• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

37364 Courses delivered Online

Accounting courses

By Osborne Training

Want a new direction for your career? Think Accountancy, according to statistics, the average salary for Accountants is £50,000, it is the sector where the employability rate is higher than any other sector. Whether you're a school leaver, already employed or simply looking for a career change a career in accountancy could be a real option for you. What is AAT? The AAT is an internationally recognised accounting qualification and over 100,000 people are currently benefiting from gaining an AAT qualification and full AAT membership. Gaining the qualification will help you support yourself throughout your accountancy career. AAT Accounting Courses Overview: First of all, the AAT qualification consists of four progressive qualification levels (1, 2, 3 & 4) which will cover the key areas of Financial Accounting, Management Accounting, Taxation, Audit and Report Writing. Although you can start from Level 1, you may start from Level 2 if you have basic math and numeracy skills. In order to complete the full AAT Accounting qualification and gain full membership of the AAT, you will need to complete Level 3 and Level 4. Level 2 is recommended as an entry-level if you have no experience or knowledge of accounting and bookkeeping. The AAT qualification for accounting is broken down into three levels: AAT Level 2 Foundation Certificate in Accounting (5 Papers/Subjects) AAT Level 3 Advanced Diploma in Accounting (6 Papers/Subjects) Finally AAT Level 4 Professional Diploma in Accounting (6 Papers/Subjects) Hence, the AAT Accounting Qualification gives you practical, internationally recognised finance and accountancy skills that can open doors for you in many industries across the world. Finally, AAT offers a range of benefits for student members (including study support, career advice to help find the perfect job and exclusive discounts), as well as a route to progress into chartered accountancy. Moreover, if you choose to further your studies with any of the leading chartered accountancy professional bodies like ACCA, CIMA, CIPFA etc. your AAT qualification could make you eligible for generous exemptions. A Certificate of Attendance. A newly qualified AAT member can expect to earn an average of £21,600. Moreover, the AAT member will have been earning throughout their training and will have avoided student debt. Accounting technicians work at all levels of finance and accounting, depending on the level of their career. Some accounting technicians work as accounts clerks, others go on to become managing directors or finance directors of well-known companies. Some go to work as a self-employed accountant as AAT allows the student to become Accredited.

Accounting courses
Delivered OnlineFlexible Dates
Price on Enquiry

Python 3 Essentials

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Experienced Programmers and Systems Administrators. Overview Throughout the course students will be led through a series of progressively advanced topics, where each topic consists of lecture, group discussion, comprehensive hands-on lab exercises, and lab review. This course is ?skills-centric?, designed to train attendees in core Python and web development skills beyond an intermediate level, coupling the most current, effective techniques with best practices. Working within in an engaging, hands-on learning environment, guided by our expert Python practitioner, students will learn to: ? Create working Python scripts following best practices ? Use python data types appropriately ? Read and write files with both text and binary data ? Search and replace text with regular expressions ? Get familiar with the standard library and its work-saving modules ? Use lesser-known but powerful Python data types ? Create 'real-world', professional Python applications ? Work with dates, times, and calendars ? Know when to use collections such as lists, dictionaries, and sets ? Understand Pythonic features such as comprehensions and iterators ? Write robust code using exception handling An introductory and beyond-level practical, hands-on Python training course that leads the student from the basics of writing and running Python scripts to more advanced features. An Overview of Python What is python? 1 -- An overview of Python What is python? Python Timeline Advantages/Disadvantages of Python Getting help with pydoc The Python Environment Starting Python Using the interpreter Running a Python script Python scripts on Unix/Windows Editors and IDEs Getting Started Using variables Built-in functions Strings Numbers Converting among types Writing to the screen Command line parameters Flow Control About flow control White space Conditional expressions Relational and Boolean operators While loops Alternate loop exits Sequences About sequences Lists and list methods Tuples Indexing and slicing Iterating through a sequence Sequence functions, keywords, and operators List comprehensions Generator Expressions Nested sequences Working with files File overview Opening a text file Reading a text file Writing to a text file Reading and writing raw (binary) data Converting binary data with struct Dictionaries and Sets About dictionaries Creating dictionaries Iterating through a dictionary About sets Creating sets Working with sets Functions Defining functions Parameters Global and local scope Nested functions Returning values Sorting The sorted() function Alternate keys Lambda functions Sorting collections Using operator.itemgetter() Reverse sorting Errors and Exception Handling Syntax errors Exceptions Using try/catch/else/finally Handling multiple exceptions Ignoring exceptions Modules and Packages The import statement Module search path Creating Modules Using packages Function and Module aliases Classes About o-o programming Defining classes Constructors Methods Instance data Properties Class methods and data Regular Expressions RE syntax overview RE Objects Searching and matching Compilation flags Groups and special groups Replacing text Splitting strings The standard library The sys module Launching external programs Math functions Random numbers The string module Reading CSV data Dates and times Working with dates and times Translating timestamps Parsing dates from text Formatting dates Calendar data Working with the file system Paths, directories, and filenames Checking for existence Permissions and other file attributes Walking directory trees Creating filters with fileinput Using shutil for file operations 17 ? Advanced data handling Defaultdict and Counter Prettyprinting data structures Compressed archives (zip, gzip, tar, etc.) Persistent data Advanced data handling Defaultdict and Counter Prettyprinting data structures Compressed archives (zip, gzip, tar, etc.) Persistent data Network services Grabbing web content Sending email Using SSH for remote access Using FTP Writing real-life applications Parsing command-line options Detecting the current platform Trapping signals Implementing logging Python Timeline Advantages/Disadvantages of Python Getting help with pydoc

Python 3 Essentials
Delivered OnlineFlexible Dates
Price on Enquiry

BA20 - Business Process Improvement

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for It is appropriate for Managers, Executives, Project Managers, Business Analysts, Business and IT stakeholders working with analysts, Quality and process engineers, technicians, managers; supervisors, team leaders, and process operators. Overview Describe business process improvement (BPI) business drivers.Plan, manage and close requirements for a Business Process Improvement project Understand the essential elements of a successful BPI initiative.Identify candidate business processes for improvement.Understand the essential elements of a successful BPI initiative.Identify candidate business processes for improvement.Apply a methodology to business process improvement projects. This 2-day course aims at introducing its attendees to the core values, principles, and practices of Business Process Improvement. Introduction - A Business Process Improvement (BPI) Overview Why are we here today? What is BPI? Benefits of BPI Specific challenges/obstacles and successes Process improvement examples: Industry specific examples Famous debacles to avoid and successes to emulate Your role in helping to identify problems Overview of the Joiner 7-Step Method What is the Joiner 7-Step Method? Walkthrough of the Joiner 7-Step Method Template: Introduce and review Process Improvement Template Case Study Exercise: Read and discuss introduction to the Case Study Step #1: Initiate the Project Types of business problems typically encountered at insurance companies and banks How to recognize a business-related problem Identifying the gaps (delta between current and future states) Ownership of the project and the business problem Defining measurable success criteria Case Study Exercise: Complete the Problem Statement section (Step #1) of the template Step #2: Define Current Situation What are symptoms of a problem? Looking for symptoms of the problem Performing Stakeholder Analysis Technique: View a RACI Matrix Defining the impacts caused by the problem Technique: Business Process Modeling (As-Is) Understand how to draw an As-Is Business Process Model Case Study Exercise: Complete the Define Current Situation section (Step #2) of the template Step #3: Identify Root Causes What are root causes? Performing Root Cause Analysis Technique: Fishbone Diagram using the cafeteria example Case Study Exercise: Discuss a Fishbone Diagram Technique: Pareto Chart (discuss and show example) Case Study Exercise: Complete the Identify Root Causes section (Step #3) of the template Step #4: Develop Solutions Identifying options for problem resolution Avoid jumping to conclusions Technique: Brainstorming Case Study Exercise: Conduct a Brainstorming Session Recognizing pros and cons for each option Technique: Kempner-Tregoe (?Must-Have? vs. ?Nice-to-Have?) Case Study Exercise: Determine best solution using a ?simple? Kempner-Tregoe model Case Study Exercise: Complete the Develop Solutions section (Step #4) of the template Step #5: Define Measurable Results Prototyping the solution Technique: Business Process Modeling (To-Be) Measuring results against the success criteria (Step #1) Case Study Exercise: Review changes to an As-Is Business Process Model Case Study Exercise: Complete the Define Measurable Results section (Step #5) of the template Step #6: Standardize Process Defining how the process will be documented Plan and understand organizational readiness Discuss how employees are empowered to identify and act upon their ideas Identifying follow-up needs (i.e., training) for the staff that will be impacted Technique: Communication Plan Case Study Exercise: Complete the Standardize Process section (Step #6) of the template Step #7: Determine Future Plans Monitoring the process for Continuous Process Improvement (The ?Plan-Do-Check-Act? Cycle) Understand how to sustain the improvements made by the Joiner 7-Step Method Technique: PDCA form Case Study Exercise: Complete the Determine Future Plans section (Step #7) of the template Going Forward with a Plan of Action Identifying process problems in your organization Individual Exercise: Name three (3) possible areas for improvement Prioritize and define the next steps Individual Exercise: Using a new template complete Step 2 & Step 3 for one possible area for improvement you have identified

BA20 - Business Process Improvement
Delivered OnlineFlexible Dates
Price on Enquiry

Certified Information Privacy Professional (CIPP/US)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Data Protection Officers Data Protection Managers Auditors Legal Compliance Officers Security Manager Information Managers Anyone involved with data protection processes and programs Overview It will show the world that students know privacy laws and regulations and how to apply them, and that students know how to secure your place in the information economy. When students earn a CIPP credential, it means they've gained a foundational understanding of broad global concepts of privacy and data protection law and practice, including: jurisdictional laws, regulations and enforcement models; essential privacy concepts and principals; legal requirements for handling and transferring data and more. The Certified Information Privacy Professional/United States (CIPP/US) program, developed by the International Association of Privacy Professionals (IAPP) - the world?s largest comprehensive global information privacy community and resource, was the first professional certification ever to be offered in information privacy. The CIPP/US credential demonstrates a strong foundation in U.S. privacy laws and regulations and understanding of the legal requirements for the responsible transfer of sensitive personal data to/from the U.S., the EU and other jurisdictions.This course will provide you with a foundational understanding of broad global concepts of privacy and data protection law and practice, including: jurisdictional laws, regulations and enforcement models; essential privacy concepts and principals; legal requirements for handling and transferring data and more. Introduction to privacy Modern history of privacy Introduction to personal information Overview of data protection roles Summary of modern privacy frameworks Structure of U.S. law Structure and sources of U.S. law and relevant terms Governmental bodies having privacy and information security authority General Data Protection Regulation overview (GDPR) High-level overview of the GDPR Significance of the GDPR to U.S. organizations Roles and responsibilities outlined in the law California Consumer Privacy Act of 2018 (CCPA) High-level overview of the newly passed California Consumer Privacy Act of 2018 Scope Consumer rights Business obligations Enforcement Enforcement of U.S. privacy and security laws Distinguishing between criminal and civil liability Comparing federal and state authority Theories of legal liability Enforcement powers and responsibilities of government bodies, such as the FTC and state attorneys general Information management from a U.S. perspective Developing a privacy program Role of privacy professionals and accountability Employee training User preferences Managing vendors Data classification Federal versus state authority Differences between federal and state authority Preemption Healthcare Privacy laws in healthcare Major components of HIPAA Development of HITECH Privacy protections mandated by other significant healthcare laws Financial privacy Goals of financial privacy laws Key concepts of FCRA, FACTA and GLBA Red Flags Rule, Dodd-Frank and consumer protection laws Education Privacy rights and protections under FERPA Recent amendments provided by PPRA and NCLBA Telecommunications and marketing Rules and regulations of telecommunications entities Laws that govern marketing Addressing privacy in the digital advertising Law enforcement and privacy Privacy laws on intercepting communication Telecommunications industry and law enforcement Laws ensuring rights to financial privacy National security and privacy Rules and regulations on intercepting communication Evolution of the law Collaboration of government agencies and private companies to improve cybersecurity Civil litigation and privacy Privacy issues related to litigation Electronic discovery, redaction and protective orders U.S. discovery rules versus foreign laws Legal overview of workplace privacy Federal and state laws regulating and protecting employee privacy Federal laws prohibiting discrimination Privacy before, during and after employment Lifecycle of employee privacy Background screening Employee monitoring Investigating misconduct and termination Antidiscrimination laws ?Bring your own device? policies State data security laws State laws impacting data security Social Security number use regulation Laws governing data destruction Data breach notification laws Scope of state data breach notification law Nine elements of state data breach notification laws Major differences in state laws

Certified Information Privacy Professional (CIPP/US)
Delivered OnlineFlexible Dates
Price on Enquiry

The GDPR Primer for Data Protection Officers

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for A prior understanding of EU Data Protection legislation is recommended. Candidates are typically management professionals and decision-makers who already have responsibility for data protection compliance within their organisation.Co-Requisite Subjects Candidates should have a good understanding of their own organisation?s data management activities through the life cycle from initial acquisition, through the various areas of processing and usage, to eventual removal or destruction. Overview To equip the learner with a foundational understanding of the principles of the General Data Protection Regulation (GDPR) and to provide constructive suggestions on implementing compliant processes. The social, historical and legal background leading to the General Data Protection Regulation (GDPR) The scope and global context of the GDPR The key concepts within the GDPR The definition of all key words and phrases relating to this Data Protection regulation Principle One: The criteria governing fair, open and transparent processing of personal data Principle Two: Purpose Limitation, the challenge of limiting the processing within the context of specified and lawful purposes Principle Three: Minimisation of processing, and ensuring that only that data is processed which is necessary to achieve the purpose. Principle Two: Purpose Limitation, the challenge of limiting the processing within the context of specified and lawful purposes Principle Three: Minimisation of processing, and ensuring that only that data is processed which is necessary to achieve the purpose. Principle Four: Ensuring that any personal data held by the organisation is kept accurate and current, and that any processing of such data is appropriate Principle Five: Management and storage of personal data in a manner that meets regulatory obligations, while minimising the time that the individual remains identifiable Principle Six: The criteria governing safe, secure and confidential processing of personal data in order to protect its integrity Principle Seven: The key roles, responsibilities and accountabilities of those involved in Data Management within an organisation Establishment within a single Member State Joint Controllers Privacy by Design and by Default Nominated Representatives Third-party Contracts and shared liability Logging of data management processes Data Breach Notification obligations Privacy Impact Assessments Overseas transfer of personal data L2.8 The Data Subject Rights, and their implications for the Data Controller and the Data Processor L2.8.1 The ?right to be forgotten? L2.8.2 The right to restriction of processing L2.8.3 The right to object to certain processing L2.8.4 The right to have inaccurate data amended or erased L2.8.5 The right to data portability L2.8.6 The right of access to one?s personal data L2.8.7 Rights in relation to automated decision-making and profiling The role of the Data Protection Officer (DPO) The role of the Data Protection Officer (DPO) Criteria for designating a DPO Tasks of the DPO Position of the DPO within the organisation The role of the Supervisory Authority within the Member State The Lead Supervisory Authority and independence Investigative, corrective and advisory powers Independence of the Supervisory Authority Collaboration with other Supervisory Authorities Codes of Conduct and Certification The role, powers and tasks of the European Data Protection Board (EDPB) The remedies, liabilities and penalties available under the GDPR Right to raise a complaint Right to representation Right to effective judicial remedy Right to compensation and liability Administrative fines of up to ?10m or 2% of GAT Administrative fines of up to ?20m or 4% of GAT Provisions for specific processing situations Freedom of Expression Processing of official documents Processing of National Identification Numbers Processing regarding employment Processing for archiving purposes Processing under obligations of official secrecy Processing of data by religious organisations Preparing for implementation of the GDPR Review of data management policies and procedures Review of data assets and security structures Training and Awareness-raising Data management governance structures Embedding Privacy By Design and Default Codes of Conduct and Certification against standards Breach detection and notification procedures Review of third-party agreements, contracts

The GDPR Primer for Data Protection Officers
Delivered OnlineFlexible Dates
Price on Enquiry

Successfully managing smaller projects (In-House)

By The In House Training Company

The aim of this course is to provide an overview of the principles and practice for leading and managing a portfolio of smaller projects in a multi-project / multi-task environment. It presents a range of practical methods and techniques relevant to the smaller project scenario, using exercises and case studies to show how these can be applied. The scope of the programme includes: The course also emphasises the importance of the leadership and team-working skills needed by project managers and team members in carrying out their roles. The principal training objectives for this programme are to: Explain and demonstrate the key principles of successful project management Demonstrate a range of useful project management tools and techniques Define the role, and help participants understand the skills required by, the project leader Provide a structured framework to help participants manage multiple projects Identify opportunities to improve project management within the organisation DAY ONE 1 Introduction (Course sponsor) Why this programme has been developed Review of participants' needs and objectives 2 Managing smaller projects Projects and project management Lessons from past projects; the essential requirements for success Differences between projects; characteristic project life cycles Key issues and challenges of smaller projects The multi-project world; project portfolio management 3 Project exercise Syndicate teams plan and manage a small project Review of the project exercise: What are the keys to successful management of small projects? 4 Setting up the project Getting organised Managing the definition process Identifying and managing project stakeholders Working with the customer to define the scope and agree deliverables 5 Case study 1 Defining the project scope and deliverables Syndicate teams define the scope and deliverables for a typical project 6 Project planning The importance and cost benefit of effective planning Planning the plan; deciding how detailed a plan to create Packaging the work and estimating timescales and costs Developing project / resource schedules; setting milestones for control v Identifying and managing critical path activities 7 Case study 2 Creating the project plan Syndicate teams develop and analyse the project plan DAY TWO 8 Managing project risks Identifying risks to the project outcome, timescale and cost Evaluating risks and adopting an appropriate risk strategy Defining risk ownership; keeping a simple risk log Keeping risk management up to date; staying pro-active Integrating planning and risk management 9 Project control Managing change, minimising scope creep Selecting the data needed to provide early warning of problems Monitoring performance easily with 'S' curves and slip charts Using trend forecasting to assess true project status Running project review meetings 10 Managing a multi-project portfolio Understanding the world of multiple projects Establishing ownership of project / programme management Classifying projects and creating the 'master schedule' Defining and applying project lifecycle management Resource management: essential pre-requisites and mechanisms Project prioritisation criteria and techniques; pain / gain analysis 11 Managing the multi-project team Characteristics of small project teams / part-time team membership Clarifying line and project management responsibilities Implementing effective manpower planning Establishing professional working practices in the team Developing project management competences in the team Establishing team roles and integrating team members 12 Course review and transfer planning (Course sponsor present) Identify actions to be implemented individually Identify corporate opportunities for improving project management Sponsor-led review and discussion of proposals Conclusion

Successfully managing smaller projects (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry

Engaging Leadership - accredited by the Institute of Leadership

By Beyond Theory: business training & coaching

leadership management training course

Engaging Leadership - accredited by the Institute of Leadership
Delivered in Northampton or UK Wide or OnlineFlexible Dates
Price on Enquiry

Customer Service Leadership - accredited by the Institute of Leadership

By Beyond Theory: business training & coaching

leadership management training course

Customer Service Leadership - accredited by the Institute of Leadership
Delivered in Northampton or UK Wide or OnlineFlexible Dates
Price on Enquiry

Dealing with challenging customers (In-House)

By The In House Training Company

Wouldn't sales be a 'walk in the park' without challenging customers? Why is it that some customers are so difficult to please, so quick to call 'foul' at the slightest blip and so mean with their gratitude after we've bent over backwards to accommodate them? Whether we are looking at prospective or existing customers, there is a toolkit for dealing with the most challenging of them. This course will help participants: Use broad open questions to give the customer a platform for their opinions or issues Improve listening skills to really understand what's behind the customer's challenging style Probe specific phrases to show listening and earn deeper disclosure Use silence to let challenging customers 'blow off steam' Understand the negative impact of certain phrases on a challenging customer Summarise effectively and reassure the customer of our understanding of their needs Recognise the 'behaviour cycle' and avoid emotional escalation Understand 'transactional analysis' and how to bring people from 'child' to 'adult' state Create loyalty in customers who are slow to give trust 1 What makes a customer 'challenging'? Why customers challenge us - understanding their drivers 'Wearing their shoes' - seeing things from their perspective Understanding our own personality style How to flex with a style that is different from our own Ways to quickly recognise a customer's style The benefits of flexing with a challenging customer's style 2 Practical exercise - forum theatre Participants take it in turns to deal with the trainer (who plays the role of the challenging customer) Observers stop the action when they hear or see something they deem wrong The participant in the seat gets a chance to use a suggested alternative line The participant who makes the suggestion has the chance to occupy the seat and deliver it themselves Frequent feedback from the trainer as to how the participant's words are making him feel Opportunities to rewind the action if an ill-advised line is suggested and delivered Flipchart for capturing what worked, what didn't work and why Mehrabian principle - the importance of body language and tone over words used 3 Questioning and listening skills How to use open questions to get the customer talking What questions to avoid and why The use of pauses and silence to reduce tension and build trust What listening is and what it isn't Question funnelling - how to earn deeper disclosure through probing The power of summary 4 Transactional analysis explained What is transactional analysis (TA)? Exploring the TA states and why people behave in that way under pressure How to bring challenging customers to 'adult' state to reduce tension How 'parent' or 'child' behaviours can be inadvertently triggered Understanding the 'behavioural cycle' and how to break it Mini-role play 'vignettes' to demonstrate real time impact of ill-chosen words 5 How to build trust with challenging customers Techniques for placating current challenging customers Methods that the participants have already used effectively - understanding why those methods worked and how other participants can model them Participants' experiences of trust having been lost - understanding why those experiences had that negative outcome How to 'go the extra mile' with challenging customers 6 Bringing a 'real' challenging customer to life Participants give the trainer a brief profile of a specific challenging customer of theirs 5-10 minute roleplay in which the trainer brings that individual to life Observing participants - without interrupting - make notes on what is and isn't working Trainer stops the action half-way through to give feedback on how he is feeling Participant goes back into the roleplay having recalibrated their approach based on feedback Observers give feedback on what did and didn't work Trainer comes out of character to explain the impact of the participant's words and behaviours 7 Wrap-up Key learnings from each participant Individual action planning - steps that can and will be implemented in the workplace

Dealing with challenging customers (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry

VMware NSX-T Data Center: Troubleshooting and Operations [V3.2]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Experienced system administrators and network administrators Network and security professionals who work with enterprise and data center networks Overview By the end of the course, you should be able to meet the following objectives: Use the native tools available in NSX-T Data Center to identify and troubleshoot the problems related to the NSX-T Data Center environment Use VMware vRealize Log Insight™ and VMware vRealize Network Insight™ to identify and troubleshoot the problems related to the NSX-T Data Center environment Explain the NSX-T Data Center infrastructure components and the communications between them Identify, analyze, and troubleshoot problems related to the management, control, and data planes in NSX-T Data Center Identify, analyze, and troubleshoot problems related to infrastructure preparation in NSX-T Data Center Identify, analyze, and troubleshoot problems related to logical switching and logical routing in NSX-T Data Center Identify, analyze, and troubleshoot network security problems related to the NSX-T Data Center Distributed and Gateway firewalls Identify, analyze, and troubleshoot problems related to VPN and the VMware NSX Advanced Load Balancer™ Identify the components and packet flows involved in the NSX-T Data Center datapath and troubleshoot related problems This five-day, hands-on training course provides the advanced knowledge, skills, and tools to achieve competency in operating and troubleshooting the VMware NSX-T? Data Center environment. In this course, you are introduced to workflows of various networking and security constructs along with several operational and troubleshooting tools that help you manage and troubleshoot your NSX-T Data Center environment.In addition, you are presented with various types of technical problems, which you will identify, analyze, and solve through a systematic process. Course Introduction Introduction and course logistics Course objectives NSX-T Data Center Operations and Tools Explain and validate the native troubleshooting tools (dashboards, Traceflow, live traffic analysis, port mirroring) for the NSX-T Data Center environment Configure syslog, IPFIX, and log collections for the NSX-T Data Center environment Integrate NSX-T Data Center with vRealize Log Insight and vRealize Network Insight Validate and review the API methods available to configure the NSX-T Data Center environment Troubleshooting the NSX Management Cluster Describe the NSX Management cluster architecture, components, and communication channels Identify the workflows involved in configuring the NSX Management cluster Validate and troubleshoot the NSX Management cluster formation Troubleshooting Infrastructure Preparation Describe the data plane architecture, components, and communication channels Explain and troubleshoot VMware ESXi? transport node preparation issues Explain and troubleshoot KVM transport node preparation issues Explain and troubleshoot VMware NSX© Edge? transport node preparation issue Troubleshooting Logical Switching Describe the architecture of logical switching List the modules and processes involved in configuring logical switching Explain the importance of N-VDS and VDS in transport nodes Describe the procedure to migrate from N-VDS to VDS Review the architecture and workflows involved in attaching workloads to segments Identify and troubleshoot common logical switching issues Troubleshooting Logical Routing Review the architecture of logical routing and NSX Edge nodes Explain the workflows involved in the configuration of Tier-0 and Tier-1 gateways Explain the high availability modes and validate logical router placements Identify and troubleshoot common logical routing issues using both BGP and OSPF Troubleshooting Security Review the architecture of the Distributed Firewall Explain the workflows involved in configuring the Distributed Firewall Review the architecture of the Gateway Firewall Explain the workflows involved in configuring the Gateway Firewall Identify and troubleshoot common distributed firewall and Gateway Firewall issues Troubleshooting the NSX Advanced Load Balancer and VPN Services Review the NSX Advanced Load Balancer architecture and components Identify and troubleshoot common NSX Advanced Load Balancer issues Review of IPsec and L2 VPN architecture and components Identify and troubleshoot common IPsec and L2 VPN issues Datapath Walkthrough Verify and validate the path of the packet on the NSX datapath (East-West and South-North) Identify and perform packet captures at various points in the datapath Use NSX CLI and native hypervisor commands to retrieve configurations involved in the NSX datapath

VMware NSX-T Data Center: Troubleshooting and Operations [V3.2]
Delivered OnlineFlexible Dates
Price on Enquiry