• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

26330 Courses in Liverpool delivered Online

AN110 IBM Power Systems for AIX I - LPAR Configuration and Planning

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This is an intermediate course for architects, system integrators, security administrators, network administrators, software engineers, technical support individuals, and IBM Business Partners who implement LPARs on IBM Power Systems. Overview Describe important concepts associated with managing POWER7 processor-based systems, such as Logical partitioning (LPAR), dynamic partitioning, virtual devices, virtual processors, virtual consoles, virtual Local Area Network (VLAN), and shared processors Describe the features of the PowerVM Editions. Use the System Planning Tool to plan an LPAR configuration Describe the functions of the HMC Configure and manage the HMC, including users and permissions, software, startup and shutdown, remote access features, network configuration, security features, HMC backup and restore options, and the HMC reload procedure Describe the rules associated with allocating resources, including dedicated processors, processing units for Micro-Partitions, memory, physical I/O for AIX and Linux partitions Configure and manage LPARs using the HMC Graphical User Interface (GUI) and HMC commands Interpret physical and AIX location codes and relate to the key hardware components Power on and power off the POWER7 system Use the HMC to back up and restore partition data In this course, students will learn the skills needed to become an effective administrator on IBM's POWER7-based systems that support Logical Partitioning (LPAR). Day 1 Introduction to partitioning Hardware system overview Hardware Management Console Day 2 Hardware Management Console (cont.) System Planning Tool HMC and managed system maintenance System power management Planning and configuring logical partitions Day 3 Planning and configuring logical partitions (cont.) Partition operations Dynamic resource allocation Exercise 9 Additional course details: Nexus Humans AN110 IBM Power Systems for AIX I - LPAR Configuration and Planning training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AN110 IBM Power Systems for AIX I - LPAR Configuration and Planning course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

AN110 IBM Power Systems for AIX I - LPAR Configuration and Planning
Delivered OnlineFlexible Dates
Price on Enquiry

Advanced sales skills (In-House)

By The In House Training Company

Do you hear yourself saying the same thing over and over again? Do you want to bring some new skills to your role? If you have been in a sales role for some time it is easy to fall into a comfortable pattern. This workshop will help you incorporate advanced techniques drawn from NLP, behavioural science and social psychology into your existing skills. This course will help you: Use the consultative sales process to achieve more cross-sales Employ advanced rapport-building skills Assess the buying preferences of a customer Articulate the link between customer goals and needs Identify your customer's needs and wants Use advanced questioning techniques to gather information Resist the temptation to tell when it would be better to ask Identify communication preferences Given various scenarios, present a product to the explicit need of a customer Appreciate the impact of the language used during this stage of the sale and decide what language is appropriate with a variety of customers Handle objections positively Close the sale or gain commitment to further action 1 Introduction Aims and objectives of the training Personal introductions and objectives Self-assessment of existing sales skills Overview of content 2 Understanding yourself and your customers Personal communication style and what this means in a sales situation Wants versus needs What motivates people to buy Using social media tools such as LinkedIn Managing your portfolio to maximise sales Preparing to sell 3 The sales process Overview of the consultative sales process Review personal strengths and weaknesses as a salesperson Habits of top-performing sales people Common pitfalls Articulate sales goals 4 Building rapport 11 decisions that customers make in the first 9 seconds Spotting buyer communication preferences Building rapport with a wide variety of customers Dealing with emotions Keeping control 5 Questioning and listening Assumptions and how they trip us up Structured questioning Looking for cross-sales Honing your listening skills Identifying buyers' motivation Using summaries to move the customer forward 6 Presenting products and services to customers Choosing the right time to present Using features, advantages and benefits Tailoring your presentation of products and services to match buyer preferences and motivations 7 Gaining commitment When to close Dealing with difficult customers 5 things to avoid when handling a customer objection 8 Managing your business The link between service and sales Using customer surveys Winning back lost business 9 Putting it all together Skills practice Personal learning summary and action plans

Advanced sales skills (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry

Networking skills for sales professionals (In-House)

By The In House Training Company

Many people have a misconception about networking events, and lose out on new business opportunities as a result. They either don't appreciate the real benefits and techniques of networking and don't attend events, or they attempt to 'sell on the first date', causing resentment. You can either attempt to make a sale for a quick buck (which is particularly likely to backfire at a networking event), or you can try to open a long-term relationship, creating new opportunities and a high lifetime value customer (which is how it's meant to be done). Networking, when done properly, is an excellent tool for referrals. But you have to appreciate that it's done on the basis of giving rather than receiving and this doesn't always come naturally to sales professionals. The old saying that it's about getting to 'know, like and trust' is still true. This workshop is about having your prospects and customers getting to know, like and trust you, and building that lifetime value as a result. By the end of this programme, participants will be able to: Understand what networking is - networking etiquette Know how and where to network Clarify their objectives - why network Use the 4 basic questions to start a conversation Build rapport quickly and easily Answer the question 'What do you do?' effectively in a few seconds Deliver a 60-second pitch Break into a group Prepare for a network meeting Identify opportunities Use tools to assist in networking 1 Introduction Aims and objectives 2 What is networking? Why network - objectives and goal setting Networking etiquette Preparation - online and offline tools to use Identify networking opportunities - where to network Know what you have to offer 'Know, like and trust' - the process 3 What do you do? Answer in 5-10 seconds Create and deliver a 60-second pitch Who is your target market? 4 Starting a conversation Breaking into a group Building rapport The 4 questions to start a conversation Moving on 5 Communicate and engage LISTEN - 4 types of listening skill Ask powerful questions Influence - don't sell What can you do to help others - give to get 6 Power of referrals Who can give you referrals? When to give or ask for referrals Have a referral system Showing appreciation 7 Social media and other online tools Using LinkedIn and other social media Online directories 8 Next steps Following up Arranging one-to-one meetings Developing relationships

Networking skills for sales professionals (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry

TW108G IBM Security Verify Access Foundations

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is designed for system administrators and implementors interested in learning IBM Security Verify Access. Overview Describe IBM Security Verify Access product and its key features Discuss the architecture and deployment process Configure IBM Security Verify Access users, groups, and domains Introduce concepts of a reverse proxy and how it fits in your web-based infrastructure Describe protected object space and the policy access control model Explain how to set up reverse proxy junctions to handle web requests Discuss and configure authentication mechanisms that are supported by Verify Access Explain and set up logging, auditing, and tracing for Verify Access components IBM Security Verify Access helps you simplify your users' access while more securely adopting web, mobile, IoT, and cloud technologies. It can be deployed on premises, in a virtual or hardware appliance, or containerized with Docker. Verify Access also directly connects with Verify SaaS for a modernized, hybrid IAM approach to enable your organization's migration to identity as a service (IDaaS) at a comfortable pace. Using the skills taught in this course, you learn how to run Verify Access via Docker, configure authentication and authorization mechanisms, implement policy access control, and set up reverse proxy junctions to process web requests. Hands-on exercises reinforce the skills learned. Unit 1 Introduction to IBM Security Verify Access Unit 2 Architecture and deployment Unit 3 Managing users, groups, and domains Unit 4 Reverse Proxy (WebSEAL) concepts Unit 5 Managing access control Unit 6 Configuring junctions for back-end resources Unit 7 Authentication framework and methods Unit 8 Logging, auditing, and tracing Additional course details: Nexus Humans TW108G IBM Security Verify Access Foundations training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the TW108G IBM Security Verify Access Foundations course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

TW108G IBM Security Verify Access Foundations
Delivered OnlineFlexible Dates
Price on Enquiry

Building Web Applications With TypeScript, Angular, and React

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course is for web developers who are well-versed in JavaScript and want to take their TypeScript knowledge to the next level. No prior TypeScript knowledge is required. Overview By completing this course, you will be able to build interesting TypeScript projects. This course will take your current TypeScript knowledge to the next level. Here are the important topics that this course will cover: - Learn the fundamentals of TypeScript - Build a weather forecast widget with Angular - Create building a note-taking client/server application using Angular, Node.js, and MongoDB - Create a real-time chat application with React In this course, you will begin by learning the fundamentals of TypeScript and then move toward advanced concepts. Then, learn how TypeScript relates to JavaScript that you may have written before. and understand the benefits of TypeScript and how it can help you avoid software defects. You will also learn to use type guards, check null and undefined, create tagged union types, and compare the performance of algorithms. Additionally, you will use TypeScript to build a weather forecast widget with Angular and then progress by building a note-taking client/server application using Angular, Node.js, and MongoDB, and finally create a real-time chat application with React. TypeScript Fundamentals Introduction to TypeScript Type Checking Advanced Type Analysis Features Comparing Performance of Algorithms Building a Weather Forecast Widget with Angular 4 Using Modules Creating the First Component Using the Component in Other Components Using the Main Component Note-Taking Client/Server App Setting up the Server Integrating with MongoDB Creating the Client Side with Angular Real-Time Chat Setting up the Project Writing the Server Creating the Chat Room Additional course details: Nexus Humans Building Web Applications With TypeScript, Angular, and React training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Building Web Applications With TypeScript, Angular, and React course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Building Web Applications With TypeScript, Angular, and React
Delivered OnlineFlexible Dates
Price on Enquiry

Symantec Endpoint Protection 12.X - Install, Configure, And Deploy

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is for network managers, resellers, systems administrators, client security administrators, systems professionals, and consultants who are charged with the installation, configuration, and day-to-day management of Symantec Endpoint Protection in a variety of network environments, and who are responsible for troubleshooting and tuning the performance of this product in the enterprise environment. Overview At the completion of the course, you will be able to: Describe Symantec Endpoint Protection products, components, dependencies, and system hierarchy. Install and configure Symantec Endpoint Protection management and client components. Deploy Symantec Endpoint Protection Windows, Windows Embedded, Mac and Linux clients. Manage the client user interface. Manage content updates for Windows, Mac, and Linux. Perform server and database management. Configure replication and load balancing. Design a Symantec Endpoint Protection environment. This course is designed for the network, IT security, and systems administration professional tasked with architecting and implementing Symantec Endpoint Protection. Introduction Course overview The classroom lab environment Symantec Endpoint Protection Product Solution Why use Symantec Endpoint Protection? Symantec Endpoint Protection technologies Symantec Endpoint Protection services Symantec Endpoint Protection components Symantec Endpoint Protection policies and concepts Extending Symantec Endpoint Protection Installing the Symantec Endpoint Protection Manager Identifying system requirements Preparing servers for installation Installing and configuring the Symantec Endpoint Protection Manager Describing Symantec Endpoint Protection upgrades and version compatibility Configuring the Symantec Endpoint Protection Environment Starting and navigating the SEPM Describing policy types and components Console authentication Licensing the SEP environment Deploying Windows and Windows Embedded Clients Planning the client deployment Configuring client deployment package Deploying packages to clients Maintaining the client environment Upgrading Symantec Endpoint Protection clients Deploying Mac and Linux Clients Linux prerequisites Linux deployment Mac prerequisites Mac deployment Client and Policy Management Describing SEPM and client communications Administering clients Configuring groups Configuring locations Active Directory integration with SEP 12.1 Client configuration modes Configuring domains General client settings and Tamper Protection Configuring Content Updates for Windows Clients Introducing LiveUpdate Configuring the SEPM for LiveUpdate Configuring the LiveUpdate Settings and Content policies Configuring multiple group update providers (GUPs) Manually updating virus definitions Configuring Content Updates for Mac and Linux Clients Describing content update methods Configuring the LiveUpdate policy Configuring the SEPM as a reverse proxy Monitoring updates Performing Server and Database Management Managing SEPM servers Maintaining server security Communicating with other servers Managing administrators Managing the database Disaster recovery techniques Configuring Replication and Failover and Load Balancing About sites and replication How replication works Symantec Endpoint Protection replication scenarios Configuring replication Failover and load balancing Designing a Symantec Endpoint Environment Architecture components Architecture constraints Component placement Content delivery Determining client to SEPM ratios SEPM and database sizing best practices

Symantec Endpoint Protection 12.X - Install, Configure, And Deploy
Delivered OnlineFlexible Dates
Price on Enquiry

Microsoft Access for Office 365 (Desktop or Online) - Part 2

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course is designed for students wishing to gain intermediate-level skills or individuals whose job responsibilities include constructing relational databases and developing tables, queries, forms, and reports in Microsoft Access for Office 365. Overview In this course, you will optimize an Access database. You will: Provide input validation features to promote the entry of quality data into a database. Organize a database for efficiency and performance, and to maintain data integrity. Improve the usability of Access tables. Create advanced queries to join and summarize data. Use advanced formatting and controls to improve form presentation. Use advanced formatting and calculated fields to improve reports. In this course, you will expand your knowledge of relational database design; promote quality input from users; improve database efficiency and promote data integrity; and implement advanced features in tables, queries, forms, and reports. Extending your knowledge of Access will result in a robust, functional database for your users.This course covers Microsoft Office Specialist Program exam objectives to help you prepare for the Access Expert (Office 365 and Office 2019): Exam MO-500 certification. Improving Table Usability Topic A: Create Lookups Within a Table Topic B: Work with Subdatasheets Creating Advanced Queries Topic A: Create Query Joins Topic B: Create Subqueries Topic C: Summarize Data Improving Form Presentation Topic A: Apply Conditional Formatting Topic B: Create Tab Pages with Subforms and Other Controls Creating Advanced Reports Topic A: Apply Advanced Formatting to a Report Topic B: Add a Calculated Field to a Report Topic C: Control Pagination and Print Quality Topic D: Add a Chart to a Report Importing and Exporting Table Data Topic A: Import and Link Data Topic B: Export Data Topic C: Create a Mail Merge Using Queries to Manage Data Topic A: Create Action Queries Topic B: Create Unmatched and Duplicate Queries Creating Complex Reports and Forms Topic A: Create Subreports Topic B: Create a Navigation Form Topic C: Show Details in Subforms and Popup Forms Creating Access Macros Topic A: Create a Standalone Macro to Automate Repetitive Tasks Topic B: Create a Macro to Program a User Interface Component Topic C: Filter Records by Using a Condition Topic D: Create a Data Macro Using VBA to Extend Database Capabilities Topic A: Introduction to VBA Topic B: Using VBA with Form Controls Managing a Database Topic A: Back Up a Database Topic B: Manage Performance Issues Topic C: Document a Database Distributing and Securing a Database Topic A: Split a Database for Multiple-User Access Topic B: Implement Security Topic C: Convert an Access Database to an ACCDE File Topic D: Package a Database with a Digital Signature

Microsoft Access for Office 365 (Desktop or Online) - Part 2
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco NX-OS for IOS Administrators v2.0 (DCNXA)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Network, systems, and consulting systems engineers Network designers, administrators, and managers Overview Upon completing this course, students will be able to meet these objectives: Describe the differences between the Cisco IOS and NX-OS operating systems. Describe the features and functionality of the Cisco NX-OS. Describe how the Cisco NX-OS is used for functionality specific to different Cisco Nexus switching platforms, such as the 7000-series, 5000-series, and 1000-series switches. Understand basic and advanced configurations of the Cisco Nexus 7000-series, 5000-series, and 1000-series switches using the NX-OS. Understand basic and advanced configurations of the Cisco Virtual Security Gateway. Understand troubleshooting techniques for the Cisco Nexus 7000-series, 5000-series, and 1000-series switches using the NX-OS. This course is designed for network administrators who are migrating from a traditional Cisco IOS environment to routing and switching platforms that use the Nexus Operating System (NX-OS). The Cisco NX-OS Introduction to the Cisco NX-OS Operational Differences between the Cisco IOS and NX-OS Basic Configuration of Cisco Nexus Switches using NX-OS Initial Configuration of the Cisco Nexus switches Configuring Basic Layer 2 Features using the NX-OS Basic Layer 3 Features using the NX-OS Advanced Configuration of Cisco Nexus Switches using NX-OS Advanced Layer 2 Features of Cisco Nexus switches Advanced Layer 3 Features of Cisco Nexus switches Integrating the Nexus 1000v with the VMware vCenter Server Configuring Cisco NX-OS on the Virtual Security Gateway Troubleshooting Cisco NX-OS Configuration Issues Understanding High Availability (HA) Feature of the Cisco NX-OS Basic Troubleshooting Techniques Advanced Troubleshooting Techniques Additional course details: Nexus Humans Cisco NX-OS for IOS Administrators v2.0 (DCNXA) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco NX-OS for IOS Administrators v2.0 (DCNXA) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco NX-OS for IOS Administrators v2.0 (DCNXA)
Delivered OnlineFlexible Dates
Price on Enquiry

ICM-MXSA-CT-Installing and Configuring Meraki MX Security Appliances

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for The primary audience for this course is as follows: IT Staff and Managers Network and systems personnel and engineers Small to mid-sized organizations that require fundamental knowledge on networking terms/concepts and configuration guidance for Meraki equipment. This also includes organizations looking to implement remote sites, provide a guest wireless solution, and collect user analytics. Overview Following completion of this course, students will understand, Install, Configure, monitor, and Troubleshoot the following: Navigate and Configure the dashboard Add MX/MR/MS/MV devices to the Dashboard Understand and Configure Configuration Templates Understand and Configure Group Policies Manage/Configure/Integrate Users and Radius Policies Configure, Monitor, and Troubleshoot MX Firewalls Troubleshoot devices and Connectivity This 3-day Cisco course provide students with the skills to configure, optimize, and troubleshoot a Cisco Meraki solution. Students will learn how to install and optimize Meraki MX Firewalls. Students will also learn how to configure the Meraki Dashboard Students will troubleshoot and configure the Meraki environment and learn how to diagnose and resolve user and Network issues that may arise. Introduction to Meraki The Meraki Mission Cisco Meraki: Bringing the Cloud to Enterprise Networks Cloud-Managed Networking Architecture Benefits of a Cloud-Based Solution The Meraki Full Stack: New and Unique Value Proposition Meraki Deployment ? How it works Why Customers Choose Meraki Meraki MS Switches Overview Meraki MX Security Appliances Overview Meraki SD-WAN Overview Meraki MR Wireless Access Points Overview Cisco Meraki Systems Manager Overview Cisco Meraki MV Vision Security Cameras Overview Meraki API Overview Meraki Licensing Enterprise Support Cisco Meraki Documentation Cloud Management with the Meraki Dashboard The Meraki Dashboard Dashboard: Organizational Structure Out-of-band Cloud Management Loss of Connectivity to the Cisco Meraki Cloud Meraki Dashboard Logins Create Dashboard Accounts and Organization MSP Logins - Manage Multiple Organizations Modify an Organization View Organizations Health Meraki Dashboard Best Practices Dashboard Search Meraki Help Organizational Wide Settings Configure Monitor Create and Manage Configuration Templates Network-Wide Settings Configure Meraki MX Security Benefits of a Cloud Managed Security Solution Threat Management Solution Advanced Security Licenses Reliable, Cost Effective Connectivity with Meraki SD-WAN Site-to-Site VPN (Auto VPN) High Availability and Path Redundancy Application-Aware Intelligent Path Control Traffic Monitoring and Analytics Integrating Active Directory Cisco Meraki MX Models and Features Configuring the Local Status Page Adding Appliance to Network Device Configuration Configuring the Warm Spare Feature Device Tags & Notes Configuring Addressing & VLANs DHCP Server Configuration and Options Meraki Firewall Configuration Meraki Site-to-Site VPN One Arm VPN Concentrator Configuration Meraki Client VPN Meraki Active Directory Integration Meraki Access Control Meraki Splash Page Configuration Configuring Access Policies Teleworker VPN/L3 Roaming

ICM-MXSA-CT-Installing and Configuring Meraki MX Security Appliances
Delivered OnlineFlexible Dates
Price on Enquiry

ES52 IBM z/OS REXX Programming Workshop

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This is an intermediate course for people who need to write and maintain Rexx programs in the z/OS system environment. Overview The objectives of this course are as follows:- Write programs using the Rexx language- Use various data parsing techniques- Use built-in Rexx functions- Create user-defined internal and external functions and subroutines- Issue host commands from within Rexx execs- Code programs that read and write data sets- Use instructions and commands that manipulate the data stack- Use Rexx debugging tools- Write error-handling routines This course is designed to teach you the basic skills required to write programs using the REXX language in z/OS. The course covers the TSO extensions to REXX and interaction with other environments such as the MVS console. Day 1 Unit 1 - Introduction Unit 2 - Getting started with REXX (start) Lab exercise 1 Unit 2 - Getting started with REXX (finish) Lab exercise 2 Unit 3 - Programming in REXX (start) Day 2 Lab exercise 3 Unit 3 - Programming in REXX (finish) Lab exercise 4 Unit 4 - Functions and subroutines (start) Lab exercise 5 Day 3 Unit 4 - Functions and subroutines (finish) Lab exercise 6 Unit 5 - Debugging and error handling Lab exercise 7 Unit 6 - Executing host commands Lab exercise 8 Day 4 Unit 7 - Compound variables and the data stack Lab exercise 9 Unit 8 - Reading and writing data sets in REXX Lab exercise 10 Unit 9 - The parse instruction Day 5 Lab exercise 11 Unit 10 - Using REXX: REXX compiler, REXX in batch, MVS console commands Lab exercise 12 Additional course details: Nexus Humans ES52 IBM z/OS REXX Programming Workshop training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the ES52 IBM z/OS REXX Programming Workshop course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

ES52 IBM z/OS REXX Programming Workshop
Delivered OnlineFlexible Dates
Price on Enquiry