• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

43125 Courses delivered Online

Logging, Monitoring and Observability in Google Cloud

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This class is intended for the following customer job roles: Cloud architects, administrators, and SysOps personnel Cloud developers and DevOps personnel Overview This course teaches participants the following skills: Plan and implement a well-architected logging and monitoring infrastructure Define Service Level Indicators (SLIs) and Service Level Objectives (SLOs) Create effective monitoring dashboards and alerts Monitor, troubleshoot, and improve Google Cloud infrastructure Analyze and export Google Cloud audit logs Find production code defects, identify bottlenecks, and improve performance Optimize monitoring costs This course teaches you techniques for monitoring, troubleshooting, and improving infrastructure and application performance in Google Cloud. Guided by the principles of Site Reliability Engineering (SRE), and using a combination of presentations, demos, hands-on labs, and real-world case studies, attendees gain experience with full-stack monitoring, real-time log management and analysis, debugging code in production, tracing application performance bottlenecks, and profiling CPU and memory usage. Introduction to Google Cloud Monitoring Tools Understand the purpose and capabilities of Google Cloud operations-focused components: Logging, Monitoring, Error Reporting, and Service Monitoring Understand the purpose and capabilities of Google Cloud application performance management focused components: Debugger, Trace, and Profiler Avoiding Customer Pain Construct a monitoring base on the four golden signals: latency, traffic, errors, and saturation Measure customer pain with SLIs Define critical performance measures Create and use SLOs and SLAs Achieve developer and operation harmony with error budgets Alerting Policies Develop alerting strategies Define alerting policies Add notification channels Identify types of alerts and common uses for each Construct and alert on resource groups Manage alerting policies programmatically Monitoring Critical Systems Choose best practice monitoring project architectures Differentiate Cloud IAM roles for monitoring Use the default dashboards appropriately Build custom dashboards to show resource consumption and application load Define uptime checks to track aliveness and latency Configuring Google Cloud Services for Observability Integrate logging and monitoring agents into Compute Engine VMs and images Enable and utilize Kubernetes Monitoring Extend and clarify Kubernetes monitoring with Prometheus Expose custom metrics through code, and with the help of OpenCensus Advanced Logging and Analysis Identify and choose among resource tagging approaches Define log sinks (inclusion filters) and exclusion filters Create metrics based on logs Define custom metrics Link application errors to Logging using Error Reporting Export logs to BigQuery Monitoring Network Security and Audit Logs Collect and analyze VPC Flow logs and Firewall Rules logs Enable and monitor Packet Mirroring Explain the capabilities of Network Intelligence Center Use Admin Activity audit logs to track changes to the configuration or metadata of resources Use Data Access audit logs to track accesses or changes to user-provided resource data Use System Event audit logs to track GCP administrative actions Managing Incidents Define incident management roles and communication channels Mitigate incident impact Troubleshoot root causes Resolve incidents Document incidents in a post-mortem process Investigating Application Performance Issues Debug production code to correct code defects Trace latency through layers of service interaction to eliminate performance bottlenecks Profile and identify resource-intensive functions in an application Optimizing the Costs of Monitoring Analyze resource utilization cust for monitoring related components within Google Cloud Implement best practices for controlling the cost of monitoring within Google Cloud

Logging, Monitoring and Observability in Google Cloud
Delivered OnlineFlexible Dates
Price on Enquiry

Ethereum Training - Blockchain Development Bootcamp

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Programmers Application DevelopersSystem Architects Network ArchitectsNetwork Security Architects IT Professionals w/programming experience Overview Those who attend the Ethereum Development course and pass the exam certification will have a demonstrated knowledge of:An excellent overall understanding of the Ethereum architecture and Solidity language.All functional components (including smart contracts) required to develop an Ethereum Blockchain.The understanding of how to instantiate an Ethereum application on the network.An in-depth understanding of how transactions are created and implemented on an Ethereum network. This 3 day instructor-led course is designed for programmers and developers who want to take a comprehensive deep dive in writing smart contracts and building applications that interact with them. This course provides detailed overviews of Ethereum, smart contracts, and the development language, Solidity. The student will be exposed to Ethereum?s adaptable feature set which allows the developer to design decentralized applications for countless applications. Students will also participate in hands-on programming lab sessions to learn, develop, and advance their skills in Ethereum development. The Ethereum Development Training Course is designed for those seeking an in-depth understanding and development experience of the Ethereum Blockchain platform. Students will participate in approximately 50% programming lab time providing practical experience, enhancing their knowledge and existing skill set. What is Blockchain and Smart Contracts? What is Blockchain and how does it work? Bitcoin vs Ethereum Smart Contract How you can use Smart Contracts? Advantages of Smart Contracts Solidity LAB TASK Types of Variables in Solidity Public and Private Code Public Variables and Functions Private Variables and Functions Internal Functions External Functions Smart Contract Constructors Constant Variables Setting Variables LAB CHALLENGE Smart Contracts With WEB3.JS LAB Installing & Running the Ethereum TestRPC Installing Web3.js Changing the Environment in Remix Creating the UI Using Web3.js to Connect & Interact with the Smart Contract SOLUTION LAB CHALLENGE Smart Contract Events With WEB3.JS AIM LAB The Current Contract Defining the Smart Contract Event Updating the UI LAB CHALLENGE Functions, Mappings and Structs THEORY Functions Mappings Structs LAB The Smart Contract Creating a Modifier Using the Modifier Web3 UI?s Modifier Handling LAB Creating a Struct Creating the Mapping Map Addition Get from the Mapping The Full Contract Count from Map LAB CHALLENGE Inheritance and Deployment THEORY Object-oriented programming Inheritance LAB Current Contract Creating a Base Contract Changing from Strings to bytes Continuing the Project Installing MetaMask Deploy Contract to the Ropsten Test Network LAB Update the HTML Form Update the JavaScript Using the App LAB CHALLENGE Embark Framework and It's Deployment Blockchain (Ethereum) Decentralized Storage (IPFS) Decentralized Communication Web Technologies LAB Installing Embark Framework Hello World with Embark Framework First Contract Deployment with Embark Framework Solidity Smart Contracts Testing THEORY What is Software Testing? LAB LAB CHALLENGE Contracts Management With Factories THEORY Factory LAB LAB CHALLENGE IPFS Files Hosting THEORY IPFS FILES HOSTING LAB 1. Get your hosting server 2. Install IPFS on the Server LAB CHALLENGE End to End Development of DAPP AIM LAB Setup the Project Program the Smart Contract Create the Front-end of the application Deploy the App with IPFS LAB CHALLENGE

Ethereum Training - Blockchain Development Bootcamp
Delivered OnlineFlexible Dates
Price on Enquiry

Retail Services Level 2

By Rachel Hood

Helping customers buy products or services from retail organisations such as department stores, garden centres, high street chains, supermarkets and online and mail order businesses.

Retail Services Level 2
Delivered OnlineFlexible Dates
Price on Enquiry

DOG BEHAVIOUR

5.0(84)

By Cheshire Dog Services Ltd

DOG BEHAVIOUR At Cheshire Dog Services, emphasis is placed on modification of the dog’s behaviour through non-coercive and non-aversive methods. While basic training is a component of any behaviour modification program, it is likely you require assistance in devising a course of action that will help you and your dog successfully overcome any problems that arise during your dogs’ lifetime. Plenty of the problem behaviours that dogs’ develop can be a result of an owner’s misunderstanding of their dogs’ behaviour and can make matters worse when responding in an inappropriate way. Harsh methods can deteriorate your relationship with your dog and build distrust on both sides so using aggression to cure aggression does not work. Many nuisance behaviours or aggression problems are often very normal dog behaviours, therefore using harsh or aversive tactics to remove these undesirable actions are unwarranted and only delay in “fixing” the problem in the first place. Helping you understand dog psychology can give you the foundation to a happier life together! Glyn has a diploma (merit pass) in Advanced Canine Behaviour from the esteemed British College of Canine Studies. Are you experiencing problems with your dog such as: Jumping up Object guarding or stealing Aggression to other dogs, children & strangers Over guarding of you or your house Fear / nervousness / anxiety Excessive barking Getting into the car Barking at people or cars Behaviour Modification takes into account: Ensuring the Health & physical wellbeing of your dog. (physical health – diet, rest, exercise, medical illness ) & emotional wellbeing. Setting the dog up for Success – Avoiding putting the dog in a situation where he/she is likely to fail. Desensitisation & Counter Conditioning – presenting less threatening versions of the triggering stimulus & pairing it with things the dog enjoys. Positive Reinforcement / Differential reinforcement of Alternative Behaviour – teaching other skills the dog can do instead of the unwanted behaviour. Please contact us with the behaviour problems you are encountering and we’ll review what’s involved to help you. We would normally like to carry out a visit to your home, discuss the issue on full, meet your dog and set out what we need to do to help you. At this stage, we’ll set out costs involved as I’m sure you can understand that some behavioural issues can take longer to resolve than others. We would normally like to carry out at least one follow up visit and will provide you with a written report too. Please contact us for prices (they vary depending on what’s required)

DOG BEHAVIOUR
Delivered OnlineFlexible Dates
Price on Enquiry

Data driven decision making - ONLINE WORKSHOP

5.0(1)

By Let’s Do Business Group

In today’s fast-paced business environment, leveraging data effectively is important for staying ahead of the curve.

Data driven decision making - ONLINE WORKSHOP
Delivered OnlineJoin Waitlist
FREE

Cisco Securing Networks with Cisco Firepower Next Generation Firewall v1.0 (SSNGFW)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Security administrators Security consultants Network administrators System engineers Technical support personnel Cisco integrators and partners Overview After taking this course, you should be able to: Describe key concepts of NGIPS and NGFW technology and the Cisco Firepower Threat Defense system, and identify deployment scenarios Perform initial Cisco Firepower Threat Defense device configuration and setup tasks Describe how to manage traffic and implement Quality of Service (QoS) using Cisco Firepower Threat Defense Describe how to implement NAT by using Cisco Firepower Threat Defense Perform an initial network discovery, using Cisco Firepower to identify hosts, applications, and services Describe the behavior, usage, and implementation procedure for access control policies Describe the concepts and procedures for implementing security intelligence features This course gives you knowledge and skills to use and configure Cisco© Firepower Threat Defense technology, beginning with initial device setup and configuration and including routing, high availability, Cisco Adaptive Security Appliance (ASA) to Cisco Firepower Threat Defense migration, traffic control, and Network Address Translation (NAT). You will learn how to implement advanced Next-Generation Firewall (NGFW) and Next-Generation Intrusion Prevention System (NGIPS) features, including network intelligence, file type detection, network-based malware detection, and deep packet inspection. You will also learn how to configure site-to-site VPN, remote-access VPN, and Secure Sockets Layer (SSL) decryption before moving on to detailed analysis, system administration, and troubleshooting. Cisco Firepower Threat Defense Overview Examining Firewall and IPS Technology Firepower Threat Defense Features and Components Examining Firepower Platforms Examining Firepower Threat Defense Licensing Cisco Firepower Implementation Use Cases Cisco Firepower NGFW Device Configuration Firepower Threat Defense Device Registration FXOS and Firepower Device Manager Initial Device Setup Managing NGFW Devices Examining Firepower Management Center Policies Examining Objects Examining System Configuration and Health Monitoring Device Management Examining Firepower High Availability Configuring High Availability Cisco ASA to Firepower Migration Migrating from Cisco ASA to Firepower Threat Defense Cisco Firepower NGFW Traffic Control Firepower Threat Defense Packet Processing Implementing QoS Bypassing Traffic Cisco Firepower NGFW Address Translation NAT Basics Implementing NAT NAT Rule Examples Implementing NAT Cisco Firepower Discovery Examining Network Discovery Configuring Network Discovery Implementing Access Control Policies Examining Access Control Policies Examining Access Control Policy Rules and Default Action Implementing Further Inspection Examining Connection Events Access Control Policy Advanced Settings Access Control Policy Considerations Implementing an Access Control Policy Security Intelligence Examining Security Intelligence Examining Security Intelligence Objects Security Intelligence Deployment and Logging Implementing Security Intelligence File Control and Advanced Malware Protection Examining Malware and File Policy Examining Advanced Malware Protection Next-Generation Intrusion Prevention Systems Examining Intrusion Prevention and Snort Rules Examining Variables and Variable Sets Examining Intrusion Policies Site-to-Site VPN Examining IPsec Site-to-Site VPN Configuration Site-to-Site VPN Troubleshooting Implementing Site-to-Site VPN Remote-Access VPN Examining Remote-Access VPN Examining Public-Key Cryptography and Certificates Examining Certificate Enrollment Remote-Access VPN Configuration Implementing Remote-Access VPN SSL Decryption Examining SSL Decryption Configuring SSL Policies SSL Decryption Best Practices and Monitoring Detailed Analysis Techniques Examining Event Analysis Examining Event Types Examining Contextual Data Examining Analysis Tools Threat Analysis System Administration Managing Updates Examining User Account Management Features Configuring User Accounts System Administration Cisco Firepower Troubleshooting Examining Common Misconfigurations Examining Troubleshooting Commands Firepower Troubleshooting

Cisco Securing Networks with Cisco Firepower Next Generation Firewall v1.0 (SSNGFW)
Delivered OnlineFlexible Dates
Price on Enquiry

Finance for the non-accountant (In-House)

By The In House Training Company

No-one in business will succeed if they are not financially literate - and no business will succeed without financially-literate people. This is the ideal programme for managers and others who don't have a financial qualification or background but who nonetheless need a greater understanding of the financial management disciplines essential to your organisation. This course will give the participants a sound understanding of financial reports, measures and techniques to make them even more effective in their roles. It will enable participants to: Overcome the barrier of the accountants' strange language Deal confidently with financial colleagues Improve their understanding of your organisation's finance function Radically improve their planning and budgeting skills Be much more aware of the impact of their decisions on the profitability of your organisation Enhance their role in the organisation Boost their confidence and career development 1 Review of the principal financial statements What each statement containsOutlineDetail Not just what the statements contain but what they mean Balance sheets and P&L accounts (income statements) Cash flow statements Detailed terminology and interpretation Types of fixed asset - tangible, etc. Working capital, equity, gearing 2 The 'rules' - Accounting Standards, concepts and conventions Fundamental or 'bedrock' accounting concepts Detailed accounting concepts and conventions What depreciation means The importance of stock, inventory and work in progress values Accounting policies that most affect reporting and results The importance of accounting standards and IFRS 3 Where the figures come from Accounting records Assets / liabilities, Income / expenditure General / nominal ledgers Need for internal controls 'Sarbox' and related issues 4 Managing the budget process Have clear objectives, remit, responsibilities and time schedule The business plan Links with corporate strategy The budget cycle Links with company culture Budgeting methods'New' budgetingZero-based budgets Reviewing budgets Responding to the figures The need for appropriate accounting and reporting systems 5 What are costs? How to account for them Cost definitions Full / absorption costing Overheads - overhead allocation or absorption Activity based costing Marginal costing / break-even - use in planning 6 Who does what? A review of what different types of accountant do Financial accounting Management accounting Treasury function Activities and terms 7 How the statements can be interpreted What published accounts contain Analytical review (ratio analysis) Return on capital employed, margins and profitability Making assets work - asset turnover Fixed assets, debtor, stock turnover Responding to figures EBIT, EBITEDIA, eps and other analysts' measure 8 Other key issues Creative accounting Accounting for groups Intangible assets - brand names Company valuations Fixed assets / leased assets / off-balance sheet finance

Finance for the non-accountant (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry

Customer Service Level 1 or Level 2 Certificate Course

By Qdos Training Limited

Qualification Number Level 1: 603/5291/7 Qualification Number Level 2: 600/3423/3 Minimum entry age 19 Guided Learning Hours Level 1: 30 Guided Learning Hours Level 2: 115  What does this qualification cover?  Level 1: • Know how to deliver good customer service • Know different communication methods • Know how to provide good customer service in line with organisational procedures • Know how to effectively deal with customer queries, problems and complaints. Level 2: • The principles of customer service • How customer needs and expectations are formed • The principles of responding to customers' problems or complaints • Interpersonal and team working skills • How to meet customer needs and expectations • Communicating effectively with customers • Legislation which supports the customer service process Who is it suitable for?  This qualification is aimed at learners who are new to the customer service sector and wish to improve their knowledge of this area resulting in the achievement of a nationally recognised qualification. The qualification provides learners with the knowledge and understanding in customer service for learners who deal, or intend to deal, with customers on a daily basis as part of their job role and is applicable to a variety of work environments. This qualification is suitable for learners aged 19 and above. What are the entry requirements? There are no specific recommended prior learning requirements for this qualification. How is this qualification structured? Level 1: The qualification is made up of one mandatory unit: • Unit 1 Customer Service Principles Level 2: The qualification is made up of two mandatory units: • Unit 1 Supporting the customer service environment • Unit 2 Delivery of effective customer service How is it assessed? This qualification is assessed via an internally assessed and externally verified portfolio of evidence. Funding for our qualifications This qualification is available fully funded under the Adult Education Budget funding stream and is free to the candidate.

Customer Service Level 1 or Level 2 Certificate Course
Delivered OnlineFlexible Dates
FREE

CWS-315 Citrix Virtual Apps and Desktops 7 Advanced Administration

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Developed for experienced IT Professionals working with Citrix Virtual Apps and Desktops 7.1x. Potential students include administrators, engineers, and architects responsible for the end user workspace, provisioning services environment, and overall health and performance of the solution. Overview How to configure Workspace Environment Management to improve the end user environment and virtual resource consumption Understand Zones in Citrix Virtual Apps and Desktops 7.1x and how to account for user and desktop locations and optimal connection and registration How to build and manage App Layers to minimize image sprawl with Citrix Virtual Apps and Desktops 7.1x Understand and configure HDX channels and protocols for improved performance delivering multimedia and data over network connections Get more value out of your Citrix Virtual Apps and Desktops 7.1x investment through the use of Workspace Environment Management, Provisioning Services, Application Layering, and advanced features. Students leave this course with a good understanding of how to manage more complex solutions such as multizone environments spanning multiple locations with configurations around StoreFront, the Delivery Controllers, and HDX. Students will gain the skills to improve logon times, user personalization, and resource performance through Workspace Environment Management. Also, learn to optimize management of your app and desktop images by building and combining App Layers. End the course by learning to install, configure, and manage Provisioning Services in accordance with leading practices.This course includes a voucher to take the related exam (1Y0-311 Citrix XenApp and XenDesktop 7.15 Advanced Administration) and earn your Citrix Certified Professional - Virtualization (CCP-V) certification. Implementing Redundancy and Scalability StoreFront and Citrix Gateway Site Infrastructure Machines Running the Virtual Delivery Agent Managing a Virtual Apps and Desktops Environment with Multiple Locations Zones VDA Registration in a Multi-Zone Environment Zone Preference Optimal Gateway Routing and Zones Managing StoreFront Store Subscriptions in a Multi- Location Environment StoreFront and Citrix ADC Branding Implementing Backups and Disaster Recovery Backups Disaster Recovery Considerations Disaster Recovery Process Implementing Advanced Authentication Methods Multi-factor Authentication - RADIUS & OTP Multi-factor Authentication - Smart Card Authentication Federated Authentication - ADFS, SAML, and FAS Improving App and Data Security Introduction to Application Security Preventing Jailbreak Attacks Minimizing the Impact of Attacks Securing Machines Running the Virtual Delivery Agent TLS to VDA Encryption GPOs and Citrix Policies Image Management Introduction to Troubleshooting Troubleshooting Methodology Process (Standard Slide) Resource Tools and Utilities Introduction to PowerShell Troubleshooting Access Issues Troubleshooting StoreFront Troubleshooting Citrix Gateway Troubleshooting Delivery Controller Issues Validating FMA Services Troubleshooting VDA Registration Issues Troubleshooting VDA Registration Troubleshooting HDX Connection Issues Troubleshooting HDX Connections Introduction to App Layering App Layering Introduction Architecture and How it Works Creating an OS Layer The OS Layer Creating a Platform Layer The Platform Layer Creating App Layers The App Layers Creating Elastic App and User Layers Elastic App Layering User Layers Deploying a Layered Image using Citrix Virtual Apps and Desktops Using Templates in App Layering Using Layered Images in a Citrix Virtual Apps and Desktops Site Exploring Layer Priority Layer Priority Maintaining an App Layering Environment Updating Layers Maintaining and Updating the App Layering Environment Common App Layering Considerations and Additional Resources Introduction to Workspace Environment Management (WEM) Workspace Environment Management (WEM) Introduction WEM Administration Using WEM to Centralize Managing User Resources with WEM Managing Profiles with WEM Managing Endpoints with the WEM Transformer Feature Using WEM for Performance Optimization Optimizing Machine Performance with WEM Optimizing User Experience with WEM Using WEM to Secure Environments WEM Environments Migrating and Upgrading WEM Migrating to WEM Upgrading a WEM Deployment WEM Multi-Location Considerations

CWS-315 Citrix Virtual Apps and Desktops 7 Advanced Administration
Delivered OnlineFlexible Dates
Price on Enquiry

Personal Tax Return and Self Assessment Accounting training Course

By Osborne Training

Personal Tax Return and Self Assessment Accounting training Course Overview: Most self-employed people and directors of companies have to do submit a Tax Return every year. If you are a self-employed person you may learn how to do tax return yourself. As a result, you can save money by not having to pay an external agent. Don't forget You can also save more money as you will know more about how to apply for a tax rebate. According to statistics, more than 60% of taxpayers not sure how to do tax return correctly and lose money for not knowing how to apply for a tax rebate correctly. If you want to offer tax services to the general public, then skills in this sector can dramatically improve your job prospect or business prospect. How to do a tax return? Firstly, you need to be registered with HMRC to process your tax return. You should get a UTR (Unique Tax Reference) no, which is your personal identification no for tax purpose. Once you have details for all incomes and expenditure, you can submit them electronically to HMRC. The deadline for submitting a personal tax return is 31 January for the previous tax year. Apply for a Tax Rebate It is possible that you could be eligible for a tax rebate. The most possible scenarios are: When you pay more tax than required Submitting an incorrect tax return Claiming special Tax relief There could be many more reasons why should you get a tax refund. It is vital to know the scenarios under which you should apply for a tax rebate. Certificate of Attendance Identify the type(s) of returns that may be completed Understand the duties and responsibilities of a bookkeeper/tax agent when completing self-assessment tax returns Calculating the taxes on profits for Self Employed & on income for Employed individuals Understanding differences between Drawings & Dividends Introduction to UTR and NI Classes Understanding Tax Return submission procedures to HMRC (using 2 individual Scenarios) Analysing Class 2 & Class 4 NIC Analysing Personal Allowance Analysing Income from Self Employments Employment benefits Analysis Analysis of Car & Fuel benefits Analysis of savings and investment income and tax implications on them. Introduction to Capital Gains Tax analysis Introduction to Inheritance Tax Analysis Understanding the procedure for payment and administration of both tax and National Insurance Contributions

Personal Tax Return and Self Assessment Accounting training Course
Delivered OnlineFlexible Dates
Price on Enquiry