitioner Accreditation is meant to build these skills, through a blend of support, coaching and assessments. Feedback is provided on Tripod incident investigation reports, giving the Practitioner the opportunity to hone their skills and become confident in their ability to use Tripod effectively. Training Objectives Upon completion of this course, participants will be able to: Pass the Tripod Beta Practitioner (Bronze Level) exam Act as a team member or Tripod facilitator on an incident investigation Plan and schedule activities for an incident investigation Focus line of enquiry during an investigation Engage with the most relevant people at each stage of the investigation Describe the incident causation paths in terms that align with their management system Consider issues relating to leadership, worker participation and human behaviour Assess the quality of an incident report Apply the process to any type of unwanted event that should have been prevented by a management system e.g., health, safety, environment, financial, security, productivity, quality, project management etc. Combine the findings from many incidents with data from other initiatives e.g., audits and inspections, to spot trends to prioritise actions and product a single improvement plan Target Audience The course is recommended for anyone who is expected to play a role in designing, reviewing, auditing, and following your organizations OH&S management system. Successful participants will be awarded the Stitching Tripod Foundation Tripod Beta Bronze certificate. The following oil & gas company personnel will benefit from the knowledge shared in this course: CEO Team Leaders Legal, insurance and finance departments Managers (Line and Function) Maintenance Engineers Quality Assurance Engineers Process Engineers Incident Investigators (Team member & Tripod facilitator) Project Managers System Custodians Technical Authorities Key Contractor's Management Contract Managers/Holders Safety Representatives Risk Management Engineers HSE Advisors Supervisors Auditors Regulators Course Level Basic or Foundation Trainer Your expert course leader has over 30 years of experience in construction, operations and maintenance with the upstream exploration and production sector. He joined Shell International E&P in 1971 and for 28 years worked in several locations around the world. Following the Piper Alpha incident he led Shell's two year, £10M major overhaul of their permit to work system. He first made use of the Tripod Beta principles during this period and since then he has delivered over 100 Tripod Beta courses in more than 25 locations around the world. He is a Chartered Engineer, a member of the Institution of Engineering and Technology and holds a postgraduate diploma from the University of Birmingham (UK). POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations

Tripod Beta Practitioner - Bronze Level
Delivered in Internationally or OnlineFlexible Dates
£900 to £1,699

Diploma in Health and Social Care Management - Level 5 (Fast Track mode)

4.0(2)

By London School Of Business And Research

The objective of this fast track Level 5 Diploma in Health and Social Care Management qualification (accredited by OTHM) is to equip learners with the underpinning knowledge, understanding and skills required for a career in the Health and Social Care sector at a Managerial level. This fast track Level 5 Diploma in Health and Social Care Management qualification enables learners to demonstrate their skills by producing evidence from their work or training activities. Learners will acquire Care Management Skills in the Health and Social Care sector. Key Highlights of this fast track Level 5 Diploma in Health and Social Care Management qualification are: Program Duration: 6 Months (Regular 9 month duration also available) Program Credits: 120 Designed for working Professionals Format: Online No Written Exam. The Assessment is done via Submission of Assignment Tutor Assist available Dedicated Student Success Manager Timely Doubt Resolution Regular Networking Events with Industry Professionals Direct entry into Year 1 of a three-year UK Bachelor's degree LSBR Alumni Status No Cost EMI Option Who is this course for? Working Professionals, A-Level / Level 4 / Year 1 of a three-year UK Bachelor's degree holders or learners who are looking for Career Progression and a formal undergraduate qualification leading to award of degrees in future. Requirements For entry onto the OTHM Level 5 Diploma in Health and Social Care Management qualification, learners must possess: Relevant NQF / QCF / RQF Level 4 diploma or equivalent recognised qualification Learner must be 18 years or older at the beginning of the course Mature learners (over 21) with management experience (learners must check with Admission Counsellors at LSBR regarding this experience prior to registering for the programme) Career path Completion of your fast track Level 3 Diploma in Health and Social Care qualification will meet the University standard academic entry requirements. However, each applicant will be subject to individual assessment and other entry requirements which may affect university entry. Certificates Certificate of Achievement Digital certificate - Included Once you complete the course, you would be receiving a digital copy of your Diploma along with its Transcript which can be downloaded from the awarding body website without any additional charge. You can also order Hard copy certificate by paying a nominal cost directly to the awarding body.

Diploma in Health and Social Care Management - Level 5 (Fast Track mode)
Delivered Online On Demand
£1,599

Qualifi Level 5 Diploma In Business Management (Fast Track mode)

4.0(2)

By London School Of Business And Research

This Qualifi Level 5 Diploma In Business Management (Fast Track mode) qualification deals with complex and challenging organisational issues and opportunities. The units are closely linked to current day real world and work challenges and the Qualification will test and develop student's workplace experience and abilities. The Qualifi Level 5 Diploma In Business Management (Fast Track mode) qualification will require learners to make judgments and provide creative and practical solutions and ways of responding to organisational challenges and problems. An action based approach will be sought and learners who have strong motivation to progress in their chosen career and business pathway will gain significantly from the qualification. Key Highlights of fast track Qualifi Level 5 Diploma In Business Management qualification are: Program Duration: 6 Months (Regular 9 months duration course also available) Program Credits: 120 Designed for working Professionals Format: Online No Written Exam. The Assessment is done via Submission of Assignment Tutor Assist available Dedicated Student Success Manager Timely Doubt Resolution Regular Networking Events with Industry Professionals Become eligible to gain direct entry into relevant Undergraduate degree programme. Alumni Status No Cost EMI Option Requirements This course qualifications has been designed to be accessible without artificial barriers that restrict access and progression. Learners will be expected to hold the following: Learners who have demonstrated some ability and possess Qualifications at Level 4 or an equivalent international qualification OR learners may have a first degree in another discipline and want to develop their own business or shift careers OR work experience in a business environment and demonstrate ambition with clear career goals; Level 5 qualification in another discipline and want to develop their careers in management. Career path Learners completing the Qualifi Level 5 Diploma In Business Management (Fast Track mode) can progress to: The Final year of an Undergraduate Degree, or Level 6 Diploma qualifications (click here to view) Directly into employment in an associated profession. Certificates Certificate of Achievement Hard copy certificate - Included Qualifi courses: Once you complete the course, you would be receiving a Physical hard copy of your Diploma along with its Transcript which we would Courier to your address via DHL or Royal Mail without any additional charge.

Qualifi Level 5 Diploma In Business Management (Fast Track mode)
Delivered Online On Demand
£1,599

Seismic Interpretation in Carbonates

By EnergyEdge - Training for a Sustainable Energy Future

Explore the complexities of seismic interpretation in carbonates through our dynamic classroom training course. Energyedge delivers cutting-edge instruction and valuable insights.

Seismic Interpretation in Carbonates
Delivered in Internationally or OnlineFlexible Dates
£3,499 to £3,599

VMware Horizon: Deploy and Manage [V8.8]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Tier 1 Operators, administrators, and architects for VMware Horizon Overview By the end of the course, you should be able to meet the following objectives: Recognize the features and benefits of VMware Horizon Define a use case for your virtual desktop and application infrastructure Use vSphere to create VMs to be used as desktops for VMware Horizon Create and optimize Windows VMs to create VMware Horizon desktops Install and Configure Horizon Agent on a VMware Horizon desktop Configure, manage, and entitle desktop pools of full VMs Configure and manage the VMware Horizon Client systems and connect the client to a VMware Horizon desktop Configure, manage, and entitle pools of instant-clone desktops Create and use Remote Desktop Services (RDS) desktops and application pools Monitor the VMware Horizon environment using the VMware Horizon Console Dashboard and Horizon Help Desk Tool Identify VMware Horizon Connection Server installation, architecture, and requirements Describe the authentication and certificate options for the VMware Horizon environment Recognize the integration process and benefits of Workspace ONE Access™ and Horizon 8 Compare the remote display protocols that are available in VMware Horizon Describe the 3D rendering options available in Horizon 8 Discuss scalability options available in Horizon 8 Describe different security options for the Horizon environment This five-day course gives you the hands-on skills to deliver virtual desktops and applications through a single virtual desktop infrastructure platform. You build on your skills in configuring and managing VMware Horizon© 8 through a combination of lecture and hands-on labs. You learn how to configure and deploy pools of virtual machines and how to provide a customized desktop environment to end-users. Additionally, you learn how to install and configure a virtual desktop infrastructure platform. You learn how to install and configure VMware Horizon© Connection Server?, VMware Unified Access Gateway?, how to configure a load balancer for use with Horizon, and how to establish Cloud Pod Architecture. Course Introduction Introductions and course logistics Course objectives Introduction to VMware Horizon Recognize the features and benefits of Horizon Describe the conceptual and logical architecture of Horizon Introduction to Use Case Convert customer requirements to use-case attributes Define a use case for your virtual desktop and application infrastructure vSphere for VMware Horizon Explain basic virtualization concepts Use VMware vSphere© Client? to access your VMware vCenter System and VMware ESXi? hosts Create a Windows virtual machine using vSphere Create Windows Desktops Outline the steps to install Horizon Agent on Windows virtual machines Install Horizon Agent on a Windows virtual Machine Optimize and prepare Windows virtual machines to set up Horizon desktop VMs Create Linux Desktops Create a Linux VM for Horizon Install Horizon Agent on a Linux virtual machine Optimize and prepare Linux virtual machines to set up Horizon desktop VMs Creating and Managing Desktop Pools Identify the steps to set up a template for desktop pool deployment List the steps to add desktops to the VMware Horizon© Connection Server? inventory Compare dedicated-assignment and floating-assignment pools Outline the steps to create an automated pool Define user entitlement Explain the hierarchy of global, pool-level, and user-level policies VMware Horizon Client Options Describe the different clients and their benefits Access the Horizon desktop using various Horizon clients and HTML Configure integrated printing, USB redirection, and the shared folders option Configure session collaboration and media optimization for Microsoft Teams Creating and Managing Instant-Clone Desktop Pools List the advantages of instant clones Explain the provisioning technology used for instant clone desktop pools Set up an automated pool of instant clones Push updated images to instant clone desktop pools Creating RDS Desktop and Application Pools Explain the difference between an RDS desktop pool and an automated pool Compare and contrast an RDS session host pool, a farm, and an application pool Create an RDS desktop pool and an application pool Access RDS desktops and application from Horizon Client Use the instant clone technology to automate the build-out of Remote Desktop Session Host farms Configure load-balancing for RDSHs on a farm Monitoring VMware Horizon Monitor the status of the Horizon components using the Horizon Administrator console dashboard Monitor desktop sessions using the HelpDesk tool Monitor the performance of the remote desktop using the Horizon Performance Tracker Horizon Connection Server Recognize the VMware Horizon reference architecture Identify the Horizon Connection Server supported features Identify the recommended system requirements for Horizon Connection Server Configure the Horizon event database Outline the steps for the initial configuration of Horizon Connection Server Discuss the AD LDS database as a critical {an important component?} component of the Horizon Connection Server installation Horizon Protocols Compare the remote display protocols that are available in VMware Horizon Describe the BLAST Display Protocol Codecs Summarize the BLAST Codec options List the ideal applications for each BLAST codec Describe the BLAST and PCoIP ADMX GPO common configurations Graphics in Horizon Describe the 3D rendering options available in Horizon 8 Compare vSGA and vDGA List the steps to configure graphics cards for use in a Horizon environment Securing Connections: Network Compare tunnels and direct connections for client access to desktops Discuss the benefits of using Unified Access Gateway List the Unified Access Gateway firewall rules Configure TLS certificates in Horizon Securing Connections: Authentication Compare the authentication options that Horizon Connection Server supports Restrict access to the Horizon remote desktops using restricted entitlements Describe the smart card authentication methods that Horizon Connection Server supports Explain the purpose of permissions, roles, and privileges in VMware Horizon Create custom roles Horizon Scalability Describe the purpose of a replica connection server Explain how multiple Horizon Connection Server instances in a pod maintain synchronization List the steps to configure graphics cards for use in a Horizon environment Configure a load balancer for use in a Horizon environment Explain Horizon Cloud Pod Architecture LDAP replication. Explain Horizon Cloud Pod Architecture scalability options Horizon Cloud and Universal Broker Recognize the features and benefits of Horizon Cloud Service Use Universal broker to connect to a Horizon Cloud instance Configure and pair the Horizon Cloud Connector appliance with Horizon Connection Server Workspace ONE Access and Virtual Application Management Recognize the features and benefits of Workspace ONE Access Explain identity management in Workspace ONE Access Explain access management in Workspace ONE Access Describe the requirements to install and configure True SSO in a Horizon environment Describe the Workspace ONE Access directory integration Deploy virtual applications with Workspace services Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Horizon: Deploy and Manage [V8.8] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Horizon: Deploy and Manage [V8.8] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware Horizon: Deploy and Manage [V8.8]
Delivered OnlineFlexible Dates
£4,250

15th July Marilia Savvides #Agent121. Looking for: ADULT FICTION

5.0(3)

By I Am In Print

LOOKING FOR: ADULT FICTION Marilia Savvides founded The Plot Agency in 2024. She began her career in publishing at Peters Fraser and Dunlop, where she spent eight years, first as International Rights Agent, and later as Literary Agent, building her own list of authors. In 2019, she joined 42MP, where she worked as Literary Agent for four years, helping to launch and set up the Book Division. She is particularly interested in fiction that is beautifully written and cleverly constructed, but still accessible to a wide readership. She is often drawn to darker tales that weave together excellent characters and an impossible-to-put-down story, from immersive book club novels with a splash of suspense, crime and thrillers, accessible horror, and speculative, genre-bending or dystopian stories. She also adores smart, witty contemporary rom-com in the style of Emily Henry. In the thriller, crime and mystery space she is interested in most areas, except military thrillers and organised crime/ mafia / mob stories. Big hooks and clever set ups are a big bonus! She adores Karin Slaughter (especially her standalone novels) and Gillian Flynn. In the book club / reading group space, she’s particularly drawn to fiction in the vein of Jodi Picoult, Liane Moriarty and Celeste Ng, and absolutely fell in love with Bright Young Women by Jessica Knoll, both for the incredible voice, and the exquisite use of structure and time. Complicated family dynamics, empathetic and smart approaches to controversial issues, stand out protagonists (like Elizabeth Zott in Lessons in Chemistry or Bernadette in Where D’You Go Bernadette), long buried secrets, complicity, the road to justice, and impossible decisions, are all themes she finds herself drawn to. In the horror space, she’s a sucker for amazing female-centric stories in the vein of Yellowjackets, and the kind of contemporary, accessible horror that Stephen King always nails. She wants to get lost in a world that feels within reach of ours. In the speculative and dystopian spaces, she’s interested in genius ideas that set up big questions or reflect the most broken (and sometimes hidden) parts of society. She loves Octavia Butler, Margaret Atwood, George Orwell, and also adored The Leftovers, Station Eleven, Wanderers, and The Power. The what-ifs of life and fiction fascinate her. In the grounded sci-fi space, she’d love to find a smart, immersive, and accessible story like The Martian. She doesn’t represent fantasy or romantasy. In regards to sci-fi, unless it’s very grounded and has crossover potential to a mainstream audience, it’s not for her. In the romance space, she’s particularly drawn to smart, complex and witty characters, where the chemistry is jumping off the page. She loves contemporary settings and all the tropes, though the voice and characters must come first to make the reading experience fully immersive. She wants to be cackling, and rooting for the characters with all her heart. She is very hands-on editorially, and loves working with her authors to shape their manuscripts, and brainstorm ideas. The best part of the job is discovering debut authors, and helping them find a home for their books. Marilia would like you to submit a covering letter, 1 - 2 page synopsis and the first 5,000 words of your manuscript in a single Word document.  (In addition to the paid sessions, Marilia is kindly offering one free session for low income/underrepresented writers. Please email agent121@iaminprint.co.uk to apply, outlining your case for this option which is offered at the discretion of I Am In Print).  By booking you understand you need to conduct an internet connection test with I Am In Print prior to the event. You also agree to email your material in one document to reach I Am In Print by the stated submission deadline and note that I Am In Print take no responsibility for the advice received during your agent meeting. The submission deadline is: Tuesday 8th July 2025

15th July Marilia Savvides #Agent121. Looking for: ADULT FICTION
Delivered Online + more
£72

Being an IT Business Partner - BCS Practitioner Certificate

5.0(12)

By Duco Digital Training

This Level 4 course aims to equip professionals with the knowledge about the skills and practical behaviours which are required for them to step into a leadership/management role. The demand for management roles is expected to grow in the coming years. This is due to a number of factors, including: The ageing population, which is leading to a shortage of skilled workers. The increasing complexity of businesses requires more managers to oversee operations. The growing importance of technology is creating new opportunities for managers to lead and innovate.

Being an IT Business Partner - BCS Practitioner Certificate
Delivered OnlineFlexible Dates
£2,500