Duration 5 Days 30 CPD hours This course is intended for This advanced course is for individuals who are experienced AIX system administrators with TCP/IP networking and AIX Logical Volume Manager (LVM) experience, who are responsible for the planning and installation of a PowerHA SystemMirror 7.1 and later cluster on an IBM power systems server running AIX 6.1 or later. The lab exercises are conducted on an AIX 7.1 TL2-level system. Overview Explain what high availability is Outline the capabilities of PowerHA SystemMirror Design and plan a highly available cluster Install and configure PowerHA SystemMirror in the following modes of operation: Single resource group on a primary node with standby node Two resource groups in a mutual takeover configuration Implement the trusted execution feature of AIX 6.1 Configure resource group startup, fallover, and fallback policies Perform system administration tasks for PowerHA Perform customization for PowerHA Perform problem determination and recovery This course is designed to prepare you to perform administration on a highly available cluster using PowerHA SystemMirror for AIX. It introduces concepts; design and planning considerations; installation and configuration; customization; and maintenance. Day 1 Introduction to PowerHA SystemMirror Planning and configuring network and storage Day 2 Configuring applications for PowerHA SystemMirror Configuring a PowerHA SystemMirror cluster Day 3 Cluster validation and testing PowerHA SystemMirror administration Day 4 PowerHA SystemMirror event processing Basic Troubleshooting Day 5 PowerHA SystemMirror installation
Duration 3 Days 18 CPD hours This course is intended for Risk managersBusiness Process OwnersBusiness Finance ManagersBusiness Risk ManagersRegulatory Compliance ManagersProject ManagementPersons responsible for information security or conformity within an organization Overview To understand the concepts, approaches, methods and techniques allowing an effective risk managementaccording to ISO 31000To understand the relationship between the risk management and the compliance with the requirements ofdifferent stakeholders of an organizationTo acquire the competence to implement, maintain and manage an ongoing risk management program accordingto ISO 31000To acquire the competence to effectively advise organizations on the best practices in risk management In this three-day intensive course participants develop the competence to master a model for implementing risk management processes throughout their organization using the ISO 31000:2009 standard as a reference framework. Day 1 Introduction to the Risk Management framework according to ISO 31000 Concepts and definitions related to Risk Management Risk Management standards, frameworks and methodologies Implementation of a Risk Management framework Understanding an organization and its context Day 2 Risk identification and assessment, risk evaluation, treatment, acceptance, communication and surveillance according to ISO 31000 Risk identification Risk analysis and risk evaluation Risk treatment Risk acceptance and residual risk management Risk communication and consultation Risk monitoring and review Day 3 Risk assessment methodologies according to ISO 31000 and Certification Exam Presentation of risk assessment methodologies Certification Exam
ð Unlock Your Creative Potential with the Creative Content Crafting Proficiency Course! ð Are you ready to become a content creation maestro, commanding attention and engagement with your every word? Elevate your skills and unleash your creative genius with our exclusive online course: Creative Content Crafting Proficiency. ð Transform Your Content Creation Skills: Dive into the art and science of creating captivating content that resonates with your audience. Whether you're a budding writer, marketer, blogger, or social media enthusiast, this course is tailored to sharpen your abilities and help you stand out in the digital landscape. ð¨ Master the Art of Storytelling: Learn how to weave compelling narratives and tell stories that captivate, influence, and inspire. Discover the secrets behind crafting engaging content that connects on a deeper level, leaving a lasting impact on your audience. ð¡ Unleash Your Creativity: Break free from creative blocks and tap into an endless well of inspiration. Explore innovative techniques and proven strategies to consistently generate fresh and original ideas, setting yourself apart as a creative powerhouse. ð Key Learning Modules: Crafting Irresistible Headlines and Introductions Building a Consistent Tone and Voice Maximizing Engagement Across Platforms Creating Visual and Multimedia Content Harnessing SEO Strategies for Content Optimization ð©âð« Expert Guidance and Support: Benefit from insights and guidance from industry experts who have mastered the art of content creation. Our instructors provide actionable advice, personalized feedback, and ongoing support to ensure your growth and success throughout the course. ð Join Thousands of Satisfied Students: Join a thriving community of like-minded individuals passionate about honing their content creation skills. Share experiences, exchange ideas, and network with professionals, fostering invaluable connections along the way. ð Your Path to Content Mastery Starts Here: Enroll now in the Creative Content Crafting Proficiency course and embark on a transformative journey toward becoming a content creation virtuoso. Unleash your creative flair and elevate your content to new heights! ð Limited Time Offer: Enroll Today and Get Exclusive Access! ð Take the first step toward content creation excellence. Don't miss out-secure your spot now! [Enroll Now Button] Unlock the door to limitless creativity and mastery in content crafting. Join us in this exciting adventure today! [Course Logo] Creative Content Crafting Proficiency Course Course Curriculum
Overview: Effective Communication Skills In today's interconnected world, effective communication is an invaluable asset. Whether you're interacting in your personal relationships, navigating professional environments, or engaging with broader communities, the ability to convey ideas, thoughts, and emotions with clarity and precision is essential. The 'Effective Communication Skills' course is designed to equip learners with the knowledge, strategies, and practical techniques necessary to become adept communicators across various mediums. Chapter 1: Effective Communication The foundation of effective communication lies in understanding its fundamental principles. In this introductory chapter, learners will delve into the core concepts that underpin successful communication. From the basic elements of encoding and decoding messages to the importance of active listening and feedback, participants will gain insights into the dynamics of human interaction. Key topics covered in this module include: The communication process: Explore the stages involved in transmitting and receiving messages, including encoding, transmitting, receiving, decoding, and feedback. Verbal and nonverbal communication: Understand the role of both verbal language and nonverbal cues such as body language, facial expressions, and gestures in conveying meaning. Barriers to communication: Identify common obstacles that hinder effective communication, such as noise, cultural differences, language barriers, and emotional barriers. Active listening: Learn techniques to enhance listening skills, including paraphrasing, clarifying, summarizing, and empathizing with the speaker. Through a combination of theoretical concepts, real-world examples, and interactive exercises, learners will develop a solid understanding of the principles of effective communication and how they can be applied in various contexts. Chapter 2: Effective Verbal Communication Verbal communication plays a central role in interpersonal interactions, presentations, negotiations, and everyday conversations. In this module, participants will explore strategies for mastering the art of verbal communication and fostering meaningful connections with others through spoken language. Key components of this chapter include: Clarity and conciseness: Discover techniques for articulating thoughts and ideas clearly and succinctly to ensure that messages are easily understood by others. Tone and delivery: Explore the impact of tone of voice, pacing, pitch, and emphasis on the interpretation of verbal messages, and learn how to adapt these elements to different situations and audiences. Assertiveness and confidence: Develop strategies for expressing opinions, making requests, and asserting boundaries with confidence and assertiveness, while also respecting the perspectives of others. Effective questioning and feedback: Master the art of asking open-ended questions, providing constructive feedback, and engaging in productive dialogue to foster mutual understanding and collaboration. Through practical exercises, role-playing scenarios, and guided feedback sessions, learners will hone their verbal communication skills and gain confidence in their ability to express themselves effectively in various contexts. Chapter 3: Effective Written Communication In an age dominated by digital communication channels, the ability to communicate effectively in writing is more important than ever. This module focuses on developing proficiency in written communication, from crafting clear and concise emails to drafting persuasive reports and documents. Key themes covered in this module include: Structure and organization: Learn how to structure written communication effectively, including the use of introductions, main body paragraphs, and conclusions to guide the reader through the content. Clarity and precision: Explore techniques for writing clearly and concisely, avoiding jargon, ambiguity, and unnecessary complexity to ensure that messages are easily understood by the intended audience. Tone and style: Understand the importance of tailoring the tone and style of writing to suit the purpose, audience, and context, whether it's formal, informal, persuasive, or informative. Editing and proofreading: Develop strategies for reviewing and revising written work to correct errors in grammar, punctuation, spelling, and style, ensuring that the final product is polished and professional. By practicing writing exercises, analyzing sample texts, and receiving constructive feedback, participants will enhance their written communication skills and become more effective communicators in both personal and professional settings. Conclusion The 'Effective Communication Skills' course provides a comprehensive framework for mastering the art of communication in today's fast-paced world. By exploring the principles of effective communication, mastering verbal and written communication techniques, and practicing through interactive exercises, participants will develop the skills and confidence needed to succeed in any communication context. Whether you're a seasoned professional looking to enhance your communication skills or an aspiring communicator seeking to build a strong foundation, this course offers valuable insights and practical strategies for achieving your goals. Course Curriculum Chapter 1 Effective Communication Effective Communication 00:00 Chapter 2 Effective Verbal Communication Effective Verbal Communication 00:00 Chapter 3 Effective Written Communication Effective Written Communication 00:00
Duration 2 Days 12 CPD hours This course is intended for System administrators and consultants, application owners, and system architects Overview By the end of the course, you should be able to meet the following objectives: Describe VMware Carbon Black Cloud platform Describe data flows on VMware Carbon Black Cloud Create and edit a custom role in VMware Carbon Black Cloud Recognize the impact of a user role on a console user Describe the VMware Carbon Black Cloud sensor resource usage Explain sensor usage in VMware Carbon Black Cloud Identify configuration settings for endpoints in sensor policy settings Determine requirements for initial deployment of sensors Recognize the differences between attended and unattended sensor installation methods Identify the correct deployment strategy for a given scenario Recognize the deployment process for VMware Carbon Black Cloud Workload⢠Identify eligible workloads in a VMware vSphere environment Describe VMware Carbon Black Cloud sensor deployment Manage VMware vSphere workloads Identify sensor status in RepCLI This two-day hands-on training course provides you with the knowledge, skills, and tools to achieve competency in planning and deploying VMware Carbon Black Cloud in your environment. This course explains the VMware Carbon Black Cloud components, managing users and roles in VMware Carbon Black Cloud, configuring policies to support sensor deployment and management, and presents methods for deploying sensors across endpoints and workloads. Course Introduction Introductions and course logistics Course objectives Introduction to VMware Carbon Black Cloud Describe the VMware Carbon Black Cloud platform Describe VMware Carbon Black Cloud operating systems requirements Identify interesting files according to VMware Carbon Black Cloud Identify events collected Describe data flows Managing VMware Carbon Black Cloud Roles and Users Describe the use of roles in VMware Carbon Black Cloud Describe RBAC capabilities Create and edit a custom role Manage new console users Recognize the impact of a user role on a console user Describe authentication mechanisms VMware Carbon Black Cloud Sensors Describe the VMware Carbon Black Cloud sensor resource usage List the supported operating systems for VMware Carbon Black Cloud sensors Explain sensor usage in VMware Carbon Black Cloud Preparing for Deployment Identify configuration settings for endpoints in sensor policy settings Organize sensors using sensor groups to assign the desired policy based on specific criteria Compare VDI sensor settings as compared to traditional endpoint sensor settings Determine requirements for the initial deployment of sensors Evaluate the policy impact on sensors Identify best practices for deploying sensors Installing Sensors Describe how to send an installation request Recognize the features and limitations of an installation code and company code Recognize the process for successfully completing an attended installation Recognize the differences between attended and unattended sensor installation methods Identify the correct deployment strategy for a given scenario Generate logs with unattended installations Generate sensor logs Check network connectivity for sensor installation Deploying Workloads Recognize the deployment process for VMware Carbon Black Cloud Workload Identify eligible workloads in a vSphere environment Recognize how to enable the VMware Carbon Black Cloud sensor on a VM workload Managing Sensors Describe VMware Carbon Black Cloud sensor deployment Explain the differences in sensor status Describe sensor update capabilities Explain sensor actions Manage vSphere workloads Post-deployment Validation Describe the process of a sensor background scan Recognize a properly registered sensor installation Identify sensor status in RepCLI Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Carbon Black Cloud: Plan and Deploy training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Carbon Black Cloud: Plan and Deploy course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 1 Days 6 CPD hours This course is intended for System administrators, security operations personnel including analyst and managers. Overview By the end of the course, you should be able to meet the following objectives: Describe the components and capabilities of application control. Manage and configure the Carbon Black App Control server based on organizational requirements. Create policies to control enforcement levels and agent functionality. Implement rules to support the organization's security posture. Use the Carbon Black App Control tools to understand agent and server data. This course teaches you how to use the VMware Carbon Black© App ControlTM product and leverage the capabilities to configure and maintain the system according to their organization?s security posture and organizational policies. This course provides an in-depth, technical understanding of the Carbon Black App Control product through comprehensive coursework and hands-on scenario-based labs. Course Introduction Introductions and course logistics Course objectives Login Accounts and Groups User accounts User roles Policies Modes and Enforcement Levels Rule sets Notifiers Agent side display notification use Computer Details View agent information Related views Local Approval Timed Policy Override Use case and functionality Software Approvals Methods and use cases Custom Rules Rule type and use cases Tools Meters and Alerts Events Agent and server events Baseline Drift Changes in a baseline
Discover a world of creative possibilities and unlock your potential with our Construction Design, Landscape Architecture & Estimation Diploma. In the United Kingdom, professionals in this field can expect lucrative salaries, with annual earnings ranging from £35,000 to £60,000. If you have a passion for design, an eye for aesthetics, and a love for construction, this bundle is your gateway to a rewarding career. The bundle combines three essential courses: Landscape Architecture, Design Management in Construction, and Construction Cost Estimation Diploma. Dive into the art of crafting breathtaking outdoor landscapes, gain expertise in managing design processes, and master the skills of accurate cost estimation. This bundle is ideal for aspiring landscape architects, design managers, and construction project estimators, providing the knowledge and skills necessary to excel in the dynamic field of construction and design. Embark on this educational journey and unleash your creative potential in the world of construction. Each course in this bundle holds a prestigious CPD accreditation, symbolising exceptional quality. The materials, brimming with knowledge, are regularly updated, ensuring their relevance. This bundle promises not just education but an evolving learning experience. Engage with this extraordinary collection, and prepare to enrich your personal and professional development. Immerse yourself in these diverse, enthralling subjects, each designed to fuel your curiosity and enhance your knowledge. Dive in now! The courses in this bundle include: Landscape Architecture Design Management in Construction Construction Cost Estimation Diploma Learning Outcome: Proficient Landscape Design Skills: Develop the ability to conceptualise and design stunning outdoor landscapes that harmoniously blend natural elements, architectural features, and human needs. Effective Design Management: Acquire the skills to oversee and manage design processes within the construction industry, ensuring seamless coordination between stakeholders, efficient resource allocation, and timely project delivery. Understanding of Sustainable Design Principles: Gain insight into environmentally conscious design practices, incorporating sustainability considerations in landscape architecture and construction projects to minimise environmental impact. Problem-Solving and Decision-Making Skills: Develop the ability to identify and address design challenges, make informed decisions, and implement effective solutions, enhancing your problem-solving and critical thinking capabilities. Industry-Relevant Knowledge: Acquire a solid foundation of knowledge regarding construction design, landscape architecture, and cost estimation, enabling you to navigate the industry with confidence and stay up-to-date with current trends and practices. Our bundle comprises three comprehensive courses that will equip you with the essential knowledge and skills needed to excel in the construction and design industry. The courses included are: Landscape Architecture: Dive into the captivating world of landscape design, where you will learn to create harmonious outdoor spaces that seamlessly blend nature and human-made elements. Explore principles of site planning, plant selection, and environmental sustainability, enabling you to envision and craft breathtaking landscapes that leave a lasting impact. Design Management in Construction: Unleash your creativity while gaining a firm understanding of project management principles within the construction industry. Learn to oversee design processes, coordinate with stakeholders, and ensure projects are executed flawlessly from concept to completion. Develop your ability to navigate through challenges, optimise resources, and deliver exceptional design solutions. Construction Cost Estimation Diploma: Develop a keen eye for detail as you master the art of cost estimation in construction projects. Acquire the skills to analyse blueprints, assess materials and labour costs, and accurately calculate project budgets. With this knowledge, you will be an invaluable asset, able to provide accurate cost estimates that contribute to the successful planning and execution of construction ventures. Enrol in our bundle today and take the first step towards a brighter future. Construction awaits your creative touch! CPD 10 CPD hours / points Accredited by CPD Quality Standards Who is this course for? This bundle is ideal for individuals seeking to build a career in construction design and landscape architecture. Whether you are a recent graduate, a working professional looking to upskill, or an aspiring entrepreneur, our courses provide a solid foundation for your future success. No prior experience is required, as our courses are designed to accommodate learners at various stages of their professional journey. Career path Embark on this learning journey and open doors to a variety of exciting career opportunities. Graduates of our Construction Design, Landscape Architecture & Estimation Diploma can pursue roles such as: Landscape Architect Design Manager Construction Project Estimator Urban Planner Construction Consultant Certificates Certificate Of Completion Digital certificate - Included Certificate Of Completion Hard copy certificate - £9.99 Unlock your potential and showcase your accomplishments with our CPD Quality Standards certificates! Upon successful completion of the course, learners can obtain a CPD Quality Standards PDF certificate for Landscape Architecture absolutely free! Upon finishing the Design Management in Construction and Construction Cost Estimation Diploma, you'll have the opportunity to obtain valuable proof of your achievement. For just £4.99, we'll send you a CPD Quality Standards PDF Certificate via email, or if you prefer, you can get a beautifully printed hardcopy certificate for £9.99 in the UK. If you're located internationally, don't worry! We offer a printed hardcopy certificate for £14.99, ensuring your success knows no boundaries. Grab your certificate and celebrate your success today!
Duration 4 Days 24 CPD hours This course is intended for This course assumes the student has successfully taken and passed the NCSF Foundation 2.0 course based on the NIST Cybersecurity Framework version 1.1, release April 2018. Following the course introduction, the course provides an introduction to the intersection between digital transformation and cybersecurity, which is followed by an overview of the threat landscape. Following an approach to the implementation of cybersecurity controls, the course delves into an organizational approach to cybersecurity that starts governance, management, and a supportive culture,Finally, the course provides additional guidance for the cybersecurity practitioner to determine the current state, the desired state, and a plan to close the gap - and to do this over and over again to inculcate it into organizational DNA. Overview This course looks at the impact of digital transformation on cybersecurity risks, an understanding of the threat landscape, and an approach to the application of cybersecurity controls. It provides guidance for students on the best approach to design and build a comprehensive cybersecurity program. Executives are keenly aware of the risks but have limited knowledge on the best way to mitigate these risks. This course also enables our executives to answer the critical question - Are we secure? The class includes lectures, informative supplemental reference materials, quizzes, exercises, and formal examination. The exercises are a critical aspect of the course; do not skip them. Outcomes and benefits from this class is a practical approach that students can use to build and maintain comprehensive cybersecurity and cyber-risk management programs. This course is targeted at IT and Cybersecurity professionals looking to become certified on how to operationalize the NIST Cybersecurity Framework (NCSP) across an enterprise and its supply chain. Digital Transformation Explores what the Practitioner needs to know about the relationship between digital transformation and cybersecurity Explain how to determine the impact of cybersecurity on DX. Explain the relationships between culture and digital transformation from the perspective of a practitioner. Explain the delivery of value to stakeholders in a DX & cybersecurity environment. Illustrate the interdependent relationship between cybersecurity and DX. Threat Landscape The Practitioner needs to understand what threat actors do and their capabilities. Compare the evolving attack type impact to the threat environment. Apply knowledge about the threat landscape to maintain a readiness to respond. Develop a risk profile based on business impact analysis Establish the relationship between awareness and training in the continual improvement of cybersecurity posture. Develop and treat training & awareness as a critical aspect of deterrence Use knowledge about the threat landscape as a predicate to the adoption and adaptation of your cybersecurity posture. The Controls This chapter provides a sample set of controls based on an informative reference. Understand the purpose goals & objectives for each control. Characterize & explain the informative reference controls Discover how to apply the controls in an organizational context. Adopt & Adapt Adopt is a decision about governance; adapt is the set of management decisions that result from the decision to adopt. Distinguish Adopt, Adapt, Management & Governance. Develop an approach to adoption & adaptation. Distinguish & demonstrate the impact of organizational culture on developing cybersecurity as a capability. Develop an assessment approach to define current state. Adaptive Way of Working Threat actors are agile and highly adaptive. The cybersecurity Practitioner must develop the same capabilities Break down what constitutes an adaptive approach. Characterize & apply the need for crossfunctional teams. Recognize and prioritize the first steps (get started). Demonstrate & establish cybersecurity phases. Break down the impact of the flows. Rapid Adoption & Rapid Adaptation FastTrack FastTrack? is an approach to allow organizations to learn to adapt to an evolving threat landscape rapidly. Approach: Establish what it takes to adopt CS. Determine how that impacts management adaptation of CS. Determine how that impacts the capability to assess. CS Capability: Determine the gap between existing & needed capabilities. Establish what must be developed. Develop appropriate risk management profile. Discover how cybersecurity impacts people, practice & technology impacts organization. Differentiate CIS Implementation groups. Determine appropriate implementation group & approach. Develop appropriate phase approaches. CIIS Practice Cybersecurity is an ongoing game of cat and mouse. Organizations must learn how to inculcate cybersecurity improvement into their DNA. Break down & develop mechanisms for ongoing cybersecurity improvement that includes developing a learning organization. Illustrate an improvement plan based on the NIST 7-Step Approach. Illustrate an improvement plan based on the Improvement GPS Demonstrate understanding of Cybersecurity Maturity Model Certification Break down the balancing loop & how it fits into the escalation archetype Use the Fast Track? (improvement & implementation) cycles.
Duration 5 Days 30 CPD hours This course is intended for Workspace ONE UEM operators and administrators, account managers, solutions architects, solutions engineers, sales engineers, and consultants Workspace ONE Access operators and administrators, account managers, solutions architects, solutions engineers, sales engineers, and consultants Overview By the end of the course, you should be able to meet the following objectives: Identify key benefits of Workspace ONE Access to address your specific use case Describe the different identity sources supported by Workspace ONE Access and apply the most appropriate to your organization's use case Differentiate common authentication methods in Workspace ONE Access and select the most suitable method to fit your business needs Illustrate how to use access policies and implement best practices within your organization Outline various authentication methods and workflows that can be implemented to ensure a robust end-user experience, while meeting your security requirements Summarize the capabilities and benefits of VMware Workspace ONE Intelligent Hub and Hub Services and learn how to effectively implement both Discuss how to implement Workspace ONE Intelligent Hub and Hub Services effectively Describe features of VMware Workspace ONE Intelligence⢠and how to use it to support daily administration and maintenance Explain how to use the Workspace ONE UEM and Workspace ONE Access APIs to perform administration and maintenance Outline Workspace ONE design methodology and how it can apply to your organization In this five-day course, you build on the foundations learned in VMWare Workspace ONE: Deploy & Manage to accelerate the advancement of your deployment and management systems with VMware Workspace ONE© UEM and VMware Workspace ONE© Access?.Through a series of hands-on labs, simulations, and interactive lectures, you effectively evaluate your organization?s current practices and discover opportunities to target improvements in identity, authentication, and access management. Additionally, you learn the strategies and techniques necessary to construct an integrated management strategy, utilizing a comprehensive set of VMware Workspace ONE© services, including Hub Services, the Unified Catalog, Intelligence, and the API. Course Introduction Introduction and course logistics Course objectives Workspace ONE Platform List the high-level components of the Workspace ONE platform Identify benefits of integrating Workspace ONE Access with other Workspace ONE products Explain what services Workspace ONE Access offers Outline the use cases for Workspace ONE Access Connector Identity Sources Identify different directory types in Workspace ONE Access based on identity sources Explain supported web standards for identity Explain Workspace ONE Access workflows of an Active Directory and an LDAP directory Identify features and use cases of third-party identity sources Identify the features and use cases of the VMware AirWatch© Provisioning app Authentication Identify the benefits of modern identity and access management Explain the workflows of connector-based authentication methods, such as Kerberos, RADIUS, and RSA SecureID Explain the workflows of cloud-based authentication methods, such as mobile SSO for iOS, mobile SSO for Android, and Workspace ONE Verify Access Policies Explain access policies and their importance Describe how identity providers (IdPs) and authentication methods work with access policies Explain how to create policy rules following best practice Catalog Define the types of resources in the Workspace ONE Access catalog Outline the common SAML authentication initiation methods for web applications in Workspace ONE Access Describe the high-level integration steps of a Horizon Cloud integration with Workspace ONE Access Hub Services Describe the relationship between Hub Services, Workspace ONE Intelligent Hub, Workspace ONE UEM, and Workspace ONE Access Illustrate the primary components of Hub Services Describe the features and use cases of Workspace ONE Verify Explain how to deploy mobile flows according to a use case Workspace ONE Intelligence Describe how Workspace ONE Intelligence supports your deployment and management strategy Explain how the Digital Employee Experience Management Solution helps improve employees' Anywhere Workspace journey Explain how you can use Dashboards to access different data for your device management use cases Explain how integration works to connect and share data with third parties Workspace ONE Application Programming Interface Outline the use cases for using the Workspace ONE API Explain how to perform Workspace ONE UEM administration and maintenance through the API Explain how to perform Workspace ONE Access administration and maintenance through the API Design Methodology Explain the Workspace ONE business drivers and use case definition Define Workspace ONE services Discuss how to make architectural design decisions Explain how to create component designs Discuss which third-party components are required for infrastructure design Discuss the process of platform integration Explain the required services for service integration Explain how to design user experience
Developing a network of MHFA Champions is a key step in creating a mentally healthy workplace. The MHFA Champion one-day course will give you all the skills you need to be an MHFA Champion. This one-day course trains you as an MHFA Champion, giving you: An understanding of common mental health issues Knowledge and confidence to advocate for mental health awareness Ability to spot signs of mental ill-health Skills to support positive wellbeing 1 Introduction to MHFA and understanding mental health (3 hours 30 mins) About Mental Health First Aid About mental health and stress in the workplace Stigma and discrimination Depression Anxiety disorders Other mental health issues (eating disorders, self-harm, psychosis) Early warning signs of mental ill-health Alcohol, drugs and mental health 2 MHFA Champion in practice (3 hours 30 mins) Applying the Mental Health First Aid action plan Action 1: Approach the person, assess and assist with any crisis Suicide Action 2: Listen and communicate non-judgementally Action 3: Give support and information Action 4: Encourage the person to get appropriate professional help Action 5: Encourage other supports Recovery Building a mentally healthy workplace Action planning for using MHFA