Is your team ready for a technology upgrade? When we talk about digital transformation or technology upgrades, we usually think about changes in corporate processes, the development of a new business model, or streamlining. However, we don't usually think about how the workforce will respond. It is important that a team is supportive of an organization's digital transformation as it often means learning new ways of doing things. This microlearning video will outline ways to communicate with your teams about the benefits of new ways of doing things. This video is great for managers, IT leaders, and human resource departments. Length: 3:06 This video is great for managers, IT leaders, and human resource departments. Length: 3:06 Learning Objectives Comprehend how the introduction of digital technologies can trigger cultural shifts within an organization, including the division between digital enthusiasts and those resistant to change.;Recognize the positive outcomes that result from fostering a digital corporate culture, including enhanced collaboration, increased autonomy, innovation, and a workforce aligned with technology trends.;Highlight the significance of leadership in setting a corporate vision that promotes digitalization and cultural change, emphasizing the need for a united digital platform to achieve long-term success.
Duration 3 Days 18 CPD hours This course is intended for Experienced system integrators and consultants responsible for designing and deploying vSphere environments Overview By the end of the course, you should be able to meet the following objectives: Identify the business objectives for the vSphere environment Identify business requirements, constraints, assumptions, and risks for all layers in the vSphere environment Apply a framework to a design Analyze design choices and best-practice recommendations Create a design that ensures availability, manageability, performance, recoverability, and security Design the core management infrastructure for an enterprise Design the virtual data center for an enterprise Design the compute infrastructure for an enterprise Design the storage and networking infrastructures for an enterprise Design virtual machines to run applications in a vSphere infrastructure Design security, manageability, and recoverability features for an enterprise This three-day training course equips you with the knowledge, skills, and abilities to design a VMware vSphere© 7 virtual infrastructure. You follow a proven approach to design a virtualization solution that ensures availability, manageability, performance, recoverability, and security, and that uses VMware best practices. This course discusses the benefits and risks of available design alternatives and provides information to support making sound design decisions. Given a case study, you practice your design skills by working with peers on a design project Course Introduction Introductions and course logistics Course objectives Infrastructure Assessment Follow a proven process to design a virtualization solution Define customer business objectives Gather and analyze business and application requirements Document design requirements, constraints, assumptions, and risks Use a systematic method to evaluate and document design decisions Create a conceptual design Core Management Infrastructure Determine the number of VMware vCenter© Server ApplianceTM instances to include in a design Choose the appropriate single sign-on identity source Choose the time synchronization method Choose methods to collect log files and VMware ESXi? core dumps Design a vCenter Server deployment topology that is appropriate for the size and requirements of the data center Virtual Data Center Infrastructure Calculate total compute capacity requirements for a virtual data center Create a virtual data center cluster design that meets business and workload requirements Evaluate in the virtual data center the use of several management services, such as VMware vSphere© High Availability and VMware vSphere© Distributed Resource Scheduler? Evaluate the use of resource pools in the virtual data center design Compute Infrastructure Create a compute infrastructure design that includes the appropriate ESXi boot, installation, and configuration options Choose the ESXi host hardware for the compute infrastructure Storage Infrastructure Calculate storage capacity and performance requirements for a design Evaluate the use of different storage platforms and storage management solutions Design a storage platform infrastructure and storage management architecture that meets the needs of the vSphere environment Network Infrastructure Evaluate the use of different network component and network management solutions Design a network component architecture that includes information about network segmentation and virtual switch types Design a network management architecture that meets the needs of the vSphere environment Virtual Machine Design Make virtual machine design decisions, including decisions about resources Design virtual machines that meet the needs of the applications in the vSphere environment and follow VMware best practices Infrastructure Security Make security design decisions for various layers in the vSphere environment Design a security strategy that meets the needs of the vSphere environment and follows VMware best practices Infrastructure Manageability Make infrastructure manageability design decisions that adhere to business requirements Design an infrastructure manageability strategy that meets the needs of the vSphere environment and follows VMware best practices Infrastructure Recoverability Make infrastructure recoverability design decisions that adhere to business requirements Design an infrastructure recoverability strategy that meets the needs of the vSphere environment and follows VMware best practices Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware vSphere: Design [v7.0] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware vSphere: Design [v7.0] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Fans of Taylor Swift, Lady Gaga or Michael Jackson will be pleased to attend our fantastic pop singing courses offered in a relaxed and non-judgmental environment. Sing your favourite songs while improving your vocal abilities immensely. Open to adults from beginners to advanced.
Enjoy our outstanding blues singing courses for adults and develop the blues growl used by Bessie Smith, Big Bill Broonzy or Little Richard. Discover amazing vocal techniques that will make your blues feel authentic and enhance your vocal abilities under the tutoring of experts.
Duration 70 Days 420 CPD hours Cisco Learning Library: Networking offers a subscription to all Cisco core online networking training, including product training, technology training, and certifications such as Cisco Routing and Switching, Wireless, Design, and Network Programmability.This comprehensive technical training library includes full-length, interactive certification courses, additional product and technology training with labs, and thousands of reference materials. Networking Library Certification Courses CCNA Implementing and Administering Cisco Solutions (CCNA) v1.0 CCNP Enterprise Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR) v1.0 Implementing Cisco Enterprise Advanced Routing and Services (ENARSI) v1.0 Implementing Cisco SD-WAN Solutions (SDWAN300) v1.0 Designing Cisco Enterprise Networks (ENSLD) v1.0 Designing Cisco Enterprise Wireless Networks (ENWLSD) v1.0 Implementing Cisco Enterprise Wireless Networks (ENWLSI) v1.1 Implementing Automation for Cisco Enterprise Solutions (ENAUI) v1.0 CCIE Enterprise Infrastructure Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR) v1.0 CCIE Enterprise Wireless Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR) v1.0 Product and Technology Training Implementing and Administering Cisco Solutions (CCNA) v1.0 Developing Applications and Automating Workflows Using Cisco Core Platforms (DEVASC) v1.0 Developing Applications Using Cisco Core Platforms and APIs (DEVCOR) v1.0 Developing Solutions Using Cisco IoT and Edge Platforms (DEVIOT) v1.0 Implementing DevOps Solutions and Practices Using Cisco Platforms (DEVOPS) v1.0 Developing Applications for Cisco Webex and Webex Devices (DEVWBX) v1.0 Implementing Automation for Cisco Enterprise Solutions (ENAUI) v1.0 Implementing Automation for Cisco Collaboration Solutions (CLAUI) v1.0 Implementing Automation for Cisco Data Center Solutions (DCAUI) v1.0 Implementing Automation for Cisco Security Solutions (SAUI) v1.0 Implementing Automation for Cisco Service Provider Solutions (SPAUI) v1.0 Introducing Automation for Cisco Solutions (CSAU) v1.0 Cisco Certified Technician Supporting Cisco Routing and Switching Network Devices (RSTECH) v3.0 Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR) v1.0 Implementing Cisco Enterprise Advanced Routing and Services (ENARSI) v1.0 Implementing Cisco SD-WAN Solutions (SDWAN300) v1.0 Designing Cisco Enterprise Networks (ENSLD) v1.0 Implementing Cisco Enterprise Wireless Networks (ENWLSI) v1.1 Cisco NCS 2000 Deploying 96-Channel Flex Spectrum (OPT201) v3.0 Cisco Digital Network Architecture Implementation Essentials (DNAIE) v2.0 Understanding Cisco Industrial IoT Networking Foundation (INFND) v1.0 Programming Use Cases for Cisco Digital Network Architecture v1.0 (DNAPUC) v1.0 Engineering Cisco Meraki Solutions Part 1 (ECMS1) v1.0 Deploying Cisco SD-Access (ENSDA) v1.1 Cisco SD-WAN Operation and Deployment (ENSDW) v1.0 Introduction to Cisco IOS XR (IOSXR100) v2.0 Cisco IOS XR System Administration (IOSXR200) v1.1 Cisco IOS XR Basic Troubleshooting (IOSXR201) v1.1 Cisco ASR 9000 Series IOS XR 64-Bit Software Migration and Operational Enhancements (IOSXR211) v1.0 Cisco IOS XR Layer 3 VPN Implementation and Verification (IOSXR301) v1.1 Cisco IOS XRMulticast Routing Implementation and Verification (IOSXR302) v1.1 Cisco IOS XR Broadband Network Gateway Implementation and Verification (IOSXR304) v1.0 NSO Essentials for Programmers and Network Architects (NSO201) v3.0 Cisco NSO Administration and DevOps (NSO303) v3.0 Cisco Optical Technology Advanced (OPT300) v2.0 Implementing Segment Routing on Cisco IOS XR (SEGRTE201) v2.0 Operating and Implementing Cisco WAN Automation Engine (WAE200) v3.0 Implementing Cisco Virtual Wide Area Application Services (VWAAS) v1.0 Configuring and Operating Cisco EPN Manager (EPNM100) v3.0 Cisco Elastic Services Controller (ESC300) v2.0 Product and Technology Training Deploying Cloud Connect Solutions with Cisco Cloud Services Router 1000V (CLDCSR) v1.0 Implementing Cisco Multicast (MCAST) v2.0 Cisco Prime Central Intermediate ? Administration and Operations (CPCI-AO) v1.0 Cisco Prime Network Intermediate ? Administration and Operation (CPNI-AO) v1.1 Cisco Prime Provisioning (CPP) v6.5 Cisco Prime Performance Manager (CPPERF) v1.0 Implementing Cisco Catalyst 9000 Switches (ENC9K) v1.0 Cisco Aggregation Services Router 9000 Series Essentials (ASR9KE) v6.0 Network Convergence System 5500 Series Router (NCS5500HW) v1.0 Cisco DNA Center Fast-Start Use Cases (A-SDA-FASTSTART) Getting Started with DNA Center Assurance (A-DNAC-ASSUR) v1.0 Overview of Cisco DNA Center Fast Start Use Cases for System Engineers (P-SDA-SYSEF) Planning and Deploying SD-Access Fundamentals (For Customers) (CUST-SDA-FUND) v1.0 Preparing the Identity Services Engine (ISE) for SD-Access (For Customers) (CUST-SDA-ISE) v1.0 SD-Access 1.2 Update Supplement (A-SDA-12UPDT) The SD-WAN Mastery Collection - Getting Started (For Customers) v1.0 (A-SDW-START) The SD-WAN Mastery Collection - Deploying the Data Plane (For Customers) v1.0 (A-SDW-DATPLN) The SD-WAN Mastery Collection - Developing the Overlay Topology (For Customers) v1.0 (A-SDW-OVRLAY) The SD-WAN Mastery Collection - Managing the Application Experience (For Customers) v1.0 (A-SDW-APPEXP) The SD-WAN Mastery Collection - Bringing Up the Control Plane Devices (For Customers) v1.0 (A-SDW-CTRPLN) Securing Branch Internet and Cloud Access with Cisco SD-WAN (A-SDW-BRSEC) Programming for Network Engineers (PRNE) v1.0 Cisco Optical Technology Intermediate (OPT200) v2.0 Advanced Implementing and Troubleshooting MPLS VPN Networks (AMPLS) BGP Bootcamp (BGP) Building Core Networks with OSPF, IS-IS, BGP and MPLS Bootcamp (BCN) Configuring BGP on Cisco Routers (BGP) v4.0 Implementing Cisco MPLS v3.0 Internetworking Technology Overview (ITO) Introduction to IP Multicast Bootcamp Introduction to IPsec VPN Bootcamp (IPsec VPN) Introduction to IPv6 Bootcamp (IPv6) Introduction to MPLS-VPN Bootcamp (MPLS-VPN) LAN Switching Bootcamp (LAN-SW) RP Bootcamp Troubleshooting for Network Support Engineers
Duration 3 Days 18 CPD hours This course is intended for This course is geared for anyone needing to interface with an Oracle database such as end users, business analysts, application developers and database administrators / DBAs. Overview Working within in a hands-on learning environment, guided by our expert team, attendees will develop a practical approach to Oracle Database Technology. Throughout the course participants will explore: Using PL/SQL programming language for database applications and development incorporating PL/SQL modules within the application architecture from the initial design and planning phase The essentials of building executable PL/SQL program units Each of the major segments of a working program and how these interact with each other during program execution Important error or exception handling capabilities of the language. How database-resident program units can be used as part of the overall database application architecture Applying these new skills to the development of PL/SQL packages. Advanced database programming capabilities and benefits How database triggers can be used as part of an advanced database application design Oracle 19c PL/SQL Fundamentals is a three-day, hands-on course that introduces Oracle database programming using the PL/SQL programming language. Throughout the course students will explore the core syntax, structure and features of the language. This course will also lay the foundation for the entire Oracle PL/SQL programming series, allowing one to progress from introductory topics to advanced application design and programming and finally onto writing complex high-performance applications. The course also explores applying the newly learned skills to the development of database applications. Participants will learn how to use database-resident stored program units such as procedures, functions, packages and database triggers. Students will also learn about the latest features in Oracle 19c. Selection & Setup of the Database Interface Considering Available Tools Selecting the Appropriate Tool Oracle Net Database Connections Oracle PAAS Database Connections Setup SQL Developer Setup SQL *Plus Setup JDeveloper About BIND and Substitution Variables Using SQL Developer Using SQL *Plus Choosing a Database Programming Language What is Database Programming PL/SQL Programming PL/SQL Performance Advantages Integration with Other Languages PL/SQL Language Essentials PL/SQL Program Structure Language Syntax Rules Embedding SQL Writing Readable Code Generating Readable Code Generating Database Output SQL * Plus Input of Program Block DECLARE Section About the Declare Section Declare Primitive Types Declaration Options Not Null Constant Data Dictionary Integration % Type Declare Simple User-Defined Types Type ? Table Type ? Record Extended User Defined Types BEGIN Section About the Begin Section Manipulating Program Data Logic Control & Braching GOTO LOOP IF-THEN-ELSE CASE EXCEPTION Section About the Exception Section Isolating the Specific Exception Pragma Exception_INIT SQLCODE &SQLERRM Example SQL%ROWCOUNT & Select ? Into Beyond the Basics : Explicit Cursors About Explicit Cursors Extend Cursor Techniques For Update of Clause Where Current of Clause Using for ? Loop Cursors Introduction Database Resident Programming Units About Database ? Resident Programs Physical Storage & Execution Types of Stored Program Units Stored Program Unit Advantages Modular Design Principles Creating Stored Procedures and Functions Stored Procedures & Functions Create Procedure / Create Function Creating Procedures & Functions Raise_Salary() Procedure Salary_Valid() function The Parameter Specification Default Clause System & Object Privileges Using the Development Tools Executing Stored Procedures and Functions Calling Procedures & Functions Unit Testing with Execute Anonymous Block Unit Testing Specifying a Parameter Notation SQL Worksheet Unit Testing Calling Functions from SQL Maintaining Stored Programming Units Recompiling Programs Mass Recompilation Using UTL_RECOMP() Dropping Procedures & Functions Drop Procedures & Functions Drop Procedure / Function Data Dictionary Metadata Using USER_OBJECTS Using USER_SOURCE Using USER_ERRORS Using USER_OBJECT_SIZE Using USER_DEPENDENCIES Managing Dependencies Dependency Internals Tracking Dependencies The Dependency Tracking Utility SQL Developer Dependency Info Dependency Strategy Checklists Creating & Maintaining About Packages Creating Packages Maintaining Packages Performance Considerations Advanced Package Capabilities Definer & Invoker Rights White Lists & Accessible By Persistent Global Objects Defining Initilization Logic Object Orientation Support Advanced Cursor Techniques Using Cursor Variables Using SYS_REFCURSOR Using Cursor Expressions Using System Supplied Packages DBMS_OUTPUT() UTL_FILE() FOPEN() Example Database Trigger Concepts About Database Triggers DML Event Trigger Sub-Types Database Trigger Scenario Trigger Exhaustion Mechanisms Trigger within SQL Worksheet Creating Database Triggers Statement Level Triggers Using Raise Application_Error() Row-Level Triggers Examples of Triggers Employee_Salary_Check Example Employee_Journal Example Budget_Event Example Instead of Triggers Triggers within and Application Maintaining Database Triggers Call Syntax Trigger Maintenance Tasks Show Errors Trigger Drop Trigger Alter Trigger Multiple Triggers for a Table Handling Mutating Table Issues Implementing System Event Triggers What are System Event Triggers Defining the Scope Available System Events System Event Attributes
Duration 5 Days 30 CPD hours This course is intended for Data Warehouse Administrator Database Administrators Support Engineer Technical Administrator Technical Consultant Overview Use Oracle Flashback Technologies to recover from human error Use Recovery Manager (RMAN) to create backups and perform recovery operations Use the Data Recovery Advisor to diagnose and repair failures Plan effective backup and recovery procedures Describe the Oracle Database architecture components related to backup and recovery operations Perform an encrypted database backup and restore Perform tablespace point-in-time recovery Configure the database for recoverability Describe Cloud Tooling for Backup and Recovery Describe Oracle Database backup methods and recovery operations that can be used to resolve database failure In this Oracle Database 12c R2: Backup and Recovery Workshop, students learn how to perform backup and recovery based on the related Oracle Database architecture components. Various backup, failure, restore, and recovery scenarios are provided so that students learn to evaluate their own recovery requirements and develop an appropriate strategy for backup and recovery procedures. This course includes an interactive workshop, with scenarios that provide participants with opportunities to diagnose and recover from several failure situations. Introduction Curriculum Context Assess your recovery requirements Categories of failures Oracle backup and recovery solutions Oracle Maximum Availability Architecture Oracle Secure Backup Benefits of using Oracle Data Guard Basic Workshop Architecture Getting Started Core Concepts of the Oracle Database, critical for Backup and Recovery Oracle DBA Tools for Backup and Recovery Connecting to Oracle Recovery Manager (RMAN) Configuring for Recoverablility RMAN commands Configuring and managing persistent settings Using the Fast Recovery Area (FRA) Control File Redo Log File Archiving Logs Using the RMAN Recovery Catalog Creating and Configuring the Recovery Catalog Managing Target Database Records in the Recovery Catalog Using RMAN Stored Scripts Maintaining and Protecting the Recovery Catalog Virtual Private Catalogs Backup Strategies and Terminology Backup Solutions Overview and Terminology Balancing Backup and Restore Requirements Backing Up Read-Only Tablespaces Data Warehouse Backup and Recovery: Best Practices Additional Backup Terminology Performing Backups RMAN Backup Types Incrementally Updated Backups Fast Incremental Backup Block Change Tracking Oracle-Suggested Backup Reporting on Backups Managing Backups Improving Your Backups Compressing Backups Using a Media Manager Backup and Restore for Very Large Files Creating RMAN Multi-section Backups, Proxy Copies, Duplexed Backup Sets and Backups of Backup Sets Creating and Managing Archival Backups Backing Up Recovery Files Backing Up the Control File to a Trace File Cataloging Additional Backup Files Using RMAN-Encrypted Backups Creating RMAN-Encrypted Backups Using Transparent-Mode Encryption Using Password-Mode Encryption Using Dual-Mode Encryption Diagnosing Failures Reducing Problem Diagnosis Time Automatic Diagnostic Repository Data Recovery Advisor Handling Block Corruption Restore and Recovery Concepts Restoring and Recovering Instance Failure and Instance/Crash Recovery Media Failure Complete Recovery (Overview) Point-in-Time Recovery (Overview) Recovery with the RESETLOGS Option Performing Recovery, Part I RMAN Recovery in NOARCHIVELOG Mode Performing Complete Recovery (of critical and noncritical data files) Restoring ASM Disk Groups Recovery with Image Files Performing Point-in-Time (PITR) or Incomplete Recovery Performing Recovery, Part II Recovery of Server Parameter File, Control File (One and All) Redo Log File Loss and Recovery Password Authentication File Re-creation Index, Read-Only Tablespace, and Temp file Recovery Restoring the Database to a New Host Disaster Recovery Restoring RMAN Encrypted Backups RMAN and Oracle Secure Backup Oracle Secure Backup Overview and Interface Options RMAN and OSB: Overview and Basic Process Flow Starting with Oracle Secure Backup Configuring Oracle Secure Backup for RMAN RMAN Backup and Restore Operations Oracle Secure Backup Jobs Displaying OSB log files and transcripts for RMAN activities Using Flashback Technologies Flashback Technology: Overview and Setup Using Flashback Technology to Query Data Flashback Table Flashback Transaction (Query and Back out) Flashback Drop and the Recycle Bin Flashback Data Archive Using Flashback Database Flashback Database Architecture Configuring Flashback Database Performing Flashback Database Best Practices for Flashback Database Transporting Data Transporting Data Across Platforms Transporting Data with Backup Sets Database Transport: Using Data Files Performing Point-in-Time Recovery When to use TSPITR TSPITR Architecture Performing RMAN TS Point-in-time Recovery Recovering Tables from Backups Duplicating a Database Using a Duplicate Database Duplicating Database with 'push' and 'pull' techniques Choosing Database Duplication Techniques Creating a Backup-up Based Duplicate Database Understanding the RMAN Duplication Operation RMAN Troubleshooting and Tuning Interpreting RMAN Message Output Tuning Principles Diagnosing Performance Bottlenecks RMAN Multiplexing Restore and Recovery Performance Best Practices Cloud Tooling for Backup and Recovery Backup Destinations Customize Backup Configuration On-Demand Backup and Recovery Oracle Backup Cloud Service Installing the Backup Module Backup and Recovery Workshop Workshop Structure and Approach Business Requirements for Database Availability and Procedures Diagnosing the Failures
Duration 5 Days 30 CPD hours This course is intended for This course is intended for those responsible for the installation, configuration, maintenance, or troubleshooting of PGP Universal Server or PGP Desktop. Overview This course provides instruction on PGP Universal Server 3.2 and PGP Desktop 10.2.At the completion of the course, you will be able to: Describe the features, concepts, components, and terminology of both the PGP Universal Server 3.2 and PGP Desktop 10.2products. Install PGP Universal Server 3.2 and complete setup using the most commonly configured options. Install a managed and customized PGP Desktop 10.2 client. Configure, complete administration tasks for, and use PGP Whole Disk Encryption and other PGP Desktop features. Configure policy-based messaging security for internal and external recipients. Create and modify users, user policies, and groups using either manual or directory integration methods. Combine two or more PGP Universal Servers into a cluster. This is designed to provide you with the fundamental knowledge a nd hands-on lab experience to install, administer, and troubleshoot the PGP Universal Management Server and primary client product. Cryptography Essentials Cryptography defined Caesar cipher Symmetric-Key Cryptography Public-Key Cryptography PGP Public-Key Cryptography Digital Signatures Trust Models Keys, Key Signatures and Key properties Verifying keys with key fingerprints Passphrases Certificates PGP Product Information PGP Universal Server PGP Desktop PGP Command Line PGP Support Package for BlackBerry PGP Mobile PGP iOS Viewer Installing PGP Universal Server PGP Universal Server overview Installation tasks and options Completing the PGP Universal Server Setup Assistant Administrative Keys A review of trust and verification The Organization Key The Organization Certificate Configuration and usage of the Additional Decryption Key Other certificates used for trust on PGP Universal Server Ignition key types and features Consumers and Groups Consumers and Groups PGP product user definition Consumer groups Introduction to consumer policy How users, groups, and policy work together Server Messaging Learn Mode In-depth look at Mail Proxy configuration Description of server mail flow and typical configurations Monitoring and Reporting Server monitoring and logging Updates, backups, and restoring Mail Policy Definition of policy chains and rules Rule conditions, actions, and key searches Default mail flow and message policy Adding custom chains to mail flow Overview of various types of policy chains Demonstration and detailed explanation of adding a rule Special messaging actions and dictionaries Key Not Found Problems that require a Key Not Found policy Introduction to Key Not Found configuration Web Messenger Definition of Web Messenger Description of functionality Demonstration of end-user inbox creation Inbox and service administration Inbox replication and backup Customization templates Regular Email option for Web Messenger PDF Messenger statement and certified delivery How the Out of Mail Stream Consumer Policy option functions PGP public key directories Smart Trailer invitation option overview PGP Desktop / S/MIME option overview PGP Universal Satellite overview Preparing Universal Server for PGP Desktop Clients Introduction to directory synchronization High-level overview of LDA P How the server uses a directory to add and assign users to groups Configuring PGP Universal Server Directory Synchronization Keys Managed key configuration Key modes Subkeys Key usage flags Smart card Introduction to key management services Installing PGP Desktop System requirements Citrix and TS compatibility Downloading a custom PGP Desktop installer Modifying installed components Configuring Client Enrollment Definition of enrollment Email, LDA P, and Silent enrollment type overview General PGP Desktop Policy General PGP Desktop Policy Options on the General Card of the PGP Desktop settings of a consumer policy Licensing managed PGP Desktop clients Updating settings for managed installations PGP Desktop Messaging How PGP Desktop affects messaging infrastructure Options on the Messaging Card of the PGP Desktop settings of a consumer policy MAPI encrypt and sign buttons and offline mail processing Configuring PGP Whole Disk Encryption What is Whole Dis k Encryption Configuring WDE PGP Whole Disk Encryption for Windows PGP Whole Disk Encryption for Mac OSX PGP w hole Disk Encryption for Linux PGP Whole Disk Encryption Management and Recover The pgpwd command-line tool Logon failure and reporting The WDE-ADMIN group for large-scale administration PGP Whole Disk Encryption in the PGP Desktop settings of a consumer policy, including authentication methods and user per missions Recovery options PGP NetShare Defining PGP NetShare Encrypted folder creation Configuration of the PGP Universal Server Consumer Policy options for NetShare, including automated folder protection and application-based file protection Client-side administration features for PGP NetShare Miscellaneous compatibility and feature information about PGP NetShare Active Directory Group integration and PGP NetShare usage demonstrations Other PGP Desktop Utilities PGP Zip file and folder protection Securely erasing information using PGP Shredder and the Shred Free Space features PGP Virtual Disk secure volumes Usage cases and PGP Portable definition Clustering How PGP Universal Server Clustering works Using the DMZ Clustering Zone Cluster failover Web Messenger inbox replication Demonstration of cluster creation
Join this webinar discussing how therapeutic laser and shockwave therapy can be combined to deliver excellent outcomes. Discover how to integrates these approaches into treatment pathways, and learn more about the science and practical applications of laser and shockwave therapies.
Duration 2 Days 12 CPD hours This course is intended for Anyone with the need to understand how business analysis is performed to support agile projects or who must transition their existing business analysis skills and practices from waterfall to agile. Overview In this course, students will: Understand the fundamentals of agile delivery and agile business analysis Compare and contrast business analysis on waterfall and agile projects Explain the value proposition for agile product development Define the 4 main types of project life cycles Complete an in-depth walkthrough of the agile delivery life cycle Explain the major flavors of agile Understand the major standards available to assist in transition of skills Define business analysis tailoring and understand how to apply it Learn over 20 business analysis techniques commonly used on agile projects In this course, students will gain an understanding about agile business analysis. Students will learn how business analysis on an agile project is ?the same? and ?different? than business analysis performed on waterfall projects. Students will understand how the business analysis role changes on an agile team. A number of business analysis techniques suited for supporting agile teams will be introduced as will the various standards available to the community to help teams and organizations transition. Since few organizations are pure agile, students will also learn about delivery approaches that use a combination of practices from waterfall and agile and will also be introduced to the important concept of business analysis tailoring ? the key skill used to adapt business analysis skills to all environments ? regardless of the delivery life cycle selected. Introduction What is agile The Agile Manifesto Agile principles Agile benefits Hands-on activity Learning and course objectives The current state of agile Agile trends Agile skills Value proposition The business case for agile The BA role changes on an agile project Hands-on activity Understanding project life cycles Project life cycle Product life cycle Incremental versus Iterative Hybrid approaches to delivery Choosing a project life cycle An in-depth look at Agile The agile development life cycle A sequence of iterations Essential concepts Inside each iteration Iteration goal Iteration planning Sequence of tasks Work period Testing End of iteration activities Evaluation and feedback Structured walkthroughs Evaluation guidelines The BA role in structured walkthroughs Scripting scenarios Defect list Retrospectives Hands-on exercise Type of Agile Delivery Approaches The flavors of agile Scrum Scrum roles Extreme Programming (XP) Dynamic System Development Method (DSDM) Feature Driven Development (FDD) Testing Best practices used by FDD Kanban Kanban Boards Agile Unified Process Scaling Frameworks Introduction to Agile Business Analysis What is business analysis? What is agile business analysis? Framework for agile business analysis Business analysis components International Institute of Business Analysis (IIBA©) Project Management Institute (PMI©) Context to business analysis Our industry BA standards Our industry Agile BA standards Product Owners What stays the same What is expected to change Agile requirements deliverables Lightweight documentation Requirements repository Where business analysis fits in The BA workload Hands-on exercise Business Analysis Tailoring Business analysis tailoring (defined) Tailoring considerations What tailoring looks like The PMI Guide to Business Analysis Determining the ?best? BA approach Methodology vs Standard Why use methodologies Determining your methodology Business analysis impacts Tools and techniques for agile business analysis Agile BA techniques Backlog refinements Behavior Driven Development (BDD) Burndown chart Collaborative games Definition of done Definition of ready INVEST Iteration planning Kanban board Minimum marketable features (MMF) Minimum viable product (MVP) MoSCoW Narrative writing Persona analysis Product roadmap Progressive Elaboration Prototyping Purpose alignment model Retrospectives Story slicing Hands-on Exercise Prioritization Techniques Requirements prioritization Prioritizing on agile projects Prioritization criteria Business benefit MoSCoW Pair-choice comparison Setting priorities with multi-voting Cost to acquire and operate Determining business value Story point estimating Planning poker Project velocity Hands-on activity Course wrap-up Making the transition to agile How my role will be different Course summary Retrospective Questions Additional course details: Nexus Humans BA08 - Agile for Business Analysts training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the BA08 - Agile for Business Analysts course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.