• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

3333 Design courses in Polegate delivered Live Online

VMware Cloud Director: Install, Configure, Manage [V10.4]

By Nexus Human

Duration 5 Days 30 CPD hours Overview By the end of the course, you should be able to meet the following objectives: Deploy VMware Cloud Director Manage VMware Cloud Director to meet the service provider needs Create and manage VMware Cloud Director organizations and vApps to fulfill business needs Create and manage VMware Cloud Director catalogs Configure networking for organizations and vApps with the help of NSX-T Data Center Manage resources from the VMWare Cloud Director console Enable VM and Named Disk Create VM sizing and placement policies Create vApps and perform VM operations and actions Manage vGPU resources with VMware Cloud Director Discuss how VMware Cloud Director can be integrated with other solutions In this five-day course, you focus on installing, configuring, and managing on-premises VMware Cloud Director? 10.4. You will learn about workload provisioning, the creation of organizations, virtual data centers (VDCs), catalog services that include predefined virtual machines, and on-demand VMware NSX-T? Data Center networks. You will learn about different networks that a system administrator and an organization administrator can configure and use with virtual machines (VMs).This course also covers the UI enhancements of VMware Cloud Director, the new licensing model and UI enhancements with NSX Advanced Load Balancer?, and the L2 and L3 VPN enhancements in VMware Cloud Director. You will learn about defining segment profile templates to organization VDC networks and vApp networks and configuring DHCP, static routes, and no distributed routing in VMware Cloud Director. This course explains how to integrate and implement vGPU in VMware Cloud Director as well as how to use API access tokens and service accounts for programmatic access to VMware Cloud Director. Course Introduction Introductions and course logistics Course objectives Software-Defined Data Center and VMware Validated Solution Define software-defined data center (SDDC) Discuss VMware offerings for cloud-based services Discuss the deployment options for VMware Cloud Director Discuss VMware Validated Solution Recognize the design considerations when creating a cloud environment on the SDDC using VMware Cloud Foundation? VMware Cloud Director Deployment and Configuration Discuss the deployment options for VMware Cloud Director Explain the two-stage deployment of VMware Cloud Director cells Discuss failover mechanisms (automatic and manual) with VMware Cloud Director cells Define the switchover, promote, and fencing options of the VMware Cloud Director appliance Understand the VMware Cloud Director appliance enhancements VMware Cloud Director Provider Configuration Describe how the compute resources are provided to VMware Cloud Director Describe how storage is provided to VMware Cloud Director Configure and manage storage for Virtual Data Centers (VDCs) Discuss network pools, external networks, and Tier-0 gateways Showcase VMware Cloud Director integration with VMware vCenter Server© and NSX-T Data Center Describe VMware Cloud Director organizations Understand organization policies Explain how to access an organization using various portals Understand organization VDC Discuss Linked Clone and Fast Provisioning Understand the use cases of Allocation Models VMware Cloud Director User, Roles, and Quota Management Discuss user bundle Describe role-based access Explain custom roles and rights Describe and configure LDAP integration with Active Directory Discuss OIDC authentication methods Describe SAML identity provider Discuss API Access Token and Service Accounts Explain Quota Management and its use cases VMware Cloud Director Virtual Machines and vApps Understand standalone VMs Discuss the VM managing operations Explain VM properties Discuss deployment methods of vApps Discuss the vApp managing operations Discuss the vApp lease policies Understand the vApps and VM actions Explain vApp and VM badges VMware Cloud Director Content Libraries Explain the purpose of catalogs and how to create a catalog organization Define catalog management and sharing catalogs inside and between organizations Explain media in VMware Cloud Director and its usage Discuss vApp templates Understand vApp template operations Describe the purpose and usage of Open Virtualization Format (OVF) Discuss organization VDC templates Discuss Fast Cross vCenter Server vApp Instantiation Utilizing Shared Storage VMware Cloud Director Networking Discuss organization VDC networks List the types of organization VDC networks Describe the edge gateway services Explore the services offered by the edge gateway Discuss the sub-allocation IP pool and its use cases Discuss DHCP, NAT, load balancer, and firewall services on the edge gateway Discuss SNAT, DNAT, NO SNAT, and NO DNAT use cases Explain routing and distributed firewall services Discuss vApp networks List the various types of vApp networks VMware Cloud Director Storage and Compute Describe named disks and shared named disks Demonstrate how to attach and detach a named disk and a shared named disk Describe methods of sharing the named disk Discuss the implications of deleting VMs that have an attached named disk Discuss how VMware Cloud Director VMs and disks are encrypted Explain the storage policy capabilities Demonstrate how VM sizing and placement policies are published Discuss vCenter Server and VMware Cloud Director IOPS storage policies usage Discuss how to enable and use the storage IOPS limitation in VMware Cloud Director Describe the storage policy-supported entities Discuss vGPU in VMware Cloud Director Additional UI Features and Integrated Solutions Explain custom advisories, global search, guided tours, keyboard shortcuts, and quick search Demonstrate the new branding and theming experience Briefly discuss how VMware Cloud Director can be integrated with other solutions

VMware Cloud Director: Install, Configure, Manage [V10.4]
Delivered OnlineFlexible Dates
Price on Enquiry

NIST Cyber Security Professional (NCSP) Practitioner

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course assumes the student has successfully taken and passed the NCSF Foundation 2.0 course based on the NIST Cybersecurity Framework version 1.1, release April 2018. Following the course introduction, the course provides an introduction to the intersection between digital transformation and cybersecurity, which is followed by an overview of the threat landscape. Following an approach to the implementation of cybersecurity controls, the course delves into an organizational approach to cybersecurity that starts governance, management, and a supportive culture,Finally, the course provides additional guidance for the cybersecurity practitioner to determine the current state, the desired state, and a plan to close the gap - and to do this over and over again to inculcate it into organizational DNA. Overview This course looks at the impact of digital transformation on cybersecurity risks, an understanding of the threat landscape, and an approach to the application of cybersecurity controls. It provides guidance for students on the best approach to design and build a comprehensive cybersecurity program. Executives are keenly aware of the risks but have limited knowledge on the best way to mitigate these risks. This course also enables our executives to answer the critical question - Are we secure? The class includes lectures, informative supplemental reference materials, quizzes, exercises, and formal examination. The exercises are a critical aspect of the course; do not skip them. Outcomes and benefits from this class is a practical approach that students can use to build and maintain comprehensive cybersecurity and cyber-risk management programs. This course is targeted at IT and Cybersecurity professionals looking to become certified on how to operationalize the NIST Cybersecurity Framework (NCSP) across an enterprise and its supply chain. Digital Transformation Explores what the Practitioner needs to know about the relationship between digital transformation and cybersecurity Explain how to determine the impact of cybersecurity on DX. Explain the relationships between culture and digital transformation from the perspective of a practitioner. Explain the delivery of value to stakeholders in a DX & cybersecurity environment. Illustrate the interdependent relationship between cybersecurity and DX. Threat Landscape The Practitioner needs to understand what threat actors do and their capabilities. Compare the evolving attack type impact to the threat environment. Apply knowledge about the threat landscape to maintain a readiness to respond. Develop a risk profile based on business impact analysis Establish the relationship between awareness and training in the continual improvement of cybersecurity posture. Develop and treat training & awareness as a critical aspect of deterrence Use knowledge about the threat landscape as a predicate to the adoption and adaptation of your cybersecurity posture. The Controls This chapter provides a sample set of controls based on an informative reference. Understand the purpose goals & objectives for each control. Characterize & explain the informative reference controls Discover how to apply the controls in an organizational context. Adopt & Adapt Adopt is a decision about governance; adapt is the set of management decisions that result from the decision to adopt. Distinguish Adopt, Adapt, Management & Governance. Develop an approach to adoption & adaptation. Distinguish & demonstrate the impact of organizational culture on developing cybersecurity as a capability. Develop an assessment approach to define current state. Adaptive Way of Working Threat actors are agile and highly adaptive. The cybersecurity Practitioner must develop the same capabilities Break down what constitutes an adaptive approach. Characterize & apply the need for crossfunctional teams. Recognize and prioritize the first steps (get started). Demonstrate & establish cybersecurity phases. Break down the impact of the flows. Rapid Adoption & Rapid Adaptation FastTrack FastTrack? is an approach to allow organizations to learn to adapt to an evolving threat landscape rapidly. Approach: Establish what it takes to adopt CS. Determine how that impacts management adaptation of CS. Determine how that impacts the capability to assess. CS Capability: Determine the gap between existing & needed capabilities. Establish what must be developed. Develop appropriate risk management profile. Discover how cybersecurity impacts people, practice & technology impacts organization. Differentiate CIS Implementation groups. Determine appropriate implementation group & approach. Develop appropriate phase approaches. CIIS Practice Cybersecurity is an ongoing game of cat and mouse. Organizations must learn how to inculcate cybersecurity improvement into their DNA. Break down & develop mechanisms for ongoing cybersecurity improvement that includes developing a learning organization. Illustrate an improvement plan based on the NIST 7-Step Approach. Illustrate an improvement plan based on the Improvement GPS Demonstrate understanding of Cybersecurity Maturity Model Certification Break down the balancing loop & how it fits into the escalation archetype Use the Fast Track? (improvement & implementation) cycles.

NIST Cyber Security Professional (NCSP) Practitioner
Delivered OnlineFlexible Dates
Price on Enquiry

First Aid for Youth Mental Health | RQF Level 2

By Madeleys First Aid Plus

RQF Level 2 First Aid for Youth Mental Health course The RQF Level 2 First Aid for Youth Mental Health course is designed to provide participants with a deeper understanding of youth mental health issues and equip them with the knowledge and skills to provide effective support to young people experiencing mental health challenges. The course covers a range of topics related to youth mental health, including common mental health conditions, risk factors, early intervention strategies, and support resources. Here are some key components typically covered in the RQF Level 2 First Aid for Youth Mental Health course: Understanding Youth Mental Health: Participants will gain an understanding of the unique mental health challenges faced by young people, including the impact of developmental stages, societal influences, and peer pressure. They will learn about common mental health conditions that affect youth, such as anxiety, depression, self-harm, eating disorders, and substance abuse. Recognizing Signs and Symptoms: Participants will learn to recognize signs and symptoms of mental health issues in young people. They will explore the behavioural, emotional, and physical indicators that may suggest a young person is experiencing distress or mental health difficulties. Providing Initial Support: The course will cover strategies for providing initial support to young people in crisis or distress. Participants will learn how to approach and engage with young people, offer active listening, and provide appropriate reassurance and guidance. They will also explore strategies for managing challenging or sensitive conversations related to mental health. Promoting Positive Mental Health: Participants will gain insights into promoting positive mental health and well-being in young people. This includes exploring protective factors, resilience-building techniques, and strategies for fostering a supportive and inclusive environment. Referral and Signposting: The course will emphasize the importance of early intervention and appropriate referral pathways. Participants will learn how to signpost young people to relevant support services, resources, and professionals who can provide further assistance. Self-Care and Boundaries: Participants will be encouraged to prioritise their own well-being while supporting young people with mental health challenges. They will learn about self-care strategies, setting boundaries, and seeking support for themselves as they engage in helping others. Interactive Activities and Case Studies: The course often includes interactive activities, discussions, and case studies to facilitate practical learning and application of knowledge. These exercises enable participants to develop their skills in a supportive learning environment. Successful completion of the RQF Level 2 First Aid for Youth Mental Health course typically leads to the awarding of the Level 2 qualification. It is important to note that this course does not provide participants with the qualifications to diagnose or treat mental health conditions, but it equips them with the knowledge and skills to offer initial support and signposting to young people in need. Suitability - Who should attend? The RQF Level 2 First Aid for Youth Mental Health course is primarily aimed at individuals who work or have regular contact with young people aged 8 to 18 years old. This can include professionals, volunteers, or anyone else who has a role in supporting young people's mental health and well-being. The course is relevant for a wide range of individuals and professions, including but not limited to: Teachers and educators Youth workers Social workers School counsellors Sports coaches Healthcare professionals (such as nurses, paramedics, and allied health professionals) Community workers Volunteers in youth organizations Parents or caregivers Those with a general interest in youth mental health and well-being The Level 2 First Aid for Youth Mental Health course aims to equip participants with the skills and knowledge to provide initial support to young people experiencing mental health difficulties. It focuses on developing an understanding of youth mental health, recognizing signs and symptoms, offering appropriate support, and guiding young people toward further professional help. Ultimately, the course aims to empower individuals to be better equipped in providing immediate assistance and promoting positive mental health outcomes for young people. Outcome / Qualification etc. Upon completing the RQF Level 2 First Aid for Youth Mental Health course, participants can expect to achieve several learning outcomes. Understanding Youth Mental Health: Participants will gain knowledge about common mental health issues affecting young people, including anxiety, depression, self-harm, eating disorders, and substance misuse. They will develop an understanding of risk factors, protective factors, and the impact of mental health on young people's overall well-being. Recognising Signs and Symptoms: Participants will learn to identify early signs and symptoms of mental health problems in young people. They will understand how mental health difficulties can manifest and affect different aspects of a young person's life, such as behaviour, emotions, and social interactions. Providing Initial Support: Participants will acquire skills to provide initial support to young people experiencing mental health issues. They will learn active listening techniques, non-judgmental communication, and how to create a safe and supportive environment for young people to share their concerns. Promoting Positive Mental Health: Participants will understand the importance of promoting positive mental health and well-being in young people. They will learn strategies to enhance resilience, self-esteem, and coping skills among young people, as well as ways to create supportive environments that contribute to positive mental health outcomes. Signposting to Professional Help: Participants will gain knowledge about appropriate professional resources and services available to support young people's mental health. They will learn how to effectively signpost young people to appropriate help, such as mental health professionals, helplines, or support organizations. Self-Care and Boundaries: Participants will understand the importance of self-care and maintaining boundaries when supporting young people's mental health. They will learn techniques to manage their own emotional well-being and seek appropriate support for themselves when needed. The course aims to equip participants with the skills, knowledge, and confidence to provide immediate support and signpost young people to appropriate help. While it does not qualify participants as mental health professionals, it enhances their capacity to play a supportive role in promoting positive mental health outcomes for young people. Training Course Content Module 1 Introduction Module 2 What is first aid for youth mental health? Module 3 Identifying mental health conditions Module 4 Stress Module 5 Mental health conditions Module 6 First Aid Action Plan for Mental Health Module 7 Assessment and course closure MODULE 1 INTRODUCTION Session content Trainer/assessor introduction Learner introductions Course information • Administration • Learning outcomes and assessment criteria • Reasonable adjustment • Certification • Complaints and appeals • Assessment information Session duration 15 minutes MODULE 2 WHAT IS FIRST AID FOR YOUTH MENTAL HEALTH? Session content Definitions Role and responsibilities of a first aider The impact of mental health issues Mental health stigma Statistics Session duration 30 minutes MODULE 3 IDENTIFYING MENTAL HEALTH CONDITIONS Session content Mental health continuum Mental health risk factors Early warning signs Session duration 30 minutes MODULE 4 STRESS Session content What is stress? Causes of stress Effects of stress Coping strategies Session duration 30 minutes MODULE 5 MENTAL HEALTH CONDITIONS Session content Depression Anxiety Psychosis Eating disorders Suicide Self-harm Post-traumatic stress disorder Conduct disorders - Bullying Drugs and alcohol Session duration 125 minutes MODULE 6 FIRST AID ACTION PLAN FOR MENTAL HEALTH Session content Check for significant risk of suicide or harm Apply non-judgemental communication skills Reassure and provide information Encourage professional support and self-help strategies Consent and safeguarding The first aider’s own health and emotions Assessment Scenario – Application of the first aid action plan for mental health Session duration 90 minutes MODULE 7 ASSESSMENT AND COURSE CLOSURE Session content Written assessment paper Course administration Course closure Session duration 40 minute Course delivery details The delivery of the RQF Level 2 First Aid for Youth Mental Health course may vary depending on the training provider. However, here are some common methods and approaches used in the course delivery: Classroom-Based, or virtual Instruction: The course often involves attending face-to-face training sessions in a classroom setting. An experienced instructor or facilitator will lead the sessions, providing lectures, presentations, and discussions on the relevant topics. Participants will have the opportunity to interact with the instructor and fellow learners, ask questions, and engage in group activities. Interactive Learning: To enhance understanding and engagement, the course may incorporate interactive learning methods. This can include group discussions, case studies, role-plays, and simulations. These activities allow participants to apply their knowledge and skills in practical scenarios related to youth mental health. Multimedia Resources: Training providers may utilize multimedia resources to enhance the learning experience. This can include videos, audio recordings, and online resources that provide additional information, real-life examples, and testimonials related to youth mental health. Practical Skills Training: The course may include hands-on training in practical skills related to supporting young people with mental health challenges. Participants may learn and practice active listening techniques, crisis de-escalation strategies, and effective communication skills. Practical exercises and simulations can help participants develop confidence in applying these skills. Case Studies and Scenarios: The course may incorporate real-life case studies or scenarios to illustrate the application of knowledge and skills. Participants may analyze and discuss these cases, identify appropriate intervention strategies, and explore different approaches to supporting young people in various mental health situations. Assessments: To demonstrate understanding and competence, participants may be required to complete assessments or evaluations. These can include quizzes, written assignments, or practical assessments where participants demonstrate their skills in responding to youth mental health scenarios. Duration and Schedule: The duration of the course can vary, ranging from a few hours to multiple days, depending on the training provider. It may be offered as a full-time or part-time program, and the sessions may be conducted during weekdays or weekends to accommodate different schedules. Why choose Madeleys First Aid Plus Founded in 2021 after Louise left 30 years in the NHS as an Advanced practitioner in A&E/ITU, had spent 1.5 years in Covid ITU Won FSB Best start-up business in the West Midlands in May 2023 Now trained 100's of delegates in Physical and Mental Health First Aid Expenses Travel costs and lunch required, there are many cafes and sandwich bars here in Much Wenlock to buy your lunch, you may eat it in the training room. All training material, books, qualification certificates are included in the price. Continuing Studies After completing the RQF Level 2 First Aid for Youth Mental Health course, you may consider several options for continuing studies or professional development in the field of youth mental health. Here are a few potential avenues to explore: Advanced First Aid Courses: If you wish to further enhance your first aid skills, you can explore advanced first aid courses that specialize in mental health. These courses may provide more in-depth knowledge and practical skills in supporting individuals with specific mental health conditions. Mental Health Awareness Courses: To broaden your understanding of mental health across different age groups or specific mental health conditions, you can consider enrolling in mental health awareness courses. These courses provide comprehensive knowledge about mental health, its impact, and strategies for support. Youth Work and Counselling Courses: If you are interested in pursuing a career in youth work or counselling, you might consider enrolling in relevant courses or qualifications. These can provide a deeper understanding of therapeutic approaches, counselling techniques, and effective interventions for working with young people facing mental health challenges. Higher Education Degrees or Certifications: If you're looking for more extensive education and professional credentials, you can explore pursuing higher education degrees or certifications in fields related to mental health, psychology, counseling, or youth work. These programs often offer specialized tracks or modules focused on youth mental health. Continuous Professional Development (CPD): Engaging in ongoing professional development opportunities is essential for staying up to date with the latest research, practices, and approaches in youth mental health. You can attend workshops, conferences, webinars, and seminars that specifically focus on youth mental health and related topics. Volunteer and Practical Experience: Actively volunteering with organizations or programs that support youth mental health can provide valuable hands-on experience and further develop your skills. Volunteering opportunities allow you to work directly with young people and gain a deeper understanding of their mental health needs. Remember to research and choose reputable and recognized training providers or institutions when considering any further education or professional development opportunities. It's important to align your studies with your career goals and interests while ensuring the courses or programs meet industry standards and requirements.

First Aid for Youth Mental Health | RQF Level 2
Delivered in Much Wenlock or UK Wide or OnlineFlexible Dates
£100

Helping people speak up and engage in meetings

4.0(1)

By The Self Leadership Initiative

Design meetings that get people participating

Helping people speak up and engage in meetings
Delivered OnlineFlexible Dates
£10

1hr Bass lesson - Online

5.0(4)

By Vassilis Lazouras | Bass Guitar Lessons - London

Bespoke bass guitar and music theory & harmony lessons for young students and adults in a friendly environment by a professional bass player. Whether you're a Beginner, Intermediate or Advanced player, I can give you the proper tools to take your bass playing to the next level. I provide tailored lessons to the individual that are specifically designed to enhance the right skills and to help you achieve your goals as a player and a musician. Musical Subjects Being Taught: • Bass Technique and Fretboard Knowledge • Sight Reading • Music Theory & Harmony • Ear Training • Styles & Bassline Creation • Groove, Feel & Timing • Bass Gear & Tone Tips • Exam Preparation

1hr Bass lesson - Online
Delivered OnlineFlexible Dates
£38

Juniper - Introduction to the Junos Operating System (IJOS)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course benefits individuals responsible for configuring and monitoring devices running the Junos OS. Overview After successfully completing this course, you should be able to: Describe the basic design architecture of the Junos OS. Identify and provide a brief overview of Junos devices. Navigate within the Junos CLI. Perform tasks within the CLI operational and configuration modes. Restore a Junos device to its factory-default state. Perform initial configuration tasks. Configure and monitor network interfaces. Describe user configuration and authentication options. Perform secondary configuration tasks for features and services such as system logging (syslog) and tracing, Network Time Protocol (NTP), configuration archival, and SNMP. Monitor basic operation for the Junos OS and devices. Identify and use network utilities. Upgrade the Junos OS. Perform file system maintenance and password recovery on a Junos device. Navigate within the Junos J-Web interface. Explain basic routing operations and concepts. View and describe routing and forwarding tables. Configure and monitor static routing. Configure and monitor OSPF. Describe the framework for routing policy and firewall filters. Explain the evaluation of routing policy and firewall filters. Identify instances where you might use routing policy. Write and apply a routing policy. Identify instances where you might use firewall filters. Write and apply a firewall filter. Describe the operation and configuration for unicast reverse path forwarding (RPF). This three-day course provides students with the foundational knowledge required to work with the Juniper Networks Junos operating system and to configure Junos devices. The course provides a brief overview of the Junos device families and discusses the key architectural components of the software. Key topics include user interface options with a heavy focus on the command-line interface (CLI), configuration tasks typically associated with the initial setup of devices, interface configuration basics with configuration examples, secondary system configuration, and the basics of operational monitoring and maintenance of Junos devices. The course then delves into foundational routing knowledge and configuration examples including general routing concepts, routing policy, and firewall filters. Course Outline COURSE INTRODUCTION Junos Operating System Fundamentals The Junos OS Traffic Processing Overview of Junos Devices User Interface Options: The Junos CLI User Interface Options The Junos CLI: CLI Basics The Junos CLI: Operational Mode The Junos CLI: Configuration Mode User Interface Options: The J-Web Interface User Interface Options The Junos CLI: CLI Basics The Junos CLI: Operational Mode The Junos CLI: Configuration Mode Initial Configuration Factory-Default Configuration Initial Configuration Interface Configuration Secondary System Configuration User Configuration and Authentication System Logging and Tracing Network Time Protocol Archiving Configurations SNMP Operational Monitoring and Maintenance Monitoring Platform and Interface Operation Network Utilities Maintaining the Junos OS Password Recovery System Clean-Up Interface Configuration Examples Review of the Interface Configuration Hierarchy Interface Configuration Examples Using Configuration Groups Routing Fundamentals Routing Concepts: Overview of Routing Routing Concepts: The Routing Table Routing Concepts: Routing Instances Static Routing Dynamic Routing Routing Policy Routing Policy Overview Case Study: Routing Policy Firewall Filters Firewall Filters Overview Case Study: Firewall Filters Unicast Reverse-Path-Forwarding Checks Class of Service CoS Overview Traffic Classification Traffic Queueing Traffic Scheduling Case Study: CoS JTAC Procedures Opening a Support Case Customer Support Tools Transferring Files to JTAC Juniper Security Concepts Security Challenges Juniper Networks? Security Focus A IPv6 Fundamentals IPv6 Addressing Protocols and Services Configuration Additional course details: Nexus Humans Juniper - Introduction to the Junos Operating System (IJOS) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Juniper - Introduction to the Junos Operating System (IJOS) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Juniper - Introduction to the Junos Operating System (IJOS)
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Securing Cloud Deployments with Cisco Technologies v1.0 (SECCLD)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is open to engineers, administrators, and security-minded users of public, private, and hybrid cloud infrastructures responsible for implementing security in cloud environments: Security architects Cloud architects Security engineers Cloud engineers System engineers Cisco integrators and partners Overview After taking this course, you should be able to: Contrast the various cloud service and deployment models. Implement the Cisco Security Solution for SaaS using Cisco Cloudlock Micro Services. Deploy cloud security solutions using Cisco AMP for Endpoints, Cisco Umbrella, and Cisco Cloud Email Security. Define Cisco cloud security solutions for protection and visibility using Cisco virtual appliances and Cisco Stealthwatch Cloud. Describe the network as a sensor and enforcer using Cisco Identity Services Engine (ISE), Cisco Stealthwatch Enterprise, and Cisco TrustSec. Implement Cisco Firepower NGFW Virtual (NGFWv) and Cisco Stealthwatch Cloud to provide protection and visibility in AWS environments. Explain how to protect the cloud management infrastructure by using specific examples, defined best practices, and AWS reporting capabilities. This course shows you how to implement Cisco© cloud security solutions to secure access to the cloud, workloads in the cloud, and software as a service (SaaS) user accounts, applications, and data. This course covers usage of Cisco Cloudlock, Cisco Umbrella?, Cisco Cloud Email Security, Cisco Advanced Malware Protection (AMP) for Endpoints, Cisco Stealthwatch© Cloud and Enterprise, Cisco Firepower© NGFW (next-generation firewall), and more. Introducing the Cloud and Cloud Security Describe the Evolution of Cloud Computing Explain the Cloud Service Models Explore the Security Responsibilities Within the Infrastructure as a Service (IaaS) Service Model Explore the Security Responsibilities Within the Platform as a Service (PaaS) Service Model Explore the Security Responsibilities Within the SaaS Service Model Describe Cloud Deployment Models Describe Cloud Security Basics Implementing the Cisco Security Solution for SaaS Access Control Explore Security Challenges for Customers Using SaaS Describe User and Entity Behavior Analytics, Data Loss Prevention (DLP), and Apps Firewall Describe Cloud Access Security Broker (CASB) Describe Cisco CloudLock as the CASB Describe OAuth and OAuth Attacks Deploying Cisco Cloud-Based Security Solutions for Endpoints and Content Security Describe Cisco Cloud Security Solutions for Endpoints Describe AMP for Endpoints Architecture Describe Cisco Umbrella Describe Cisco Cloud Email Security Design Comprehensive Endpoint Security Introducing Cisco Security Solutions for Cloud Protection and Visibility Describe Network Function Virtualization (NFV) Describe Cisco Secure Architectures for Enterprises (Cisco SAFE) Describe Cisco NGFWv/Cisco Firepower Management Center Virtual Describe Cisco ASAv Describe Cisco Services Router 1000V Describe Cisco Stealthwatch Cloud Describe Cisco Tetration Cloud Zero-Trust Model Describing the Network as the Sensor and Enforcer Describe Cisco Stealthwatch Enterprise Describe Cisco ISE Functions and Personas Describe Cisco TrustSec Describe Cisco Stealthwatch and Cisco ISE Integration Describe Cisco Encrypted Traffic Analytics (ETA) Implementing Cisco Security Solutions in AWS Explain AWS Security Offerings Describe AWS Elastic Compute Cloud (EC2) and Virtual Private Cloud (VPC) Discover Cisco Security Solutions in AWS Explain Cisco Stealthwatch Cloud in AWS Describing Cloud Security Management Describe Cloud Management and APIs Explain API Protection Illustrate an API Example: Integrate to ISE Using pxGrid Identify SecDevOps Best Practices Illustrate a Cisco Cloud Security Management Tool Example: Cisco Defense Orchestrator Illustrate a Cisco Cloud Security Management Tool Example: Cisco CloudCenter? Describe Cisco Application Centric Infrastructure (ACI) Describe AWS Reporting Tools Additional course details: Nexus Humans Cisco Securing Cloud Deployments with Cisco Technologies v1.0 (SECCLD) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Securing Cloud Deployments with Cisco Technologies v1.0 (SECCLD) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Securing Cloud Deployments with Cisco Technologies v1.0 (SECCLD)
Delivered OnlineFlexible Dates
Price on Enquiry

Introduction to Writing SQL Queries (TTSQL003)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This is an introductory- level course appropriate for those who are developing applications using relational databases, or who are using SQL to extract and analyze data from databases and need to use the full power of SQL queries. Overview This course combines expert lecture, real-world demonstrations and group discussions with machine-based practical labs and exercises. Working in a hands-on learning environment led by our expert practitioner, attendees will learn to: Maximize the potential of SQL to build powerful, complex and robust SQL queries Query multiple tables with inner joins, outer joins and self joins Construct recursive common table expressions Summarize data using aggregation and grouping Execute analytic functions to calculate ranks Build simple and correlated subqueries Thoroughly test SQL queries to avoid common errors Select the most efficient solution to complex SQL problems A company?s success hinges on responsible, accurate database management. Organizations rely on highly available data to complete all sorts of tasks, from creating marketing reports and invoicing customers to setting financial goals. Data professionals like analysts, developers and architects are tasked with creating, optimizing, managing and analyzing data from databases ? with little room for error. When databases aren?t built or maintained correctly, it?s easy to mishandle or lose valuable data. Our SQL Programming and Database Training Series provides students with the skills they require to develop, analyze and maintain data and in correctly structured, modern and secure databases. SQL is the cornerstone of all relational database operations. In this hands-on course, you learn to exploit the full potential of the SELECT statement to write robust queries using the best query method for your application, test your queries, and avoid common errors and pitfalls. It also teaches alternative solutions to given problems, enabling you to choose the most efficient solution in each situation. Introduction: Quick Tools Review Introduction to SQL and its development environments Using SQL*PLUS Using SQL Developer Using the SQL SELECT Statement Capabilities of the SELECT statement Arithmetic expressions and NULL values in the SELECT statement Column aliases Use of concatenation operator, literal character strings, alternative quote operator, and the DISTINCT keyword Use of the DESCRIBE command Restricting and Sorting Data Limiting the Rows Rules of precedence for operators in an expression Substitution Variables Using the DEFINE and VERIFY command Single-Row Functions Describe the differences between single row and multiple row functions Manipulate strings with character function in the SELECT and WHERE clauses Manipulate numbers with the ROUND, TRUNC and MOD functions Perform arithmetic with date data Manipulate dates with the date functions Conversion Functions and Expressions Describe implicit and explicit data type conversion Use the TO_CHAR, TO_NUMBER, and TO_DATE conversion functions Nest multiple functions Apply the NVL, NULLIF, and COALESCE functions to data Decode/Case Statements Using the Group Functions and Aggregated Data Group Functions Creating Groups of Data Having Clause Cube/Rollup Clause SQL Joins and Join Types Introduction to JOINS Types of Joins Natural join Self-join Non equijoins OUTER join Using Subqueries Introduction to Subqueries Single Row Subqueries Multiple Row Subqueries Using the SET Operators Set Operators UNION and UNION ALL operator INTERSECT operator MINUS operator Matching the SELECT statements Using Data Manipulation Language (DML) statements Data Manipulation Language Database Transactions Insert Update Delete Merge Using Data Definition Language (DDL) Data Definition Language Create Alter Drop Data Dictionary Views Introduction to Data Dictionary Describe the Data Dictionary Structure Using the Data Dictionary views Querying the Data Dictionary Views Dynamic Performance Views Creating Sequences, Synonyms, Indexes Creating sequences Creating synonyms Creating indexes Index Types Creating Views Creating Views Altering Views Replacing Views Managing Schema Objects Managing constraints Creating and using temporary tables Creating and using external tables Retrieving Data Using Subqueries Retrieving Data by Using a Subquery as Source Working with Multiple-Column subqueries Correlated Subqueries Non-Correlated Subqueries Using Subqueries to Manipulate Data Using the Check Option Subqueries in Updates and Deletes In-line Views Data Control Language (DCL) System privileges Creating a role Object privileges Revoking object privileges Manipulating Data Overview of the Explicit Default Feature Using multitable INSERTs Using the MERGE statement Tracking Changes in Data

Introduction to Writing SQL Queries (TTSQL003)
Delivered OnlineFlexible Dates
Price on Enquiry

Yoga for Back Care

By Catherine Annis Yoga

Are you suffering from back pain? Has your doctor suggested you join a yoga class? If so, these masterclasses are for you. Our increasingly sedentary lives have contributed greatly to the back pain epidemic spreading across the Western world, which affects 8 out of 10 of us at some point during our lives. Join us for this series of classes to improve your understanding of your anatomy and make lasting improvements to your posture and movement, changing your experience of movement on the yoga mat and in everyday life.

Yoga for Back Care
Delivered OnlineFlexible Dates
£75

Suicide First Aid Lite

By Starling

This workshop equips employees to recognise and respond to signs of suicidal intentions. Participants will learn about the causes of suicidal thoughts and gain tools to help individuals stay safe.

Suicide First Aid Lite
Delivered OnlineFlexible Dates
£70