• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

50608 Courses delivered Online

Cisco Deploying Cloud Connect Solutions with Cisco Cloud Services Router 1000V (CLDCSR)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for The primary audience for this course is as follows: Data Center engineers Cloud engineers System engineers Field engineers Implementation/operation/support/installation and upgrade specialists IT administrators Network engineers Cloud computing experts Security specialists Cisco integrators and partners Overview Upon completing this course, the learner will be able to meet these overall objectives: Describe items to be aware of before installing a Cisco CSR 1000V, including virtual machine requirements for installing Cisco CSR 1000V, licensing options that are available with Cisco CSR 1000V, supported Cisco IOS XE technologies, and management options for Cisco CSR 1000V. Prepare for installation of Cisco CSR 1000V Series routers. Explain common Cisco IOS XE Command-Line Interface (CLI) commands and conventions that can make it easier to work in the CLI, and describe how you can get help with command syntax and command options. Describe the options you can use to activate the license for Cisco CSR 1000V and activate the license for each option. Troubleshoot issues with Cisco CSR 1000V licenses. Upgrade the Cisco IOS XE software for an existing Cisco CSR 1000V installation. Describe the Call Home feature and its benefits, configure the feature on the Cisco CSR 1000V, including the anonymous reporting option, and display the Call Home configuration. List the different Call Home events that trigger alerts and commands that are executed as a result of the alert. Troubleshoot Cisco CSR 1000V Virtual Machine (VM) issues. Rehost a Cisco CSR 1000V license to a new VM, whether the current Cisco CSR 1000V router is accessible or not. Describe the Virtual Extensible LAN (VXLAN) Layer 2 gateway feature and configure this feature on the Cisco CSR 1000V router. Deploy the Cisco CSR 1000V in a virtual private cloud using Microsoft Azure or Amazon Web Services (AWS). Describe common network operations that the Cisco CSR 1000V supports. Explore programmability support on Cisco CSR 1000V, including APIs, shells, and data models. The Deploying Cloud Connect Solutions with Cisco Cloud Services Router 1000V (CLDCSR) course shows you how to deploy and operate Cisco© Cloud Services Router 1000V (CSR1000V) to provide comprehensive WAN gateway and network services functions including connectivity, routing, and security into virtual and cloud environments. Through expert instruction and hands-on labs, you will learn: Cisco CSR 1000V deployment options and requirements; hypervisor support, licensing models, features and programmability support; and how to implement, integrate, install, manage, and troubleshoot the deployment process and common operation issues.This class will help you:Learn how to use the CSR 1000V Series to extend your enterprise network to public and private cloudsGain hands-on practice acquiring skills in virtual and cloud-based technologies Course Outline Introducing Cisco CSR Product Overview Preparing for Installation Installing Cisco CSR 1000V in VMware Elastic Sky X (ESXi) Environments Booting Cisco CSR 1000V and Accessing the Console Using Cisco IOS XE Software Managing Cisco CSR 1000V Licenses Upgrading the Cisco IOS XE Software Mapping Cisco CSR 1000V Network Interfaces to Virtual Machine Network Interfaces Using GRUB Mode (Bootstrap Program) Configuring Call Home for Cisco CSR 1000V Configuring Virtual CPU (vCPU) Distribution Across Data, Control, and Service Planes Troubleshooting Cisco CSR 1000V Virtual Machine Issues Rehosting a Smart License Supporting the Cisco CSR 1000V Virtual Extensible LAN (VXLAN) Feature Deploying Cisco CSR 1000V in a Virtual Private Cloud Exploring Cisco CSR 1000V Operations Exploring Programmability on Cisco CSR 1000V

Cisco Deploying Cloud Connect Solutions with Cisco Cloud Services Router 1000V (CLDCSR)
Delivered OnlineFlexible Dates
Price on Enquiry

VMware NSX: Design [V4.x]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Network and security architects and consultants who design the enterprise and data center networks and NSX environments Overview By the end of the course, you should be able to meet the following objectives: Describe and apply a design framework Apply a design process for gathering requirements, constraints, assumptions, and risks Design a VMware vSphere virtual data center to support NSX requirements Create a VMware NSX Manager™ cluster design Create a VMware NSX Edge™ cluster design to support traffic and service requirements in NSX Design logical switching and routing Recognize NSX security best practices Design logical network services Design a physical network to support network virtualization in a software-defined data center Create a design to support the NSX infrastructure across multiple sites Describe the factors that drive performance in NSX This five-day course provides comprehensive training on considerations and practices to design a VMware NSX© environment as part of a software-defined data center strategy. This course prepares the student with the skills to lead the design of an NSX environment, including design principles, processes, and frameworks. The student gains a deeper understanding of the NSX architecture and how it can be used to create solutions to address the customer?s business needs. Course Introduction Introduction and course logistics Course objectives NSX Design Concepts Identify design terms Describe framework and project methodology Describe the role of VMware Cloud Foundation? in NSX design Identify customers? requirements, assumptions, constraints, and risks Explain the conceptual design Explain the logical design Explain the physical design NSX Architecture and Components Recognize the main elements in the NSX architecture Describe the NSX management cluster and the management plane Identify the functions and components of management, control, and data planes Describe the NSX Manager sizing options Recognize the justification and implication of NSX Manager cluster design decisions Identify the NSX management cluster design options NSX Edge Design Explain the leading practices for edge design Describe the NSX Edge VM reference designs Describe the bare-metal NSX Edge reference designs Explain the leading practices for edge cluster design Explain the effect of stateful services placement Explain the growth patterns for edge clusters Identify design considerations when using L2 bridging services NSX Logical Switching Design Describe concepts and terminology in logical switching Identify segment and transport zone design considerations Identify virtual switch design considerations Identify uplink profile and transport node profile design considerations Identify Geneve tunneling design considerations Identify BUM replication mode design considerations NSX Logical Routing Design Explain the function and features of logical routing Describe the NSX single-tier and multitier routing architectures Identify guidelines when selecting a routing topology Describe the BGP and OSPF routing protocol configuration options Explain gateway high availability modes of operation and failure detection mechanisms Identify how multitier architectures provide control over stateful service location Identify EVPN requirements and design considerations Identify VRF Lite requirements and considerations Identify the typical NSX scalable architectures NSX Security Design Identify different security features available in NSX Describe the advantages of an NSX Distributed Firewall Describe the use of NSX Gateway Firewall as a perimeter firewall and as an intertenant firewall Determine a security policy methodology Recognize the NSX security best practices NSX Network Services Identify the stateful services available in different edge cluster high availability modes Describe failover detection mechanisms Compare NSX NAT solutions Explain how to select DHCP and DNS services Compare policy-based and route-based IPSec VPN Describe an L2 VPN topology that can be used to interconnect data centers Explain the design considerations for integrating VMware NSX© Advanced Load Balancer? with NSX Physical Infrastructure Design Identify the components of a switch fabric design Assess Layer 2 and Layer 3 switch fabric design implications Review guidelines when designing top-of-rack switches Review options for connecting transport hosts to the switch fabric Describe typical designs for VMware ESXi? compute hypervisors with two pNICs Describe typical designs for ESXi compute hypervisors with four or more pNICs Differentiate dedicated and collapsed cluster approaches to SDDC design NSX Multilocation Design Explain scale considerations in an NSX multisite design Describe the main components of the NSX Federation architecture Describe the stretched networking capability in Federation Describe stretched security use cases in Federation Compare the Federation disaster recovery designs NSX Optimization and DPU-Based Acceleration Describe Geneve Offload Describe the benefits of Receive Side Scaling and Geneve Rx Filters Explain the benefits of SSL Offload Describe the effect of Multi-TEP, MTU size, and NIC speed on throughput Explain the available enhanced datapath modes and use cases List the key performance factors for compute nodes and NSX Edge nodes Describe DPU-Based Acceleration Define the NSX features supported by DPUs Describe the hardware and networking configurations supported with DPUs

VMware NSX: Design [V4.x]
Delivered OnlineFlexible Dates
Price on Enquiry

VMware NSX-T Data Center: Design [V3.2]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Network and security architects and consultants who design the enterprise and data center networks and VMware NSX environments Overview By the end of the course, you should be able to meet the following objectives: Describe and apply a design framework Apply a design process for gathering requirements, constraints, assumptions, and risks Design a VMware vSphere virtual data center to support NSX-T Data Center requirements Create a VMware NSX Manager™ cluster design Create a VMware NSX Edge™ cluster design to support traffic and service requirements in NSX-T Data Center Design logical switching and routing Recognize NSX-T Data Center security best practices Design logical network services Design a physical network to support network virtualization in a software-defined data center Create a design to support the NSX-T Data Center infrastructure across multiple sites Describe the factors that drive performance in NSX-T Data Center This five-day course provides comprehensive training on considerations and practices to design a VMware NSX-T? Data Center environment as part of a software-defined data center strategy. This course prepares the student with the skills to lead the design of NSX-T Data Center offered in release 3.2, including design principles, processes, and frameworks. The student gains a deeper understanding of the NSX-T Data Center architecture and how it can be used to create solutions to address the customer?s business needs. Course Introduction Introduction and course logistics Course objectives Design Concepts Identify design terms Describe framework and project methodology Describe VMware Validated Design? Identify customers? requirements, assumptions, constraints, and risks Explain the conceptual design Explain the logical design Explain the physical design NSX Architecture and Components Recognize the main elements in the NSX-T Data Center architecture Describe the NSX management cluster and the management plane Identify the functions and components of management, control, and data planes Describe the NSX Manager sizing options Recognize the justification and implication of NSX manager cluster design decisions Identify the NSX management cluster design options NSX Edge Design Explain the leading practices for edge design Describe the NSX Edge VM reference designs Describe the bare-metal NSX Edge reference designs Explain the leading practices for edge cluster design Explain the effect of stateful services placement Explain the growth patterns for edge clusters Identify design considerations when using L2 bridging services NSX Logical Switching Design Describe concepts and terminology in logical switching Identify segment and transport zone design considerations Identify virtual switch design considerations Identify uplink profile, VMware vSphere© Network I/O Control profile, and transport node profile design considerations Identify Geneve tunneling design considerations Identify BUM replication mode design considerations NSX Logical Routing Design Explain the function and features of logical routing Describe NSX-T Data Center single-tier and multitier routing architectures Identify guidelines when selecting a routing topology Describe the BGP and OSPF routing protocol configuration options Explain gateway high availability modes of operation and failure detection mechanisms Identify how multitier architectures provide control over stateful service location Identify VRF Lite requirements and considerations Identify the typical NSX scalable architectures NSX Security Design Identify different security features available in NSX-T Data Center Describe the advantages of an NSX Distributed Firewall Describe the use of NSX Gateway Firewall as a perimeter firewall and as an intertenant firewall Determine a security policy methodology Recognize the NSX-T Data Center security best practices NSX Network Services Identify the stateful services available in different edge cluster high availability modes Describe failover detection mechanisms Explain the design considerations for integrating VMware NSX© Advanced Load Balancer? with NSX-T Data Center Describe stateful and stateless NSX-T Data Center NAT Identify benefits of NSX-T Data Center DHCP Identify benefits of metadata proxy Describe IPSec VPN and L2 VPN Physical Infrastructure Design Identify the components of a switch fabric design Assess Layer 2 and Layer 3 switch fabric design implications Review guidelines when designing top-of-rack switches Review options for connecting transport hosts to the switch fabric Describe typical designs for VMware ESXi? compute hypervisors with two pNICs Describe typical designs for ESXi compute hypervisors with four or more pNICs Describe a typical design for a KVM compute hypervisor with two pNICs Differentiate dedicated and collapsed cluster approaches to SDDC design NSX Multilocation Design Explain scale considerations in an NSX-T Data Center multisite design Describe the main components of the NSX Federation architecture Describe the stretched networking capability in Federation Describe stretched security use cases in Federation Compare Federation disaster recovery designs NSX Optimization Describe Geneve Offload Describe the benefits of Receive Side Scaling and Geneve Rx Filters Explain the benefits of SSL Offload Describe the effect of Multi-TEP, MTU size, and NIC speed on throughput Explain the available N-VDS enhanced datapath modes and use cases List the key performance factors for compute nodes and NSX Edge nodes

VMware NSX-T Data Center: Design [V3.2]
Delivered OnlineFlexible Dates
Price on Enquiry

CVPD Scripting - Part 1

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Application Developers; Programmers, Sales and Pre Sales, Technical Support, Project Managers, Cisco customers, partners and employees involved in UCCE/CVP or CVP stand alone deployments Overview Upon completing this course, the learner will be able to meet these overall objectives: Introduction to the Java API, its capabilities and limitations - Practice - This course is applicable for any version of CVP and Studio. Introduction to Voice Elements and their complexity - creating every different Java component to extend Studio (see below) Overview of a UCCE with CVP Comprehensive Call Flow Module 1 Overview of a UCCE with CVP Comprehensive Call Flow Module 2 ICM routing scripts to route calls to CVP VXML Server applications Passing data (e.g., global variables) Parsing and evaluating data returned Queueing Assigning data to send to Finesse. Module 3 Writing Call Studio scripts (applications) Prompting Callers ? using pre-recorded audio; TTS text-to-speech; Say it Smart to format audio as digits, date, time, currency; input error reprompting Menus Collecting and confirming caller input, such as account numbers, dates of birth, etc Working with variables ? Session data, Element data, Call data, Local data (CVP11) Introduction to retrieving data from back end systems: SQL Database interaction ? using the Studio Database element to select data Web service interaction- Studio Web Services element for SOAP-web services and calling a simple REST web service Playing audio to callers during back-end data retrieval Catch events Working with counters, decisions, math Introduction to javascript for substrings and string length Setting VoiceXML properties affecting the gateway Multi-Language applications Module 4 Working with Version Control Module 5 ÿImplementing a Post Call Survey Module 6 Using the Studio Debugger to test applications within Studio Module 7 CVP Reporting Server and CVP CUIC Reports Best practices regarding naming elements and variables Configuring data to pass to the Reporting Server using OAMP Understanding Reporting Server tables Understanding the Application Summary CUIC reports Module 8 Administration covered throughout the course OAMP Operations Console to deploy applications to VXML Server Using Studio Documenter to print Visio-like diagrams of the application Configuring log file properties Using logs for debugging applications Administrative scripts for graceful updates or suspensions of the server Important log, debug, administration files Module 9 Cisco Courtesy Callback Detailed discussion of the CCB Call flow, the ICM script, and the 5 Studio scripts used for Courtesy Callback.

CVPD Scripting - Part 1
Delivered OnlineFlexible Dates
Price on Enquiry

Get Smart With QuickBooks 2021 for Windows

By Nexus Human

Duration 2 Days 12 CPD hours Overview What's New in This Guide? Automatic Payment Reminders for open customer invoices Ability to automatically include the PO# (purchase order number) to Invoice Emails Able to combine multiple emails which allows you to attach multiple sales or purchasing documents to a single email Quickly locate a company file using the new company file search feature Smart Help is an improved search experience that includes access to live experts through messaging and call back options This course covers all features that are in QuickBooks Pro and Premier 2020 and prepares you for the QuickBooks Certified User exam. This course combines all topics in the two 1 day courses ?Get Started with QuickBooks 2021 for Windows? and ?Keep Going with QuickBooks 2021 for Windows?. First-time QuickBooks users will learn the basic features of the software. Experienced QuickBooks users will quickly learn the new features and functionality of QuickBooks 2021. Getting Started Starting QuickBooks Setting QuickBooks Preferences Components of the QuickBooks Operating Environment Using QuickBooks Help Identifying Common Business Terms Exiting QuickBooks Setting Up a Company Creating a QuickBooks Company Using the Chart of Accounts Working with Lists Creating Company Lists Working with the Customers & Jobs List Working with the Employees List Working with the Vendors List Working with the Item List Working with Other Lists Managing Lists Setting Up Inventory Entering Inventory Ordering Inventory Receiving Inventory Paying for Inventory Manually Adjusting Inventory Selling Your Product Creating Product Invoices Applying Credit to Invoices Emailing Invoices Setting Price Levels Creating Sales Receipts Invoicing for Services Setting Up a Service Item Changing the Invoice Format Creating a Service Invoice Editing an Invoice Voiding an Invoice Deleting an Invoice Entering Statement Charges Creating Billing Statements Processing Payments Displaying the Open Invoices Report Using the Income Tracker Receiving Payments for Invoices Making Deposits Handling Bounced Checks Working with Bank Accounts Writing a QuickBooks Check Voiding a QuickBooks Check Using Bank Account Registers Entering a Handwritten Check Transferring Funds Between Accounts Reconciling Checking Accounts Entering and Paying Bills Handling Expenses Using QuickBooks for Accounts Payable Using the Bill Tracker Entering Bills Paying Bills Entering Vendor Credit Memorizing Transactions Entering a New Memorized Transaction Editing a Memorized Transaction Deleting a Memorized Transaction Grouping Memorized Transactions Using a Memorized Transaction Printing the Memorized Transaction List Customizing Forms Creating a Custom Template Modifying a Template Printing Forms Using Other QuickBooks Accounts Other QuickBooks Account Types Working with Credit Card Transactions Working with Fixed Assets Working with Long-Term Liability Accounts Using the Loan Manager Creating Reports Working with QuickReports Working with Preset Reports Sharing Reports Exporting Reports to Microsoft Excel Printing Reports Creating Graphs Creating QuickInsight Graphs Using QuickZoom with Graphs Working with the Sales Graph Customizing Graphs Printing Graphs Tracking and Paying Sales Tax Using Sales Tax in QuickBooks Setting Up Tax Rates and Agencies Indicating Who and What Gets Taxed Applying Tax to Each Sale Determining What You Owe Paying Your Tax Agencies Preparing Payroll with QuickBooks Using Payroll Tracking Setting Up for Payroll Setting Up Employee Payroll Information Setting Up a Payroll Schedule Writing a Payroll Check Printing Paycheck Stubs Tracking Your Tax Liabilities Paying Payroll Taxes Preparing Payroll Tax Forms Using the EasyStep Interview Using the EasyStep Interview Using Online Banking Setting Up an Internet Connection Setting Up Bank Feeds for Accounts Viewing, Downloading, and Adding Online Transactions Creating Online Payments Transferring Funds Online Canceling Online Payments Managing Company Files Using QuickBooks in Multi-user Mode Setting Up Users and Passwords Setting a Closing Date Sharing Files with an Accountant Updating QuickBooks Backing Up and Restoring a Company File Condensing a Company File Estimating, Time Tracking, and Job Costing Creating Job Estimates Creating an Invoice from an Estimate Displaying Reports for Estimates Updating the Job Status Tracking Time Displaying Reports for Time Tracking Tracking Vehicle Mileage Displaying Vehicle Mileage Reports Displaying Other Job Reports Writing Letters Using the Letters and Envelopes Wizard Customizing Letter Templates Additional course details: Nexus Humans Get Smart With QuickBooks 2021 for Windows training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Get Smart With QuickBooks 2021 for Windows course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Get Smart With QuickBooks 2021 for Windows
Delivered OnlineFlexible Dates
Price on Enquiry

Business Applications

By Nexus Human

Duration 4.5 Days 27 CPD hours This course is intended for This course is intended for individuals who want to gain basic knowledge of business skills. Overview Upon successful completion of this course, students will be able to communicate and work effectively in a business environment. In this course, students will learn about all different aspects of business skills needed be effective in an office environment. Accessing PDF Documents Open a PDF Document Browse a PDF Document Creating & Saving PDF Documents Create and Save a PDF Document from an Existing Document Create a PDF Document from a Web Page Combine Multiple PDF Documents Navigating Content in a PDF Document Perform a Search in a PDF Document Search Multiple PDF Documents Work with Bookmarks Create Links and Buttons Modifying PDF Documents Manipulate PDF Document Pages Edit Content in a PDF Document Add Page Elements Reviewing PDF Documents Add Comments and Markup Compare PDF Documents Initiate and Manage a Review Converting PDF Files Reduce the File Size of a PDF Document Optimize PDF Files Convert and Reuse PDF Document Content Customizing the Acrobat XI Pro Workspace Customize the Toolbars Customize the Tool Sets Creating PDFs from Technical Documents Create PDF Documents Using Autodesk AutoCAD Measure Technical Drawings Enhancing PDF Documents Embed Multimedia Enhance PDF Document Accessibility Securing PDF Documents Manage the Security of PDF Documents Validate PDF Documents Creating Interactive PDF Forms Create a PDF Form Compile and Manage PDF Form Data Finalizing PDF Files for Commercial Printing Apply Color Management Settings Preview Printed Effects Perform Preflight on a PDF Document Create PDF/X, PDF/A, and PDF/E Compliant Files Create a Composite and Color Separations Accessing & Navigating SharePoint Team Sites Access SharePoint Sites Navigate SharePoint Sites Working with Documents, Content, & Libraries Upload Documents Search for Documents and Files Working with Lists Add List Items Modify List Items Configure List Views Filtering and Grouping with List Views Configuring Your SharePoint Profile Update and Share Your Profile Information Share and Follow SharePoint Content Creating a Blog Integrating with Microsoft Office Access and Save SharePoint Documents with Microsoft Office Manage Document Versions through Office 2013 Accessing SharePoint Data from Outlook 2013 Working Offline & Remotely with SharePoint Synchronize Libraries, Sites, and MySite and Working Offline Working from a Mobile Device Creating a New Site Create a Site Change the Look and Feel of Your SharePoint Site Adding & Configuring Libraries Configure Document Library for Your SharePoint Team Site Configure the Site Assets Library for Your SharePoint Site Add and Configure a Wiki for Your SharePoint Site Adding & Configuring Lists Add an Announcement List Add and Configure a Task List Add and Configure Contact and Calendar Lists Add and Configure a Blog Subsite Add and Configure a Custom List to your SharePoint Site Customize List Forms Configuring Site Settings, Navigation, & Search Configure Site Search Options Configure Site Administration Settings Configure Site Organization and Navigation Assigning Permissions & Access Rights Sharing Sites and Setting Site Permissions Secure Lists, Libraries, and Documents Configure Content Roll-Up, Summary Links, & Site Map Add and Configure the Content Search Web Part Add and Configure the Relevant Documents Web Part Identifying Nouns, Pronouns, & Verbs Identify Nouns Identify Pronouns Identify Verbs Identifying Adjectives & Adverbs Use Adjectives Use Adverbs Indentifying Prepositions, Conjunctions, and Interjections Use Prepositions Use Conjunctions Use Interjections Identifying Rules Monitor Sentences Monitor Modifiers Avoid Common Errors Identifying Correct Punctuation Use Parentheses Correctly Use Commas, Semicolons, and Quotation Marks Use Numbers, Symbols, and Capitalization Correctly Identifying Sentence Fragments, Run-Ons, and Comma Splices Identify Sentence Fragments Identify Run-ons, Comma Splices, and Solutions Improving Word Choices Identify Commonly Misused Words Identify Synonyms, Antonyms, and Homonyms Building Effective Sentences Identify the Goal Consider the Audience Consider the Context Editing Effectively Use Correct Spelling Achieve Clarity Avoiding Hypercorrections Avoid Hypercorrections Achieve Simplicity Getting Started Icebreaker Housekeeping Items The Parking Lot Workshop Objectives Working with Words Spelling Grammar Creating a Cheat Sheet Constructing Sentences Parts of a Sentence Punctuation Types of Sentences Creating Paragraphs The Basic Parts Organization Methods Writing Meeting Agendas The Basic Structure Choosing a Format Writing the Agenda Writing E-Mails Addressing Your Message Grammar and Acronyms Writing Business Letters The Basic Structure Choosing a Format Writing the Letter Writing Proposals The Basic Structure Choosing a Format Writing the Proposal Writing Reports The Basic Structure Choosing a Format Be guided by the: The purpose of the report The seniority of your readers Writing the Report Other Types of Documents Requests for Proposals Projections Executive Summaries Business Cases Proofreading & Finishing A Proofreading Primer How Peer Review Can Help Printing and Publishing Wrapping Up Words from the Wise Review of Parking Lot Lessons Learned Completion of Action Plans and Evaluations E-Mail Basics E-mail characteristics Writing online versus on paper Understanding the advantages and disadvantages of e-mail Understanding the cultural significance of e-mail E-mail programs Using an e-mail program to send e-mail When to use e-mail Communicating by e-mail Understanding when to avoid using e-mail Writing an e-mail message Using the MAIL acronym E-Mail Policies Company policies Avoiding improper e-mail messages Ensuring employee compliance to e-mail policies Copyright laws, viruses, and liability Avoiding copyright infringement Avoiding viruses Identifying e-mail liability E-Mail Features & Security Features of an e-mail program Using attachments Using priority labels and signature files Features of an e-mail program Using attachments Using priority labels and signature files Discussing e-mail program options Securing e-mail Usi Additional course details: Nexus Humans Business Applications training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Business Applications course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Business Applications
Delivered OnlineFlexible Dates
Price on Enquiry

Certified Information Privacy Professional (CIPP/CAN)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Data Protection OfficersData Protection ManagersAuditorsLegal Compliance OfficersSecurity ManagerInformation ManagersAnyone involved with data protection processes and programs Overview It will show the world that students know privacy laws and regulations and how to apply them, and that students know how to secure your place in the information economy. When students earn a CIPP credential, it means they?ve gained a foundational understanding of broad global concepts of privacy and data protection law and practice, including: jurisdictional laws, regulations and enforcement models; essential privacy concepts and principals; legal requirements for handling and transferring data and more. It will show the world that students know privacy laws and regulations and how to apply them, and that students know how to secure their place in the information economy. When students earn a CIPP credential, it means they've gained a foundational understanding of broad global concepts of privacy and data protection law and practice, including: jurisdictional laws, regulations and enforcement models; essential privacy concepts and principals; legal requirements for handling and transferring data and more. Common Principles and Approaches to Privacy This unit includes a brief discussion about the modern history of privacy, an introduction to types of information, an overview of information risk management and a summary of modern privacy principles. Jurisdiction and Industries This unit introduces the major privacy models employed around the globe and provides an overview of privacy and data protection regulation by jurisdictions and industry sectors. Information Security: Safeguarding Personal Information This unit presents introductions to information security, including definitions, elements, standards, and threats/ vulnerabilities, as well as introductions to information security management and governance, including frameworks, controls, cryptography and identity and access management (IAM). Online Privacy: Using Personal Information on Websites and with Other Internet-related Technologies This unit focuses on the web as a platform, as well as privacy considerations for sensitive online information, including policies and notices, access, security, authentication and data collection. Additional topics include children?s online privacy, email, searches, online marketing and advertising, social media, online assurance, cloud computing and mobile devices. Canadian Legal Framework This unit provides an introduction to the Canadian legal system. It includes enforcement agencies and their powers, privacy basics from a Canadian perspective and the underlying framework for Canadian privacy law and practice. Canadian Private-sector Privacy Laws This unit focuses on the Canadian legal system. It includes enforcement agencies and their powers, privacy basics from a Canadian perspective and the underlying framework for Canadian privacy law and practice. Canadian Public-sector Privacy Laws This unit highlights key concepts and practices related to the collection, retention, use, disclosure and disposal of personal information by federal, provincial and territorial governments. Health Information Privacy Laws This unit touches on the applicability and purpose of health information privacy laws. Private-sector Compliance Practices This unit delves into the components that make up compliance regulations, including Generally Accepted Privacy Principals and security breach notification, and also examines compliance track records and Federal Commissioner Findings. Public-sector Compliance Practices This unit presents the various methods that can be implemented for compliance in the public sector, such as privacy impact assessments and data sharing agreements. In addition, it discusses the challenges presented by digital information exchanges, as well as non-legislative considerations. Health-sector Compliance Practices This unit covers the issues presented with digital compliance in the health sector. Additional course details: Nexus Humans Certified Information Privacy Professional (CIPP/CAN) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Certified Information Privacy Professional (CIPP/CAN) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Certified Information Privacy Professional (CIPP/CAN)
Delivered OnlineFlexible Dates
Price on Enquiry

Introduction to SQL Programming Basics (TTSQL002)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This is an introductory level SQL course, appropriate for anyone needing to interface with an Oracle database or those needing a general understanding of Oracle database functionality. That would include end users, business analysts, application developers and database administrators. Overview Working in a hands on learning environment led by our expert practitioner, attendees will explore: Basic RDBMS Principles The SQL Language and Tools Using SQL Developer SQL Query Basics WHERE and ORDER BY Functions ANSI 92 Joins ANSI 99 Joins Subqueries Regular Expressions Analytics A company?s success hinges on responsible, accurate database management. Organizations rely on highly available data to complete all sorts of tasks, from creating marketing reports and invoicing customers to setting financial goals. Data professionals like analysts, developers and architects are tasked with creating, optimizing, managing and analyzing data from databases ? with little room for error. When databases aren?t built or maintained correctly, it?s easy to mishandle or lose valuable data. Our SQL Programming and Database Training Series provides students with the skills they require to develop, analyze and maintain data and in correctly structured, modern and secure databases. A full presentation of the basics of relational databases and their use are also covered. Basic RDBMS Principles Relational design principles Accessing data through a structured query language Entity relationship diagrams Data Domains Null values Indexes Views Denormalization Data Model Review The SQL Language and Tools Using SQL*Plus Why Use SQL*Plus When Other Tools Are Available? Starting SQL*Plus EZConnect SQL Commands PL/SQL Commands SQL*Plus Commands The COLUMN Command The HEADING Clause The FORMAT Clause The NOPRINT Clause The NULL Clause The CLEAR Clause Predefined define variables LOGIN.SQL Command history Copy and paste in SQL*Plus Entering SQL commands Entering PL/SQL commands Entering SQL*Plus commands Default output from SQL*Plus Entering Queries What about PL/SQL? Using SQL Developer Choosing a SQL Developer version Configuring connections Creating A Basic Connection Creating A TNS Connection Connecting Configuring preferences Using SQL Developer The Columns Tab The Data Tab The Constraints Tab The Grants Tab The Statistics Tab Other Tabs Queries In SQL Developer Query Builder Accessing Objects Owned By Other Users The Actions Pulldown Menu Differences between SQL Developer and SQL*Plus Reporting Commands Missing In SQL Developer General Commands Missing In SQL Developer Data Dictionary report User Defined reports Using scripts in SQL Developer WHERE and ORDER BY WHERE clause basics Comparison operators Literals and Constants in SQL Simple pattern matching Logical operations The DUAL table Arithmetic operations Expressions in SQL Character operators Pseudo columns Order by clause basics Ordering Nulls Accent and case sensitive sorts Sampling data WHERE and ORDER BY in SQL Developer All, Any, Some Functions The basics of Oracle functions Number functions Character functions Date functions Conversion functions Other functions Large object functions Error functions The RR format mode; Leveraging your knowledge ANSI 92 JOINS Basics of ANSI 92 Joins Using Query Builder with multiple tables Table Aliases Outer joins Outer Joins In Query Builder Set operators Self-referential joins Non-Equijoins ANSI 99 Joins Changes with ANSI99 CROSS Join NATURAL Join JOIN USING JOIN ON LEFT / RIGHT OUTER JOIN FULL OUTER JOIN Subqueries Why use subqueries? WHERE clause subqueries FROM clause subqueries HAVING clause subqueries CORRELATED subqueries SCALAR subqueries DML and subqueries EXISTS subqueries Hierarchical queries TOP N AND BOTTOM N queries Creating subqueries using Query Builder Regular Expressions Available Regular Expressions Regular Expression Operators Character Classes Pattern matching options REGEX_LIKE REGEXP_SUBSTR REGEXP_INSTR REGEXP_REPLACE REGEXP_COUNT Analytics The WITH clause Reporting aggregate functions Analytical functions User-Defined bucket histograms The MODEL clause PIVOT and UNPIVOT Temporal validity More Analytics RANKING functions RANK DENSE_RANK CUME_DIST PERCENT_RANK ROW_NUMBER Windowing aggregate functions RATIO_TO_REPORT LAG / LEAD Linear Regression functions Inverse Percentile functions Hypothetical ranking functions Pattern Matching Additional course details: Nexus Humans Introduction to SQL Programming Basics (TTSQL002) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Introduction to SQL Programming Basics (TTSQL002) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Introduction to SQL Programming Basics (TTSQL002)
Delivered OnlineFlexible Dates
Price on Enquiry

OL19 IBM i System Administration

By Nexus Human

Duration 4.5 Days 27 CPD hours This course is intended for This is an intermediate course intended for IBM i system administrators, data processing managers and other individuals who implement and manage security, backup and recovery, system software and problem determination. This course is not recommended for s Overview Describe and implement the components of IBM i security, such as user profile, group profile, authorization list, adopted authority and object / resource security Develop a security plan for your Power Systems with IBM i Describe the options to implement security auditing Develop a plan to audit security on your Power Systems with IBM i Describe the IBM i availability products and features and choose the option(s) that best fit your company requirements Describe how to backup and recover user, IBM and full system data on your Power Systems with IBM i Develop a backup and recovery plan for your Power Systems with IBM i Describe the system diagnostics and problem determination procedures available on your Power Systems with IBM i Learn how to plan for, implement, and manage the ongoing operations of an IBM i. Class administration and introductions . IBM i overview and concepts . Management central overview . Security concepts and overview . System values . User security . Resource security . Security auditing . Designing security . IBM i availability overview . Disk management . Backup and recovery strategy using Save/Restore . Journal management . Commitment control overview . Backup and recovery planning . Problem determination . Overview of Systems Director Navigator for i . Introduction to BRMS .

OL19 IBM i System Administration
Delivered OnlineFlexible Dates
Price on Enquiry

Certified Data Centre Migration Specialist (CDMS)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Participants who have actual experience in the data centre and/or IT infrastructures are best suited. Attendance of the CDCP© course is recommended but not a requirement. Overview After completion of the course the participant will be able to: 1. Develop and review their data centre strategy 2. Use different risk assessment methodologies together with practical tips specifically for data centre migrations to reduce the risk during a data centre migration 3. Understand different migration strategies 4. Understand the legal aspects when migrating a data centre 5. Understand the importance of Business Service Reviews and Service Level Objectives 6. Size and design the target data centre 7. Understand the importance of detailed discovery and how dependencies influence migration waves 8. Understand the safety requirements during migration 19. Get lots of practical tips when moving to another data centre This course is designed to expose participants to a step-by-step methodology which will enable them to reduce the risks involved when undertaking a data centre migration. It will also give participants a lot of valuable practical hints and tips by trainers having extensive experience in moving and consolidating mission critical data centre. Data Centre Strategy Data centre lifecycle Reasons to migrate a data centre Alternatives to data centre migration Consolidation Outsourcing Cloud computing Upgrade existing data centre or build new Project Management Project management and methods Scope statement Statement Of Work (SOW) Work Breakdown Structure (WBS) Allocate time to the project Cost and estimation methodology Project communication Risk Management Risk management and methods Risk identification Risk assessment methodologies Qualitative approach Semi-quantitative approach Quantitative approach Risk evaluation Risk treatment Risk in data centre migrations Migration Strategies Different data centre migration strategies Heterogeneous migration Homogeneous migration Physical migration Different IT transformations Pre-migration transformation Migration transformation Post-migration transformation Legal Aspects Regulatory requirements Contractual considerations Legal aspects when decommissioning High Level Discovery & Planning The importance of Business Service Reviews The concept of Availability The concept of Recoverability The importance of Service Level Objectives Requirements on designing the target IT architecture Information needed for high level planning Design Target Data Centre Requirements for the target data centre Sizing the data centre Architectural requirements Cooling requirements Power requirements Security Detailed Discovery and Planning The importance of discovery Automated discovery tools Asset management Network and system dependencies Detailed migration planning Migration waves Staffing Warranties and insurance Safety Safety precautions Technical safety review Electrical safety Lifting Personal safety during migration Fire safety during migration Security Controversy between access and security Access control Managing security during migration Security during migration Key management Practical hints and tips Continuous improvement Implementation Rehearsal Route investigation Resourcing Logistics team Packing Transport Installing the equipment Post migration support End of Project Why project closure Lessons learned Phased completion of project Criteria for project closure The outcome of the project End of project Exam: Certified Data Centre Migration Specialist Actual course outline may vary depending on offering center. Contact your sales representative for more information.

Certified Data Centre Migration Specialist (CDMS)
Delivered OnlineFlexible Dates
Price on Enquiry