Duration 3 Days 18 CPD hours This course is intended for This course is intended for: Database architects Database administrators Database developers Data analysts and scientists Overview This course is designed to teach you how to: Discuss the core concepts of data warehousing, and the intersection between data warehousing and big data solutions Launch an Amazon Redshift cluster and use the components, features, and functionality to implement a data warehouse in the cloud Use other AWS data and analytic services, such as Amazon DynamoDB, Amazon EMR, Amazon Kinesis, and Amazon S3, to contribute to the data warehousing solution Architect the data warehouse Identify performance issues, optimize queries, and tune the database for better performance Use Amazon Redshift Spectrum to analyze data directly from an Amazon S3 bucket Use Amazon QuickSight to perform data analysis and visualization tasks against the data warehouse Data Warehousing on AWS introduces you to concepts, strategies, and best practices for designing a cloud-based data warehousing solution using Amazon Redshift, the petabyte-scale data warehouse in AWS. This course demonstrates how to collect, store, and prepare data for the data warehouse by using other AWS services such as Amazon DynamoDB, Amazon EMR, Amazon Kinesis, and Amazon S3. Additionally, this course demonstrates how to use Amazon QuickSight to perform analysis on your data Module 1: Introduction to Data Warehousing Relational databases Data warehousing concepts The intersection of data warehousing and big data Overview of data management in AWS Hands-on lab 1: Introduction to Amazon Redshift Module 2: Introduction to Amazon Redshift Conceptual overview Real-world use cases Hands-on lab 2: Launching an Amazon Redshift cluster Module 3: Launching clusters Building the cluster Connecting to the cluster Controlling access Database security Load data Hands-on lab 3: Optimizing database schemas Module 4: Designing the database schema Schemas and data types Columnar compression Data distribution styles Data sorting methods Module 5: Identifying data sources Data sources overview Amazon S3 Amazon DynamoDB Amazon EMR Amazon Kinesis Data Firehose AWS Lambda Database Loader for Amazon Redshift Hands-on lab 4: Loading real-time data into an Amazon Redshift database Module 6: Loading data Preparing Data Loading data using COPY Data Warehousing on AWS AWS Classroom Training Concurrent write operations Troubleshooting load issues Hands-on lab 5: Loading data with the COPY command Module 7: Writing queries and tuning for performance Amazon Redshift SQL User-Defined Functions (UDFs) Factors that affect query performance The EXPLAIN command and query plans Workload Management (WLM) Hands-on lab 6: Configuring workload management Module 8: Amazon Redshift Spectrum Amazon Redshift Spectrum Configuring data for Amazon Redshift Spectrum Amazon Redshift Spectrum Queries Hands-on lab 7: Using Amazon Redshift Spectrum Module 9: Maintaining clusters Audit logging Performance monitoring Events and notifications Lab 8: Auditing and monitoring clusters Resizing clusters Backing up and restoring clusters Resource tagging and limits and constraints Hands-on lab 9: Backing up, restoring and resizing clusters Module 10: Analyzing and visualizing data Power of visualizations Building dashboards Amazon QuickSight editions and feature
This course is aimed at those who analyse and identify asbestos from within samples collected on site
Get help with you BTEC assignments at affordable prices and live a stress free life.
Bad news - people don't buy your product. Better news - they don't buy anyone else's product either. Best news - they do buy what a product gives them, whether it be removing 'pain' or giving 'pleasure'. So what a challenge it is that every single person buys your product for a slightly different reason! What's the secret to selling in that sort of sales environment? This programme provides a great roadmap. This course will help participants: Build rapport with authenticity Use open questions, listening and summary to properly understand the prospect Use 'impact' questions to 'stack the pain' of remaining with the status quo Convert features into personalised benefits that reflect stated needs Handle objections with calm confidence Identify buying signals Close effectively Convey credible urgency centred on the prospect's - not the salesperson's - interests 1 What makes a customer buy any product? Moving towards 'pleasure' Moving away from 'pain' Robert Cialdini's Psychology of Influence - buying motives Understanding what your product does for customers Why there is never a 'one size fits all' approach What are the real 'unique selling points' and why the salesperson is the real 'USP' At what point does the customer emotionally buy your product? 2 Getting past gatekeepers What gatekeepers' motivations are How to make them your friend rather than your enemy How to make your call harder to block than to put through How to control the gatekeeper with questions, not answers Using Cialdini's 'reciprocity' law to get put through more often Practical exercise in which the trainer poses as gatekeeper 3 Questioning and listening skills How to use open questions to get the customer talking What questions to avoid and why How to 'stack the pain' of the status quo with 'impact questions' Practical 'pain stacking' exercise in pairs What listening is and what it isn't Question funnelling - how to earn deeper disclosure through probing Practical funnelling exercise in pairs The power of summary 4 How to create tailored benefits and not 'dive into solution' What is 'diving into solution'? Examples and analogies Why it is to be avoided Practical exercise in pairs - how it feels to have solutions offered up too early How to avoid 'feature-dumping' What is 'value selling'? How to create tailored benefits How to convert product features into benefits How to deal with the prospect's competitor allegiance 5 Handling objections and testing the water How to overcome the price objection by selling value Common objections the participants encounter and answers that work The objections salespeople carry in their own heads The 'A-C-E' objection-handling model How to uncover objections When - and when not - to trial close 6 Closing skills Why salespeople often close too early How to identify buying signals How to use urgency with skill and effectiveness Four killer closing techniques that work How to avoid buying the product back by careless post-sale talk How to ask for referrals for your product How to 'farm' the account for future opportunities 7 Wrap-up Key learnings from each participant Individual action planning - steps that can and will be implemented in the workplace
This intensive one-day training programme has been developed to help those involved in producing specifications create high quality documents in an organised and effective way. The programme explains the primary purpose of specifications and the importance of understanding the context in which they are used. It focuses particularly on how to develop and structure content and write requirements that are clear and concise. The methods and techniques presented will provide a practical foundation course for those new to the topic whilst offering new insights to those with more experience. The objectives of the workshop are to: Review and discuss the role and purpose of specifications Present a structured approach for organising and producing specifications Explain each of the key steps involved in creating effective specifications Review some methods for assisting in defining requirements Explain how to define the scope and develop the structure for a specification Present methods to assist the writing and editing of specifications Review how specifications should be issued and controlled 1 Introduction Course objectives Review of participants' needs and objectives 2 Specifications in perspective The role and purpose of specifications The impact of specifications on commercial performance The qualities of an effective specification The five key steps of 'POWER' writing: prepare-organise-write-edit-release 3 Step 1: Preparing to write Defining the purpose the specification; integrating the specification and contract Deciding how to specify: when to specify in functional and technical terms Getting the right people involved at the right time; engaging stakeholders Applying procedures for writing, issuing and controlling specifications 4 Step 2: Organising the specification content Scoping the document: scope maps, check lists, structured brainstorming Clarifying requirements; separating needs and desires Dealing with requirements that are difficult to quantify Useful techniques: cost benefit analysis, Pareto analysis Deciding what goes where; typical contents and layout for a specification Creating and using model forms: typical sections and sub sections 5 Step 3: Writing the specification Identifying and understanding the readers needs Choosing and using the right words; dealing with jargon Important words; will, shall, must; building a glossary Using sentence structure and punctuation to best effect Understanding the impact of style, format and appearance Avoiding common causes of ambiguity; being concise and ensuring clarity 6 Step 4: Editing the specification Why editing is difficult; how to develop a personal editing strategy Key areas to review: structure, content, accuracy, clarity, style and grammar Editing tools and techniques 7 Step 5: Releasing and controlling the specification Key requirements for document issue and control Final formatting and publication issues; document approval Requirements management: managing revisions and changes 8 Course review and action planning What actions should be implemented to improve specifications? Conclusion
Duration 5 Days 30 CPD hours This course is intended for Network security engineers ISE administrators Wireless network security engineers Cisco integrators and partners Overview After taking this course, you should be able to: Describe Cisco ISE deployments, including core deployment components and how they interact to create a cohesive security architecture. Describe the advantages of such a deployment and how each Cisco ISE capability contributes to these advantages. Describe concepts and configure components related to 802.1X and MAC Authentication Bypass (MAB) authentication, identity management, and certificate services. Describe how Cisco ISE policy sets are used to implement authentication and authorization, and how to leverage this capability to meet the needs of your organization. Describe third-party Network Access Devices (NADs), Cisco TrustSec, and Easy Connect. Describe and configure web authentication, processes, operation, and guest services, including guest access components and various guest access scenarios. Describe and configure Cisco ISE profiling services, and understand how to monitor these services to enhance your situational awareness about network-connected endpoints. Describe best practices for deploying this profiler service in your specific environment. Describe BYOD challenges, solutions, processes, and portals. Configure a BYOD solution, and describe the relationship between BYOD processes and their related configuration components. Describe and configure various certificates related to a BYOD solution. Describe the value of the My Devices portal and how to configure this portal. Describe endpoint compliance, compliance components, posture agents, posture deployment and licensing, and the posture service in Cisco ISE. Describe and configure TACACS+ device administration using Cisco ISE, including command sets, profiles, and policy sets. Understand the role of TACACS+ within the Authentication, Authentication, and Accounting (AAA) framework and the differences between the RADIUS and TACACS+ protocols. Migrate TACACS+ functionality from Cisco Secure Access Control System (ACS) to Cisco ISE, using a migration tool. Implementing and Configuring Cisco Identity Services Engine (SISE) v3.0 is a Cisco ISE training program that discusses the Cisco Identity Services Engine, an identity and access control policy platform that provides a single policy plane across the entire organization, combining multiple services, including authentication, authorization, and accounting (AAA), posture, profiling, device onboarding, and guest management, into a single context-aware identity-based platform. This CCNA course provides students with the knowledge and skills to enforce security posture compliance for wired and wireless endpoints as well as enhance infrastructure security using the Cisco ISE. Introducing Cisco ISE Architecture and Deployment Using Cisco ISE as a Network Access Policy Engine Cisco ISE Use Cases Describing Cisco ISE Functions Cisco ISE Deployment Models Context Visibility Cisco ISE Policy Enforcement Using 802.1X for Wired and Wireless Access Using MAC Authentication Bypass for Wired and Wireless Access Introducing Identity Management Configuring Certificate Services Introducing Cisco ISE Policy Implementing Third-Party Network Access Device Support Introducing Cisco TrustSec Cisco TrustSec Configuration Easy Connect Web Authentication and Guest Services Introducing Web Access with Cisco ISE Introducing Guest Access Components Configuring Guest Access Settings Configuring Sponsor and Guest Portals Cisco ISE Profiler Introducing Cisco ISE Profiler Profiling Deployment and Best Practices Cisco ISE BYOD Introducing the Cisco ISE BYOD Process Describing BYOD Flow Configuring the My Devices Portal Configuring Certificates in BYOD Scenarios Cisco ISE Endpoint Compliance Services Introducing Endpoint Compliance Services Configuring Client Posture Services and Provisioning in Cisco ISE Working with Network Access Devices Review TACACS+ Cisco ISE TACACS+ Device Administration Configure TACACS+ Device Administration TACACS+ Device Administration Guidelines and Best Practices Migrating from Cisco ACS to Cisco ISE Lab outline Access the SISE Lab and Install ISE 2.4 Configure Initial Cisco ISE Setup, GUI Familiarization, and System Certificate Usage Integrate Cisco ISE with Active Directory Configure Basic Policy on Cisco ISE Configure Policy Sets Configure Access Policy for Easy Connect Configure Guest Access Configure Guest Access Operations Create Guest Reports Configure Profiling Customize the Cisco ISE Profiling Configuration Create Cisco ISE Profiling Reports Configure BYOD Blacklisting a Device Configure Cisco ISE Compliance Services Configure Client Provisioning Configure Posture Policies Test and Monitor Compliance-Based Access Test Compliance Policy Configure Cisco ISE for Basic Device Administration Configure TACACS+ Command Authorization
Duration 2 Days 12 CPD hours This course is intended for This training is ideally suited for data analysts, IT professionals, and software developers who seek to augment their data processing and analytics capabilities. It will also benefit system administrators and data engineers who wish to harness Elastic Stack's functionalities for efficient system logging, monitoring, and robust data visualization. With a focus on practical application, this course is perfect for those aspiring to solve complex data challenges in real-time environments across diverse industry verticals. Overview This course combines engaging instructor-led presentations and useful demonstrations with valuable hands-on labs and engaging group activities. Throughout the course you'll explore: New features and updates introduced in Elastic Stack 7.0 Fundamentals of Elastic Stack including Elasticsearch, Logstash, and Kibana Useful tips for using Elastic Cloud and deploying Elastic Stack in production environments How to install and configure an Elasticsearch architecture How to solve the full-text search problem with Elasticsearch Powerful analytics capabilities through aggregations using Elasticsearch How to build a data pipeline to transfer data from a variety of sources into Elasticsearch for analysis How to create interactive dashboards for effective storytelling with your data using Kibana How to secure, monitor and use Elastic Stack's alerting and reporting capabilities The Elastic Stack is a powerful combination of tools for techniques such as distributed search, analytics, logging, and visualization of data. Elastic Stack 7.0 encompasses new features and capabilities that will enable you to find unique insights into analytics using these techniques. Geared for experienced data analysts, IT professionals, and software developers who seek to augment their data processing and analytics capabilities, Working with Elasticsearch will explore how to use Elastic Stack and Elasticsearch efficiently to build powerful real-time data processing applications. Throughout the two-day hands-on course, you?ll explore the power of this robust toolset that enables advanced distributed search, analytics, logging, and visualization of data, enabled by new features in Elastic Stack 7.0. You?ll delve into the core functionalities of Elastic Stack, understanding the role of each component in constructing potent real-time data processing applications. You?ll gain proficiency in Elasticsearch for distributed searching and analytics, Logstash for logging, and Kibana for compelling data visualization. You?ll also explore the art of crafting custom plugins using Kibana and Beats, and familiarize yourself with Elastic X-Pack, a vital extension for effective security and monitoring. The course also covers essentials like Elasticsearch architecture, solving full-text search problems, data pipeline building, and creating interactive Kibana dashboards. Learn how to deploy Elastic Stack in production environments and explore the powerful analytics capabilities offered through Elasticsearch aggregations. The course will also touch upon securing, monitoring, and utilizing Elastic Stack's alerting and reporting capabilities. Hands-on labs, captivating demonstrations, and interactive group activities enrich your learning journey throughout the course. Introducing Elastic Stack What is Elasticsearch, and why use it? Exploring the components of the Elastic Stack Use cases of Elastic Stack Downloading and installing Getting Started with Elasticsearch Using the Kibana Console UI Core concepts of Elasticsearch CRUD operations Creating indexes and taking control of mapping REST API overview Searching - What is Relevant The basics of text analysis Searching from structured data Searching from the full text Writing compound queries Modeling relationships Analytics with Elasticsearch The basics of aggregations Preparing data for analysis Metric aggregations Bucket aggregations Pipeline aggregations Substantial Lab and Case Study Analyzing Log Data Log analysis challenges Using Logstash The Logstash architecture Overview of Logstash plugins Ingest node Visualizing Data with Kibana Downloading and installing Kibana Preparing data Kibana UI Timelion Using plugins
Duration 5 Days 30 CPD hours This course is intended for Implementer Overview Enrolling in this course will help you better understand and leverage PeopleSoft Payroll for North America (USA) payroll requirements and processes. This knowledge will help you create, adjust and troubleshoot your organization's employee payroll. Learn Off-Cycle Payroll Events In addition to typical on-cycle payroll processing, Payroll for North America provides functionality for a variety of off-cycle payroll events and other payroll requirements. This course will illustrate how to reverse a paycheck, record a manual check, produce online checks and final checks and create a gross up check. In addition, you'll also learn the necessary steps to set up and process mid-period job changes and multiple jobs. Finally, you'll set up and processes benefit deductions and garnishments. This PeopleSoft Payroll - US Rel 9.2 training teaches you how to set up and maintain employee tax data, additional pay, general deductions and direct deposits. Expert Oracle University instructors will show you how to use this solution to calculate payroll, review calculation results, identify and correct errors, confirm payroll and more. Setting Up PeopleSoft HRMS Tables for Payroll Processing Identifying HRMS Tables That Impact Payroll Processing Describing Installation Table Setup for PeopleSoft Enterprise Payroll for North America Describing the Role of SetID, Location, and Department in Payroll Processing Describing Company Table Setup Desc Setting Up Payroll Tables Identifying Payroll Setup Tables Setting Up Source Bank Accounts Creating Special Accumulators Setting Up Earnings Codes Setting Up Earnings Programs Describing Shift Pay Setup Creating a Pay Group Creating a Rate Code Setting Up U.S. Payroll Tax Tables Identifying Tax Table Maintenance Responsibility Describing PeopleSoft-Maintained Tax Tables Setting Up Customer-Maintained Tax Tables Setting Up Employee Data Identifying Sources of Employee Data Setting Up an Employee Instance Entering and Viewing Employee Job Data Identifying Employee Pay Data Updating Employee Tax Data Assigning Additional Pay to Employees Assigning General Deductions to Employees Updating P Creating and Updating Paysheets Describing Paysheets in Payroll for North America Describing Balance ID Creation Creating Pay Calendars Setting Up Pay Run IDs Creating Paysheets Viewing and Updating Paysheets and Paylines Describing the Payroll Unsheet Process Calculating Payroll Describing Payroll Calculation Running Preliminary Payroll Calculation Running Final Payroll Calculation Confirming Payroll and Producing Checks and Reports Confirming a Payroll Viewing Confirmed Payroll Results Online Printing Checks and Advices Describing Check Reprinting Describing Direct Deposit Transmittals and Reports Describing Payroll and Tax Reports Identifying Methods of Reversing Payroll Confirmati Processing Off-Cycle Payrolls Identifying Off-Cycle Payroll Processing Reversing a Paycheck Describing Reversal/Adjustment Processing Recording a Manual Check Producing an Online Check Describing Retroactive Processing Setting Up and Processing Additional Payroll Functionality Setting Up a Holiday Schedule Setting Up Advanced Earnings Options Setting Up Multiple Jobs Processing Setting Up and Processing Mid-period Job Changes Processing Gross Ups Setting Up and Processing Benefit Deductions in Payroll Setting Up Deductions and Earnings for Benefits Calculations Updating a Benefit Program and Enrolling Employees Analyzing Benefits-Related Payroll Reports Setting Up and Processing Garnishments Identifying Garnishment Setup Steps Describing PeopleSoft-Maintained Garnishment Tables Setting Up Company-Level Tables for Garnishment Processing Assigning an Employee Garnishment Deduction Setting Up Employee Garnishment Specification Data Reviewing Emp Describing PeopleSoft Enterprise ePay Identifying HRMS Tables That Impact Payroll Processing Describing Installation Table Setup for PeopleSoft Enterprise Payroll for North America Describing the Role of SetID, Location, and Department in Payroll Processing Describing Company Table Setup Desc
Duration 3 Days 18 CPD hours This course is intended for System administrators System engineers Consultants Overview By the end of the course, you should be able to meet the following objectives: Identify the features and benefits of VMware Aria Operations for Logs Determine which VMware Aria Operations for Logs cluster meets your monitoring requirements Describe the VMware Aria Operations for Logs architecture and use cases Deploy and configure a VMware Aria Operations for Logs cluster Use the Explore Logs page to get a deep understanding of log data Create and manage queries Manage VMware Aria Operations for Logs agents and agent Groups Create custom dashboards Explain how to use the VMware Aria Operations for Logs widgets Extend the capabilities of VMware Aria Operations for Logs by adding content packs and configuring solutions Discuss VMware Aria Operations for Logs (SaaS) This three-day course features hands-on training that focuses on deploying, configuring, and managing VMware Aria Operations? for Logs 8.12. You will learn the UI enhancements, features, architecture, use cases, and benefits of VMware Aria Operations for Logs. This course provides you with the knowledge and skills to use VMware Aria Operations for Logs 8.12 to monitor your environment. Course Introduction Introductions and course logistics Course objectives Introduction to VMware Aria Operations for Logs Describe the VMware Aria cloud management platform Describe the VMware Aria? use cases Describe the key capabilities of VMware Aria Operations for Logs Describe the requirements for a log analytics solution Explain the importance of efficient log management Navigate the VMware Aria Operations for Logs UI Describe the various stages of log processing VMware Aria Operations for Logs Architecture and Deployment Identify the minimum requirements for deploying VMware Aria Operations for Logs Explain how to use the VMware Aria Operations for Logs sizing calculator Describe VMware Aria Operations for Logs compatibility with other VMware products Describe the VMware Aria Operations for Logs architecture Explain how to install the VMware Aria Operations for Logs virtual appliance Analyzing Logs Describe the primary functions of the VMware Aria Operations for Logs UI Describe log events Use Explore Logs for understanding and analyzing the log data VMware Using Dashboards Alerts and Reports Create VMware Aria Operations for Logs custom dashboards Describe how to use the VMware Aria Operations for Logs widgets Configure alerts Explain how to view and manage reports Administering VMware Aria Operations for Logs Describe user access control in VMware Aria Operations for Logs Describe user management Configure VMware Aria Operations for Logs settings Managing Data Sources and Content packs Describe how to integrate VMware Operations for Logs with VMware Aria Operations for Logs Install and manage content packs Manage certificates Install and manage agents for VMware Aria Operations for Logs Describe the VMware Aria Operations for Logs Importer VMware Aria Operations for Logs Integrations Describe how to integrate VMware Operations for Logs with VMware Aria Operations for Logs Discuss the advantages of integrating VMware Operations for Logs with VMware Aria Operations for Logs Discuss the advantages of using the vSAN content pack Explain how to configure the NSX content pack VMware Aria Operations for Logs (SaaS) Explain the VMware Aria Operations for Logs (SaaS) architecture Describe the ingestion options for Aria Operations for Logs (SaaS) Discuss integration with on-premises Aria Operations for Logs
Duration 2 Days 12 CPD hours This course is intended for This course is designed for people who want to learn the Python programming language in preparation for using Python to develop software for a wide range of applications, such as data science, machine learning, artificial intelligence, and web development. Overview In this course, you will develop simple command-line programs in Python. You will: Set up Python and develop a simple application. Declare and perform operations on simple data types, including strings, numbers, and dates. Declare and perform operations on data structures, including lists, ranges, tuples, dictionaries, and sets. Write conditional statements and loops. Define and use functions, classes, and modules. Manage files and directories through code. Deal with exceptions. Though Python has been in use for nearly thirty years, it has become one of the most popular languages for software development, particularly within the fields of data science, machine learning, artificial intelligence, and web development?all areas in which Python is widely used. Whether you're relatively new to programming, or have experience in other programming languages, this course will provide you with a comprehensive first exposure to the Python programming language that can provide you with a quick start in Python, or as the foundation for further learning. You will learn elements of the Python 3 language and development strategies by creating a complete program that performs a wide range of operations on a variety of data types, structures, and objects, implements program logic through conditional statements and loops, structures code for reusability through functions, classes, and modules, reads and writes files, and handles error conditions. Lesson 1: Setting Up Python and Developing a Simple Application Topic A: Set Up the Development Environment Topic B: Write Python Statements Topic C: Create a Python Application Topic D: Prevent Errors Lesson 2: Processing Simple Data Types Topic A: Process Strings and Integers Topic B: Process Decimals, Floats, and Mixed Number Types Lesson 3: Processing Data Structures Topic A: Process Ordered Data Structures Topic B: Process Unordered Data Structures Lesson 4: Writing Conditional Statements and Loops in Python Topic A: Write a Conditional Statement Topic B: Write a Loop Lesson 5: Structuring Code for Reuse Topic A: Define and Call a Function Topic B: Define and Instantiate a Class Topic C: Import and Use a Module Lesson 6: Writing Code to Process Files and Directories Topic A: Write to a Text File Topic B: Read from a Text File Topic C: Get the Contents of a Directory Topic D: Manage Files and Directories Lesson 7: Dealing with Exceptions Topic A: Handle Exceptions Topic B: Raise Exceptions