Duration 2 Days 12 CPD hours This course is intended for vSphere administrators, architects, system engineers, and systems integrators who are responsible for the deployment or management of Site Recovery Manager Overview By the end of the course, you should be able to meet the following objectives: Summarize the components of Site Recovery Manager architecture Deploy and configure the Site Recovery Manager appliance Describe the principal disaster recovery topologies that are used with Site Recovery Manager Configure inventory and resource mappings Describe the storage replication options that are used with Site Recovery Manager Configure Site Recovery Manager to leverage array-based replication Describe VMware vSphere Replication⢠functionality Describe the vSphere Replication architecture Deploy and configure vSphere Replication for use with Site Recovery Manager Build Site Recovery Manager array-based protection groups, protection groups based on vSphere Replication, and Virtual Volumes protection groups. Build, edit, execute, test, and remove a recovery plan Perform a planned migration This two-day, hands-on training course gives experienced VMware vSphere© administrators the knowledge to install, configure, and manage VMware Site Recovery Manager? 8.6. This course also shows you how to write and test disaster recovery plans that use Site Recovery Manager. Course Introduction Introductions and course logistics Course objectives Site Recovery Manager Architecture Describe Site Recovery Manager architecture Identify disaster recovery options with Site Recovery Manager Evaluate how Site Recovery Manager integrates with VMware products Describe Site Recovery Manager licensing options List the disaster recovery topologies supported by Site Recovery Manager Describe how VMware Site Recovery for VMware Cloud on AWS integrates with Site Recovery Manager Deploying and Configuring Site Recovery Manager Identify the vSphere and vCenter Server requirements for deploying Site Recovery Manager Define Site Recovery Manager virtual appliance system requirements Deploy the Site Recovery Manager appliance Navigate the Site Recovery Manager configuration UI Describe the process for registering Site Recovery Manager with vCenter Server Describe how to start and stop services in Site Recovery Manager Identify ways to perform updates to the Site Recovery Manager appliance Describe the options for accessing the Site Recovery Manager Describe the process for configuring site pairing Describe how to import and export Site Recovery Manager configuration Navigate the Site Recovery Manager configuration UI Describe the process for registering Site Recovery Manager with vCenter Server Describe how to start and stop services in Site Recovery Manager Identify ways to perform updates to the Site Recovery Manager appliance Describe the options for accessing the Site Recovery Manager Describe the process for configuring site pairing Describe how to import and export Site Recovery Manager configuration Configuring Inventory Mappings Explain the importance of inventory mappings Identify configuration options for inventory mappings Describe the importance of placeholder virtual machines and datastores Describe the importance of the vSphere inventory changes for Site Recovery Manager operation Using Array-Based Replication Describe array-based replication Describe Storage Replication Adapters and explain their role for the array-based replication Describe the concept and configuration of array pairs Describe datastore groups and the relationship between devices and datastore groups Describe the role of consistency groups Identify the advantages of array-based replication vSphere Replication Describe Site Recovery Manager with vSphere Replication Architecture Discuss the role of vSphere Replication components Discuss use cases for vSphere Replication Discuss system requirements and operational limits of vSphere Replication Determine how to calculate bandwidth requirements for vSphere Replication Identify the advantages of vSphere Replication Deploy a vSphere Replication appliance Configure a vSphere Replication appliance and register it with vCenter Server Pair vSphere Replication appliances Deploy an additional vSphere Replication server Register a vSphere Replication server with a vSphere Replication management server Replicating VMs Using vSphere Replication Describe the replication process used by vSphere Replication List vSphere Replication replica states Describe vSphere Replication of encrypted virtual machines Describe vSphere native key provider Describe how to configure vSphere Replication Discuss vSphere Replication RPO settings Describe MPIT instances Describe additional vSphere Replication settings Describe how to disable vSphere Replication Protection Groups Define protection group functionality Examine the differences between array-based protection groups, protection groups based on vSphere Replication, and Virtual Volumes protection groups Create a protection group View a placeholder virtual machine in the inventory Configure protection for virtual machines and edit protection groups Recovery Plans Discuss recovery plan concepts Discuss network planning Discuss the organization of storage for recovery plans Describe customization options in recovery planning Describe priority groups and VM dependencies Describe how to implement a recovery plan Configure VM recovery plan properties Describe the customization of recovery plans Configure additional steps in the recovery plan Delete a recovery plan Executing Recovery Plans Discuss use cases for Site Recovery Manager Describe planned migration Identify Site Recovery Manager workflows Examine Site Recovery Manager integration with various vSphere technologies Describe how to conduct a recovery plan test Perform a recovery plan test Identify the effect on the storage layer during the test recovery steps Review the recovery plan test steps Describe how to cancel a recovery plan test and clean up after recovery plan test cancelation Explain a recovery plan execution in planned migration or disaster recovery mode Identify the recovery steps for each execution type Describe a forced recovery Explain the importance of reprotection processes and states Examine failback steps Describe how to reprotect a data center Monitoring and Troubleshooting Identify Site Recovery Manager alarm options Generate Site Recovery Manager recovery plan history reports Configure Site Recovery Manager advanced settings Identify Site Recovery Manager logs Describe the vRealize Operations management pack for Site Recovery Manager
Grief unscripted Grief Unscripted; Rebuilding after loss 2-Hour Workshop Grief isn’t a one-size-fits-all experience – it’s messy, unpredictable, and completely unique to each of us. That’s why we call it Grief Unscripted – because, just like life, there’s no script, no right way to grieve, and no timeline to follow. Whether it’s loss, change, or the unexpected twists life throws at us, this workshop provides practical strategies and holistic psychology to help us understand grief and mourning. We’ll dig deep into this messy, poignant and personal journey that affects us all, while breaking down the stigma and opening-up honest conversations. Grief deserves to be seen, heard, and supported – just like any part of the human experience. We’re breaking down the stigma around this natural, yet individual, human response. Workshop outline: Workshop outline: Understand grief as a deeply individual, yet universally shared human experience. Recognise the different forms grief can take, including anticipatory, disenfranchised, and cumulative grief Explore the influences of culture, tradition, and personal beliefs on coping and stigma Challenge misconceptions about grief and mourning, and learn to support yourself and others compassionately. Develop confidence in holding open, stigma-breaking conversations around grief and loss. Join us for Grief Unscripted – because to grieve is to be human. Let’s talk about it with compassion and courage. 2-hour workshop packages Build your own training package At Mindmaps Wellbeing, we know that every business is unique, and no team is the same. That’s why we’ve developed our range of short, specialist wellbeing and mental health themed workshops (combine workshops creating 2,4 or 6-hour sessions)—a fully flexible approach to workplace wellbeing training. Because all of our workshops are short and impactful, you can build a package that truly meets your organisation’s needs. Perhaps you’re looking to manage stress, challenge stigma, or avoid burnout? Maybe your team would benefit from some training on self-care, starting difficult conversations or coping with remote working? Or You choose the sessions that suit your team best. Why Mindmaps Wellbeing? Mindmaps Wellbeing is the trusted training provider for businesses looking to enhance workplace mental health and employee wellbeing. Our training is designed and delivered by registered Mental Health Nurses, ensuring credibility, expertise, and real-world application. Focus on culture change – Our training goes beyond theory transfer, aiming to embed lasting behavioural shifts that foster a positive, mentally healthy workplace Flexible delivery options – We offer in-person, online, and hybrid training solutions to fit your organisation’s needs Proven impact and measurable results – Our training leads to improved employee engagement, productivity, and retention Engaging and actionable – All our courses include interactive activities, case studies, and real-world applications for immediate impact Contact us for more information.
Change Happens! Reframing uncertainty in a changing world Change is inevitable — but that doesn’t mean it’s easy. Whether it’s a corporate restructure, a company merger, or the long-lasting ripple effects of a global pandemic, workplace change can stir up uncertainty, anxiety, and resistance. Our Change Happens! workshop helps teams reframe how they view change — not as a threat, but as an opportunity for growth. This interactive, evidence-based session blends psychology with practical strategies, empowering participants to navigate uncertainty with confidence, resilience, and acceptance. Change happens — but how you respond is what defines the outcome. Let’s make it a positive one. Join us for a workshop that transforms uncertainty into opportunity, and equips your team with the tools to thrive in a changing world. Workshop outline: Spotting the Signs of Change Fatigue — Recognising emotional responses and their impact on wellbeing. The Power of Reframing and Acceptance — Practical strategies to shift your mindset from fear to flexibility, and embrace acceptance when change is unavoidable. Building Personal and Team Resilience — Coping techniques that support both individual and collective wellbeing. Creating Your Change Action Plan — Simple steps to manage uncertainty and stay proactive. 2-hour workshop packages At Mindmaps Wellbeing, we know that every business is unique, and no team is the same. That’s why we’ve developed our range of short, specialist wellbeing and mental health themed workshops—a fully flexible approach to workplace training. With our selection of engaging and impactful 2-hour workshops, you can build a programme that truly meets your organisation’s needs. Whether you’re looking to manage stress, challenge stigma, or avoid burnout, you choose the sessions that suit your team best. Our training courses and workshop collection Book multiple workshops on the same day to save Why Mindmaps Wellbeing? Mindmaps Wellbeing is the trusted training provider for businesses looking to enhance workplace mental health and employee wellbeing. Our training is designed and delivered by registered Mental Health Nurses, ensuring credibility, expertise, and real-world application. Focus on culture change – Our training goes beyond theory transfer, aiming to embed lasting behavioural shifts that foster a positive, mentally healthy workplace Flexible delivery options – We offer in-person, online, and hybrid training solutions to fit your organisation’s needs Proven impact and measurable results – Our training leads to improved employee engagement, productivity, and retention Engaging and actionable – All our courses include interactive activities, case studies, and real-world applications for immediate impact Contact us for more information.
Compassion-focussed leadership is a transformative move for driving both individual and organisational performance. Long-term success comes from creating a workplace where people actually want to stay and thrive. For all leaders and managers of all levels to attend — Learn an actionable workplace wellbeing action plan that generates a real culture change to workplace wellbeing
Your first steps in Floorwork through our Smart Methodology.
Empty Spaces, Expressionless Faces. Supporting colleagues in a hybrid workplace In a world where hybrid working is becoming the norm for many people, staying connected with colleagues can feel challenging. The subtle signals we might notice in face-to-face interactions can easily be missed when working remotely. This interactive two-hour workshop explores how we can support one another, strengthen team connections, and spot the signs when someone may be struggling. Designed for anyone in a hybrid workplace, this session empowers participants to recognise the behaviours and communication patterns that might indicate a colleague is finding things difficult, and helps them to respond with empathy and support. Through thought-provoking discussions, engaging activities, and practical strategies, participants will discover new ways to foster genuine connection — both online and face-to-face — to build and sustain a supportive team culture. Workshop outline: Noticing subtle shifts in mood and behaviour within a hybrid team. Exploring practical strategies for checking in without feeling intrusive. Encouraging open conversations in both virtual and physical settings. Creating a team culture that prioritises compassion and connection. This is not a lecture — it’s an engaging, interactive experience designed to leave participants feeling more confident in their ability to spot when a colleague might need support and better equipped to take meaningful action. Join us for this impactful session and discover how small moments of connection can inspire a more supportive, resilient hybrid workplace. 2-hour workshop packages At Mindmaps Wellbeing, we know that every business is unique, and no team is the same. That’s why we’ve developed our range of short, specialist wellbeing and mental health themed workshops—a fully flexible approach to workplace training. With our selection of engaging and impactful 2-hour workshops, you can build a programme that truly meets your organisation’s needs. Whether you’re looking to manage stress, challenge stigma, or avoid burnout, you choose the sessions that suit your team best. Our training courses and workshop collection Book multiple workshops on the same day to save Why Mindmaps Wellbeing? Mindmaps Wellbeing is the trusted training provider for businesses looking to enhance workplace mental health and employee wellbeing. Our training is designed and delivered by registered Mental Health Nurses, ensuring credibility, expertise, and real-world application. Focus on culture change – Our training goes beyond theory transfer, aiming to embed lasting behavioural shifts that foster a positive, mentally healthy workplace Flexible delivery options – We offer in-person, online, and hybrid training solutions to fit your organisation’s needs Proven impact and measurable results – Our training leads to improved employee engagement, productivity, and retention Engaging and actionable – All our courses include interactive activities, case studies, and real-world applications for immediate impact Contact us for more information.
leadership management training course
‘Chronic Kidney Disease and Dialysis in Palliative Care’ by Dr Lydia Baines Lydia is one of our palliative care registrars and has been with us since August last year. She lives on the Wirral and outside of work you'll often find her training for her next Hyrox race!
Duration 5 Days 30 CPD hours This course is intended for This course is targeted towards the information technology (IT) professional that has a minimum 1 year IT Security and Networking experience. This course would be ideal for Information System Owners, Security Officers, Ethical Hackers, Information Owners, Penetration Testers, System Owner and Managers as well as Cyber Security Engineers. Overview Upon completion, the Certified Professional Ethical Hacker candidate will be able to competently take the CPEH exam. The CPEH certification training enables students to understand the importance of vulnerability assessments and how to implement counter response along with preventative measures when it comes to a network hack. Security Fundamentals Overview The Growth of Environments and Security Our Motivation? The Goal: Protecting Information! CIA Triad in Detail Approach Security Holistically Security Definitions Definitions Relationships Method: Ping The TCP/IP Stack Which Services Use Which Ports? TCP 3-Way Handshake TCP Flags Malware Types of Malware Types of Malware Cont... Types of Viruses More Malware: Spyware Trojan Horses Back Doors DoS DDoS Packet Sniffers Passive Sniffing Active Sniffing Firewalls, IDS and IPS Firewall ? First Line of Defense IDS ? Second Line of Defense IPS ? Last Line of Defense? Firewalls Firewall Types: (1) Packet Filtering Firewall Types: (2) Proxy Firewalls Firewall Types ? Circuit-Level Proxy Firewall Type of Circuit- Level Proxy ? SOCKS Firewall Types ? Application-Layer Proxy Firewall Types: (3) Stateful Firewall Types: (4) Dynamic Packet-Filtering Firewall Types: (5) Kernel Proxies Firewall Placement Firewall Architecture Types ? Screened Host Multi- or Dual-Homed Screened Subnet Wi-Fi Network Types Wi-Fi Network Types Widely Deployed Standards Standards Comparison 802.11n - MIMO Overview of Database Server Review Access Controls Overview Role of Access Control Definitions More Definitions Categories of Access Controls Physical Controls Logical Controls ?Soft? Controls Security Roles Steps to Granting Access Access Criteria Physical Access Control Mechanisms Biometric System Types Synchronous Token Asynchronous Token Device Memory Cards Smart Card Cryptographic Keys Logical Access Controls OS Access Controls Linux Access Controls Accounts and Groups Password & Shadow File Formats Accounts and Groups Linux and UNIX Permissions Set UID Programs Trust Relationships Review Protocols Protocols Overview OSI ? Application Layer OSI ? Presentation Layer OSI ? Session Layer Transport Layer OSI ? Network Layer OSI ? Data Link OSI ? Physical Layer Protocols at Each OSI Model Layer TCP/IP Suite Port and Protocol Relationship Conceptual Use of Ports UDP versus TCP Protocols ? ARP Protocols ? ICMP Network Service ? DNS SSH Security Protocol SSH Protocols ? SNMP Protocols ? SMTP Packet Sniffers Example Packet Sniffers Review Cryptography Overview Introduction Encryption Cryptographic Definitions Encryption Algorithm Implementation Symmetric Encryption Symmetric Downfalls Symmetric Algorithms Crack Times Asymmetric Encryption Public Key Cryptography Advantages Asymmetric Algorithm Disadvantages Asymmetric Algorithm Examples Key Exchange Symmetric versus Asymmetric Using the Algorithm Types Together Instructor Demonstration Hashing Common Hash Algorithms Birthday Attack Example of a Birthday Attack Generic Hash Demo Instructor Demonstration Security Issues in Hashing Hash Collisions MD5 Collision Creates Rogue Certificate Authority Hybrid Encryption Digital Signatures SSL/TLS SSL Connection Setup SSL Hybrid Encryption SSH IPSec - Network Layer Protection IPSec IPSec Public Key Infrastructure Quantum Cryptography Attack Vectors Network Attacks More Attacks (Cryptanalysis) Review Why Vulnerability Assessments? Overview What is a Vulnerability Assessment? Vulnerability Assessment Benefits of a Vulnerability Assessment What are Vulnerabilities? Security Vulnerability Life Cycle Compliance and Project Scoping The Project Overview Statement Project Overview Statement Assessing Current Network Concerns Vulnerabilities in Networks More Concerns Network Vulnerability Assessment Methodology Network Vulnerability Assessment Methodology Phase I: Data Collection Phase II: Interviews, Information Reviews, and Hands-On Investigation Phase III: Analysis Analysis cont. Risk Management Why Is Risk Management Difficult? Risk Analysis Objectives Putting Together the Team and Components What Is the Value of an Asset? Examples of Some Vulnerabilities that Are Not Always Obvious Categorizing Risks Some Examples of Types of Losses Different Approaches to Analysis Who Uses What? Qualitative Analysis Steps Quantitative Analysis ALE Values Uses ALE Example ARO Values and Their Meaning ALE Calculation Can a Purely Quantitative Analysis Be Accomplished? Comparing Cost and Benefit Countermeasure Criteria Calculating Cost/Benefit Cost of a Countermeasure Can You Get Rid of All Risk? Management?s Response to Identified Risks Liability of Actions Policy Review (Top-Down) Methodology Definitions Policy Types Policies with Different Goals Industry Best Practice Standards Components that Support the Security Policy Policy Contents When Critiquing a Policy Technical (Bottom-Up) Methodology Review Vulnerability Tools of the Trade Vulnerability Scanners Nessus SAINT ? Sample Report Tool: Retina Qualys Guard http://www.qualys.com/products/overview/ Tool: LANguard Microsoft Baseline Analyzer MBSA Scan Report Dealing with Assessment Results Patch Management Options Review Output Analysis and Reports Overview Staying Abreast: Security Alerts Vulnerability Research Sites Nessus SAINT SAINT Reports GFI Languard GFI Reports MBSA MBSA Reports Review Reconnaissance, Enumeration & Scanning Reconnaissance Overview Step One in the Hacking ?Life-Cycle? What Information is Gathered by the Hacker? Passive vs. Active Reconnaissance Footprinting Defined Social Access Social Engineering Techniques Social Networking Sites People Search Engines Internet Archive: The WayBack Machine Footprinting Tools Overview Maltego GUI Johnny.Ihackstuff.com Google (cont.) Domain Name Registration WHOIS Output DNS Databases Using Nslookup Traceroute Operation Web Server Info Tool: Netcraft Introduction to Port Scanning Which Services use Which Ports? Port Scan Tips Port Scans Shou
Following on from the Macros course look at how you can write your own Visual Basic code within Excel to fully automate tasks and save time. Course overview Duration: 2 days (13 hours) Our VBA in Excel course is an introduction to using the Visual Basic for Applications language for programming in Excel. It looks at structures, syntax and coding standards. This course is designed for existing experienced users of Excel who can record and run macros and those who have dabbled in VBA but would like some formal training and help to put some structure to their code. Objectives By the end of the course you will be able to: Write visual basic procedures Create event and general procedures Use commands from the Excel data model Use statements and functions Use a selection of debugging tools Create and use variables and constants Use different types of loops Create an Excel user form Content The VBA environment Project explorer Excel objects Modules Properties window Code window Code structure Code structure Navigating within your code Adding comments Using WITH Steps to creating a VBA procedure Procedures Sub procedures Event procedures Calling procedures The Excel data model Workbook commands Worksheet commands Excel selection methods Data manipulation commands Debugging Using breakpoints Stepping through code The immediate window The watch window The locals window points Variables and Constants Declaring variables Declaring multiple variables Variable data types Concatenation Scope of variables Constants Declaring constants Using constants Scope of constants Looping Do while loops Do until loops For next loops Conditional Statements IF statement SELECT CASE statement Comparison statements Logical operators Creating a User Form Form layout The control toolbox Naming conventions Adding objects Naming objects Captions Displaying the form Object properties Object properties Setting properties at design time Setting properties at run time Interconnectivity between the user form and Excel Comparing values Transferring information Running code