Duration 3 Days 18 CPD hours This course is intended for This course benefits individuals responsible for configuring and monitoring devices running the Junos OS. Overview After successfully completing this course, you should be able to: Describe the basic design architecture of the Junos OS. Identify and provide a brief overview of Junos devices. Navigate within the Junos CLI. Perform tasks within the CLI operational and configuration modes. Restore a Junos device to its factory-default state. Perform initial configuration tasks. Configure and monitor network interfaces. Describe user configuration and authentication options. Perform secondary configuration tasks for features and services such as system logging (syslog) and tracing, Network Time Protocol (NTP), configuration archival, and SNMP. Monitor basic operation for the Junos OS and devices. Identify and use network utilities. Upgrade the Junos OS. Perform file system maintenance and password recovery on a Junos device. Navigate within the Junos J-Web interface. Explain basic routing operations and concepts. View and describe routing and forwarding tables. Configure and monitor static routing. Configure and monitor OSPF. Describe the framework for routing policy and firewall filters. Explain the evaluation of routing policy and firewall filters. Identify instances where you might use routing policy. Write and apply a routing policy. Identify instances where you might use firewall filters. Write and apply a firewall filter. Describe the operation and configuration for unicast reverse path forwarding (RPF). This three-day course provides students with the foundational knowledge required to work with the Juniper Networks Junos operating system and to configure Junos devices. The course provides a brief overview of the Junos device families and discusses the key architectural components of the software. Key topics include user interface options with a heavy focus on the command-line interface (CLI), configuration tasks typically associated with the initial setup of devices, interface configuration basics with configuration examples, secondary system configuration, and the basics of operational monitoring and maintenance of Junos devices. The course then delves into foundational routing knowledge and configuration examples including general routing concepts, routing policy, and firewall filters. Course Outline COURSE INTRODUCTION Junos Operating System Fundamentals The Junos OS Traffic Processing Overview of Junos Devices User Interface Options: The Junos CLI User Interface Options The Junos CLI: CLI Basics The Junos CLI: Operational Mode The Junos CLI: Configuration Mode User Interface Options: The J-Web Interface User Interface Options The Junos CLI: CLI Basics The Junos CLI: Operational Mode The Junos CLI: Configuration Mode Initial Configuration Factory-Default Configuration Initial Configuration Interface Configuration Secondary System Configuration User Configuration and Authentication System Logging and Tracing Network Time Protocol Archiving Configurations SNMP Operational Monitoring and Maintenance Monitoring Platform and Interface Operation Network Utilities Maintaining the Junos OS Password Recovery System Clean-Up Interface Configuration Examples Review of the Interface Configuration Hierarchy Interface Configuration Examples Using Configuration Groups Routing Fundamentals Routing Concepts: Overview of Routing Routing Concepts: The Routing Table Routing Concepts: Routing Instances Static Routing Dynamic Routing Routing Policy Routing Policy Overview Case Study: Routing Policy Firewall Filters Firewall Filters Overview Case Study: Firewall Filters Unicast Reverse-Path-Forwarding Checks Class of Service CoS Overview Traffic Classification Traffic Queueing Traffic Scheduling Case Study: CoS JTAC Procedures Opening a Support Case Customer Support Tools Transferring Files to JTAC Juniper Security Concepts Security Challenges Juniper Networks? Security Focus A IPv6 Fundamentals IPv6 Addressing Protocols and Services Configuration Additional course details: Nexus Humans Juniper - Introduction to the Junos Operating System (IJOS) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Juniper - Introduction to the Junos Operating System (IJOS) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This is an introductory- level course appropriate for those who are developing applications using relational databases, or who are using SQL to extract and analyze data from databases and need to use the full power of SQL queries. Overview This course combines expert lecture, real-world demonstrations and group discussions with machine-based practical labs and exercises. Working in a hands-on learning environment led by our expert practitioner, attendees will learn to: Maximize the potential of SQL to build powerful, complex and robust SQL queries Query multiple tables with inner joins, outer joins and self joins Construct recursive common table expressions Summarize data using aggregation and grouping Execute analytic functions to calculate ranks Build simple and correlated subqueries Thoroughly test SQL queries to avoid common errors Select the most efficient solution to complex SQL problems A company?s success hinges on responsible, accurate database management. Organizations rely on highly available data to complete all sorts of tasks, from creating marketing reports and invoicing customers to setting financial goals. Data professionals like analysts, developers and architects are tasked with creating, optimizing, managing and analyzing data from databases ? with little room for error. When databases aren?t built or maintained correctly, it?s easy to mishandle or lose valuable data. Our SQL Programming and Database Training Series provides students with the skills they require to develop, analyze and maintain data and in correctly structured, modern and secure databases. SQL is the cornerstone of all relational database operations. In this hands-on course, you learn to exploit the full potential of the SELECT statement to write robust queries using the best query method for your application, test your queries, and avoid common errors and pitfalls. It also teaches alternative solutions to given problems, enabling you to choose the most efficient solution in each situation. Introduction: Quick Tools Review Introduction to SQL and its development environments Using SQL*PLUS Using SQL Developer Using the SQL SELECT Statement Capabilities of the SELECT statement Arithmetic expressions and NULL values in the SELECT statement Column aliases Use of concatenation operator, literal character strings, alternative quote operator, and the DISTINCT keyword Use of the DESCRIBE command Restricting and Sorting Data Limiting the Rows Rules of precedence for operators in an expression Substitution Variables Using the DEFINE and VERIFY command Single-Row Functions Describe the differences between single row and multiple row functions Manipulate strings with character function in the SELECT and WHERE clauses Manipulate numbers with the ROUND, TRUNC and MOD functions Perform arithmetic with date data Manipulate dates with the date functions Conversion Functions and Expressions Describe implicit and explicit data type conversion Use the TO_CHAR, TO_NUMBER, and TO_DATE conversion functions Nest multiple functions Apply the NVL, NULLIF, and COALESCE functions to data Decode/Case Statements Using the Group Functions and Aggregated Data Group Functions Creating Groups of Data Having Clause Cube/Rollup Clause SQL Joins and Join Types Introduction to JOINS Types of Joins Natural join Self-join Non equijoins OUTER join Using Subqueries Introduction to Subqueries Single Row Subqueries Multiple Row Subqueries Using the SET Operators Set Operators UNION and UNION ALL operator INTERSECT operator MINUS operator Matching the SELECT statements Using Data Manipulation Language (DML) statements Data Manipulation Language Database Transactions Insert Update Delete Merge Using Data Definition Language (DDL) Data Definition Language Create Alter Drop Data Dictionary Views Introduction to Data Dictionary Describe the Data Dictionary Structure Using the Data Dictionary views Querying the Data Dictionary Views Dynamic Performance Views Creating Sequences, Synonyms, Indexes Creating sequences Creating synonyms Creating indexes Index Types Creating Views Creating Views Altering Views Replacing Views Managing Schema Objects Managing constraints Creating and using temporary tables Creating and using external tables Retrieving Data Using Subqueries Retrieving Data by Using a Subquery as Source Working with Multiple-Column subqueries Correlated Subqueries Non-Correlated Subqueries Using Subqueries to Manipulate Data Using the Check Option Subqueries in Updates and Deletes In-line Views Data Control Language (DCL) System privileges Creating a role Object privileges Revoking object privileges Manipulating Data Overview of the Explicit Default Feature Using multitable INSERTs Using the MERGE statement Tracking Changes in Data
RQF Level 2 First Aid for Youth Mental Health course The RQF Level 2 First Aid for Youth Mental Health course is designed to provide participants with a deeper understanding of youth mental health issues and equip them with the knowledge and skills to provide effective support to young people experiencing mental health challenges. The course covers a range of topics related to youth mental health, including common mental health conditions, risk factors, early intervention strategies, and support resources. Here are some key components typically covered in the RQF Level 2 First Aid for Youth Mental Health course: Understanding Youth Mental Health: Participants will gain an understanding of the unique mental health challenges faced by young people, including the impact of developmental stages, societal influences, and peer pressure. They will learn about common mental health conditions that affect youth, such as anxiety, depression, self-harm, eating disorders, and substance abuse. Recognizing Signs and Symptoms: Participants will learn to recognize signs and symptoms of mental health issues in young people. They will explore the behavioural, emotional, and physical indicators that may suggest a young person is experiencing distress or mental health difficulties. Providing Initial Support: The course will cover strategies for providing initial support to young people in crisis or distress. Participants will learn how to approach and engage with young people, offer active listening, and provide appropriate reassurance and guidance. They will also explore strategies for managing challenging or sensitive conversations related to mental health. Promoting Positive Mental Health: Participants will gain insights into promoting positive mental health and well-being in young people. This includes exploring protective factors, resilience-building techniques, and strategies for fostering a supportive and inclusive environment. Referral and Signposting: The course will emphasize the importance of early intervention and appropriate referral pathways. Participants will learn how to signpost young people to relevant support services, resources, and professionals who can provide further assistance. Self-Care and Boundaries: Participants will be encouraged to prioritise their own well-being while supporting young people with mental health challenges. They will learn about self-care strategies, setting boundaries, and seeking support for themselves as they engage in helping others. Interactive Activities and Case Studies: The course often includes interactive activities, discussions, and case studies to facilitate practical learning and application of knowledge. These exercises enable participants to develop their skills in a supportive learning environment. Successful completion of the RQF Level 2 First Aid for Youth Mental Health course typically leads to the awarding of the Level 2 qualification. It is important to note that this course does not provide participants with the qualifications to diagnose or treat mental health conditions, but it equips them with the knowledge and skills to offer initial support and signposting to young people in need. Suitability - Who should attend? The RQF Level 2 First Aid for Youth Mental Health course is primarily aimed at individuals who work or have regular contact with young people aged 8 to 18 years old. This can include professionals, volunteers, or anyone else who has a role in supporting young people's mental health and well-being. The course is relevant for a wide range of individuals and professions, including but not limited to: Teachers and educators Youth workers Social workers School counsellors Sports coaches Healthcare professionals (such as nurses, paramedics, and allied health professionals) Community workers Volunteers in youth organizations Parents or caregivers Those with a general interest in youth mental health and well-being The Level 2 First Aid for Youth Mental Health course aims to equip participants with the skills and knowledge to provide initial support to young people experiencing mental health difficulties. It focuses on developing an understanding of youth mental health, recognizing signs and symptoms, offering appropriate support, and guiding young people toward further professional help. Ultimately, the course aims to empower individuals to be better equipped in providing immediate assistance and promoting positive mental health outcomes for young people. Outcome / Qualification etc. Upon completing the RQF Level 2 First Aid for Youth Mental Health course, participants can expect to achieve several learning outcomes. Understanding Youth Mental Health: Participants will gain knowledge about common mental health issues affecting young people, including anxiety, depression, self-harm, eating disorders, and substance misuse. They will develop an understanding of risk factors, protective factors, and the impact of mental health on young people's overall well-being. Recognising Signs and Symptoms: Participants will learn to identify early signs and symptoms of mental health problems in young people. They will understand how mental health difficulties can manifest and affect different aspects of a young person's life, such as behaviour, emotions, and social interactions. Providing Initial Support: Participants will acquire skills to provide initial support to young people experiencing mental health issues. They will learn active listening techniques, non-judgmental communication, and how to create a safe and supportive environment for young people to share their concerns. Promoting Positive Mental Health: Participants will understand the importance of promoting positive mental health and well-being in young people. They will learn strategies to enhance resilience, self-esteem, and coping skills among young people, as well as ways to create supportive environments that contribute to positive mental health outcomes. Signposting to Professional Help: Participants will gain knowledge about appropriate professional resources and services available to support young people's mental health. They will learn how to effectively signpost young people to appropriate help, such as mental health professionals, helplines, or support organizations. Self-Care and Boundaries: Participants will understand the importance of self-care and maintaining boundaries when supporting young people's mental health. They will learn techniques to manage their own emotional well-being and seek appropriate support for themselves when needed. The course aims to equip participants with the skills, knowledge, and confidence to provide immediate support and signpost young people to appropriate help. While it does not qualify participants as mental health professionals, it enhances their capacity to play a supportive role in promoting positive mental health outcomes for young people. Training Course Content Module 1 Introduction Module 2 What is first aid for youth mental health? Module 3 Identifying mental health conditions Module 4 Stress Module 5 Mental health conditions Module 6 First Aid Action Plan for Mental Health Module 7 Assessment and course closure MODULE 1 INTRODUCTION Session content Trainer/assessor introduction Learner introductions Course information • Administration • Learning outcomes and assessment criteria • Reasonable adjustment • Certification • Complaints and appeals • Assessment information Session duration 15 minutes MODULE 2 WHAT IS FIRST AID FOR YOUTH MENTAL HEALTH? Session content Definitions Role and responsibilities of a first aider The impact of mental health issues Mental health stigma Statistics Session duration 30 minutes MODULE 3 IDENTIFYING MENTAL HEALTH CONDITIONS Session content Mental health continuum Mental health risk factors Early warning signs Session duration 30 minutes MODULE 4 STRESS Session content What is stress? Causes of stress Effects of stress Coping strategies Session duration 30 minutes MODULE 5 MENTAL HEALTH CONDITIONS Session content Depression Anxiety Psychosis Eating disorders Suicide Self-harm Post-traumatic stress disorder Conduct disorders - Bullying Drugs and alcohol Session duration 125 minutes MODULE 6 FIRST AID ACTION PLAN FOR MENTAL HEALTH Session content Check for significant risk of suicide or harm Apply non-judgemental communication skills Reassure and provide information Encourage professional support and self-help strategies Consent and safeguarding The first aider’s own health and emotions Assessment Scenario – Application of the first aid action plan for mental health Session duration 90 minutes MODULE 7 ASSESSMENT AND COURSE CLOSURE Session content Written assessment paper Course administration Course closure Session duration 40 minute Course delivery details The delivery of the RQF Level 2 First Aid for Youth Mental Health course may vary depending on the training provider. However, here are some common methods and approaches used in the course delivery: Classroom-Based, or virtual Instruction: The course often involves attending face-to-face training sessions in a classroom setting. An experienced instructor or facilitator will lead the sessions, providing lectures, presentations, and discussions on the relevant topics. Participants will have the opportunity to interact with the instructor and fellow learners, ask questions, and engage in group activities. Interactive Learning: To enhance understanding and engagement, the course may incorporate interactive learning methods. This can include group discussions, case studies, role-plays, and simulations. These activities allow participants to apply their knowledge and skills in practical scenarios related to youth mental health. Multimedia Resources: Training providers may utilize multimedia resources to enhance the learning experience. This can include videos, audio recordings, and online resources that provide additional information, real-life examples, and testimonials related to youth mental health. Practical Skills Training: The course may include hands-on training in practical skills related to supporting young people with mental health challenges. Participants may learn and practice active listening techniques, crisis de-escalation strategies, and effective communication skills. Practical exercises and simulations can help participants develop confidence in applying these skills. Case Studies and Scenarios: The course may incorporate real-life case studies or scenarios to illustrate the application of knowledge and skills. Participants may analyze and discuss these cases, identify appropriate intervention strategies, and explore different approaches to supporting young people in various mental health situations. Assessments: To demonstrate understanding and competence, participants may be required to complete assessments or evaluations. These can include quizzes, written assignments, or practical assessments where participants demonstrate their skills in responding to youth mental health scenarios. Duration and Schedule: The duration of the course can vary, ranging from a few hours to multiple days, depending on the training provider. It may be offered as a full-time or part-time program, and the sessions may be conducted during weekdays or weekends to accommodate different schedules. Why choose Madeleys First Aid Plus Founded in 2021 after Louise left 30 years in the NHS as an Advanced practitioner in A&E/ITU, had spent 1.5 years in Covid ITU Won FSB Best start-up business in the West Midlands in May 2023 Now trained 100's of delegates in Physical and Mental Health First Aid Expenses Travel costs and lunch required, there are many cafes and sandwich bars here in Much Wenlock to buy your lunch, you may eat it in the training room. All training material, books, qualification certificates are included in the price. Continuing Studies After completing the RQF Level 2 First Aid for Youth Mental Health course, you may consider several options for continuing studies or professional development in the field of youth mental health. Here are a few potential avenues to explore: Advanced First Aid Courses: If you wish to further enhance your first aid skills, you can explore advanced first aid courses that specialize in mental health. These courses may provide more in-depth knowledge and practical skills in supporting individuals with specific mental health conditions. Mental Health Awareness Courses: To broaden your understanding of mental health across different age groups or specific mental health conditions, you can consider enrolling in mental health awareness courses. These courses provide comprehensive knowledge about mental health, its impact, and strategies for support. Youth Work and Counselling Courses: If you are interested in pursuing a career in youth work or counselling, you might consider enrolling in relevant courses or qualifications. These can provide a deeper understanding of therapeutic approaches, counselling techniques, and effective interventions for working with young people facing mental health challenges. Higher Education Degrees or Certifications: If you're looking for more extensive education and professional credentials, you can explore pursuing higher education degrees or certifications in fields related to mental health, psychology, counseling, or youth work. These programs often offer specialized tracks or modules focused on youth mental health. Continuous Professional Development (CPD): Engaging in ongoing professional development opportunities is essential for staying up to date with the latest research, practices, and approaches in youth mental health. You can attend workshops, conferences, webinars, and seminars that specifically focus on youth mental health and related topics. Volunteer and Practical Experience: Actively volunteering with organizations or programs that support youth mental health can provide valuable hands-on experience and further develop your skills. Volunteering opportunities allow you to work directly with young people and gain a deeper understanding of their mental health needs. Remember to research and choose reputable and recognized training providers or institutions when considering any further education or professional development opportunities. It's important to align your studies with your career goals and interests while ensuring the courses or programs meet industry standards and requirements.
Bespoke bass guitar and music theory & harmony lessons for young students and adults in a friendly environment by a professional bass player. Whether you're a Beginner, Intermediate or Advanced player, I can give you the proper tools to take your bass playing to the next level. I provide tailored lessons to the individual that are specifically designed to enhance the right skills and to help you achieve your goals as a player and a musician. Musical Subjects Being Taught: • Bass Technique and Fretboard Knowledge • Sight Reading • Music Theory & Harmony • Ear Training • Styles & Bassline Creation • Groove, Feel & Timing • Bass Gear & Tone Tips • Exam Preparation
Duration 3 Days 18 CPD hours This course is intended for Blockchain Architects Blockchain DevelopersApplication Developers Blockchain System AdministratorsNetwork Security Architects Cyber Security ExpertsIT Professionals w/cyber security experience Overview Those who attend the Security for Blockchain Professionals course and pass the exam certification will have a demonstrated knowledge of:Identifying and differentiating between security threats and attacks on a Blockchain network.Blockchain security methods, best practices, risk mitigation, and more.All known (to date) cyber-attack vectors on the Blockchain.Performing Blockchain network security risk analysis.A complete understanding of Blockchain?s inherent security features and risks.An excellent knowledge of best security practices for Blockchain System/Network Administrators.Demonstrating appropriate Blockchain data safeguarding techniques. This course covers all known aspects of Blockchain security that exist in the Blockchain environment today and provides a detailed overview of all Blockchain security issues, including threats, risk mitigation, node security integrity, confidentiality, best security practices, advanced Blockchain security and more. Fundamental Blockchain Security Cryptography for the Blockchain Hash Functions Public Key Cryptography Elliptic Curve Cryptography A Brief Introduction to Blockchain The Blocks The Chains The Network Promises of the Blockchain Blockchain Security Assumptions Digital Signature Security Hash Function Security Limitations of Basic Blockchain Security Public Key Cryptography Review Real-Life Public Key Protection Cryptography and Quantum Computers Lab 1 (Tentative) Finding Hash Function Collisions Reversible hash function Hash function with poor non-locality Hash function with small search space Breaking Public Key Cryptography Brute Forcing a Short Private Key Brute Forcing a Poorly-Chosen Private Key Consensus in the Blockchain Blockchain Consensus and Byzantine Generals Blockchain Networking Review Byzantine Generals Problem Relation to Blockchain Byzantine Fault Tolerance Introduction to Blockchain Consensus Security Blockchain Consensus Breakthrough Proof of Work What is Proof of Work? How does Proof of Work Solve BGP? Proof of Work Security Assumptions Attacking Proof of Work Proof of Stake What is Proof of Stake? How does Proof of Stake Solve BGP? Proof of Stake Security Assumptions Attacking Proof of Stake General Attacks on Blockchain Consensus Other Blockchain Consensus Algorithms Lab 2 (Tentative) Attacking Proof of Work Performing a 51% Attack Performing a Selfish Mining Attack Attacking Proof of Stake Performing a XX% Attack Performing a Long-Range Attack Malleable Transaction Attacks Advanced Blockchain Security Mechanisms Architectural Security Measures Permissioned Blockchains Checkpointing Advanced Cryptographic Solutions Multiparty Signatures Zero-Knowledge Proofs Stealth Addresses Ring Signatures Confidential Transactions Lab 3 (Tentative) Permissioned Blockchains 51% on a Checkpointed Blockchain Data mining on a blockchain with/without stealth addresses Zero-Knowledge Proof Simulation Trying to fake knowledge of a ZKP Module 4: Blockchain for Business Introduction to Ethereum Security What is Ethereum Consensus in Ethereum Smart Contracts in Ethereum Ethereum Security Pros and Cons of Ethereum Blockchains Introduction to Hyperledger Security What is Hyperledger Consensus in Hyperledger Smart Contracts in Hyperledger Hyperledger Security Pros and Cons of Hyperledger Blockchains Introduction to Corda Security What is Corda Consensus in Corda Smart Contracts in Corda Corda Security Pros and Cons of Corda Blockchains Lab 4 Blockchain Risk Assessment What are the Risks of the Blockchain? Information Security Information Sensitivity Data being placed on blockchain Risks of disclosure Regulatory Requirements Data encryption Data control PII protection Blockchain Architectural Design Public and Private Blockchains Open and Permissioned Blockchains Choosing a Blockchain Architecture Lab 5 Exploring public/private open/permissioned blockchains? Basic Blockchain Security Blockchain Architecture User Security Protecting Private Keys Malware Update Node Security Configuring MSPs Network Security Lab 6 (TBD) Smart Contract Security Introduction to Smart Contracts Smart Contract Security Considerations Turing-Complete Lifetime External Software Smart Contract Code Auditing Difficulties Techniques Tools Lab 7 (Tentative) Try a couple of smart contract code auditing tool against different contracts with built-in vulnerabilities Module 8: Security Implementing Business Blockchains Ethereum Best Practices Hyperledger Best Practices Corda Best Practices Lab 8 Network-Level Vulnerabilities and Attacks Introduction to Blockchain Network Attacks 51% Attacks Denial of Service Attacks Eclipse Attacks Routing Attacks Sybil Attacks Lab 9 Perform different network-level attacks System-Level Vulnerabilities and Attacks Introduction to Blockchain System Vulnerabilities The Bitcoin Hack The Verge Hack The EOS Vulnerability Lab 10 Smart Contract Vulnerabilities and Attacks Introduction to Common Smart Contract Vulnerabilities Reentrancy Access Control Arithmetic Unchecked Return Values Denial of Service Bad Randomness Race Conditions Timestamp Dependence Short Addresses Lab 11 Exploiting vulnerable smart contracts Security of Alternative DLT Architectures What Are Alternative DLT Architectures? Introduction to Directed Acyclic Graphs (DAGs) DAGs vs. Blockchains Advantages of DAGs DAG Vulnerabilities and Security Lab 12 Exploring a DAG network
Are you suffering from back pain? Has your doctor suggested you join a yoga class? If so, these masterclasses are for you. Our increasingly sedentary lives have contributed greatly to the back pain epidemic spreading across the Western world, which affects 8 out of 10 of us at some point during our lives. Join us for this series of classes to improve your understanding of your anatomy and make lasting improvements to your posture and movement, changing your experience of movement on the yoga mat and in everyday life.
This workshop equips employees to recognise and respond to signs of suicidal intentions. Participants will learn about the causes of suicidal thoughts and gain tools to help individuals stay safe.
Look at the in depth features of charts and some specialist tools to make your charts come to life. Course overview Duration: 1 day (6.5 hours) Our Excel Charting Specialist course examines how to unlock the full potential of Charts in Excel. It investigates the useful tools needed for creating bespoke Charts, allowing you to creatively present data more visually. By the end of the course, you will have an awareness of the tools used for creating more advanced Charts and will be able to create your own Dynamic Charts. The course is designed for existing users of Excel who are looking at more advanced ways to visualise data in Excel using Charts. Objectives By the end of the course you will be able to: Create and Amend Charts Format multiple areas of a Chart Use a Combo Chart Apply Conditional Formatting to a Chart Create Dynamic Charts Work with Custom Formatting Create an Advanced Dynamic Chart Content Creating and amending charts Creating Simple Charts Using the Chart Design tab Adding Chart Elements Changing the type of Chart Formatting charts Format Chart Area Format Data Series Format Data Point Format Axis Working with combo charts Adding additional data to a Chart Customising Chart types Creating Clustered Column/line Charts Applying conditional formatting on charts Using IF Statements Highlighting Max/Min Data points in Charts Using Series Overlap Dynamic charts Creating dynamic Target vs Actual Charts Introducing the NA function Hiding data used for Charts Custom formatting charts Formatting Data Labels Customising number formats Using Trend Arrows to show changes Editing Format Code Advanced dynamic charts Pivot Chart rules Creating a Pivot Chart Working with your Pivot Chart Creating calculations Combining all elements to create an Advanced Chart Using Error Bars to create a line Adding a scroll bar and linking with data
Duration 70 Days 420 CPD hours Cisco Learning Library: Networking offers a subscription to all Cisco core online networking training, including product training, technology training, and certifications such as Cisco Routing and Switching, Wireless, Design, and Network Programmability.This comprehensive technical training library includes full-length, interactive certification courses, additional product and technology training with labs, and thousands of reference materials. Networking Library Certification Courses CCNA Implementing and Administering Cisco Solutions (CCNA) v1.0 CCNP Enterprise Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR) v1.0 Implementing Cisco Enterprise Advanced Routing and Services (ENARSI) v1.0 Implementing Cisco SD-WAN Solutions (SDWAN300) v1.0 Designing Cisco Enterprise Networks (ENSLD) v1.0 Designing Cisco Enterprise Wireless Networks (ENWLSD) v1.0 Implementing Cisco Enterprise Wireless Networks (ENWLSI) v1.1 Implementing Automation for Cisco Enterprise Solutions (ENAUI) v1.0 CCIE Enterprise Infrastructure Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR) v1.0 CCIE Enterprise Wireless Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR) v1.0 Product and Technology Training Implementing and Administering Cisco Solutions (CCNA) v1.0 Developing Applications and Automating Workflows Using Cisco Core Platforms (DEVASC) v1.0 Developing Applications Using Cisco Core Platforms and APIs (DEVCOR) v1.0 Developing Solutions Using Cisco IoT and Edge Platforms (DEVIOT) v1.0 Implementing DevOps Solutions and Practices Using Cisco Platforms (DEVOPS) v1.0 Developing Applications for Cisco Webex and Webex Devices (DEVWBX) v1.0 Implementing Automation for Cisco Enterprise Solutions (ENAUI) v1.0 Implementing Automation for Cisco Collaboration Solutions (CLAUI) v1.0 Implementing Automation for Cisco Data Center Solutions (DCAUI) v1.0 Implementing Automation for Cisco Security Solutions (SAUI) v1.0 Implementing Automation for Cisco Service Provider Solutions (SPAUI) v1.0 Introducing Automation for Cisco Solutions (CSAU) v1.0 Cisco Certified Technician Supporting Cisco Routing and Switching Network Devices (RSTECH) v3.0 Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR) v1.0 Implementing Cisco Enterprise Advanced Routing and Services (ENARSI) v1.0 Implementing Cisco SD-WAN Solutions (SDWAN300) v1.0 Designing Cisco Enterprise Networks (ENSLD) v1.0 Implementing Cisco Enterprise Wireless Networks (ENWLSI) v1.1 Cisco NCS 2000 Deploying 96-Channel Flex Spectrum (OPT201) v3.0 Cisco Digital Network Architecture Implementation Essentials (DNAIE) v2.0 Understanding Cisco Industrial IoT Networking Foundation (INFND) v1.0 Programming Use Cases for Cisco Digital Network Architecture v1.0 (DNAPUC) v1.0 Engineering Cisco Meraki Solutions Part 1 (ECMS1) v1.0 Deploying Cisco SD-Access (ENSDA) v1.1 Cisco SD-WAN Operation and Deployment (ENSDW) v1.0 Introduction to Cisco IOS XR (IOSXR100) v2.0 Cisco IOS XR System Administration (IOSXR200) v1.1 Cisco IOS XR Basic Troubleshooting (IOSXR201) v1.1 Cisco ASR 9000 Series IOS XR 64-Bit Software Migration and Operational Enhancements (IOSXR211) v1.0 Cisco IOS XR Layer 3 VPN Implementation and Verification (IOSXR301) v1.1 Cisco IOS XRMulticast Routing Implementation and Verification (IOSXR302) v1.1 Cisco IOS XR Broadband Network Gateway Implementation and Verification (IOSXR304) v1.0 NSO Essentials for Programmers and Network Architects (NSO201) v3.0 Cisco NSO Administration and DevOps (NSO303) v3.0 Cisco Optical Technology Advanced (OPT300) v2.0 Implementing Segment Routing on Cisco IOS XR (SEGRTE201) v2.0 Operating and Implementing Cisco WAN Automation Engine (WAE200) v3.0 Implementing Cisco Virtual Wide Area Application Services (VWAAS) v1.0 Configuring and Operating Cisco EPN Manager (EPNM100) v3.0 Cisco Elastic Services Controller (ESC300) v2.0 Product and Technology Training Deploying Cloud Connect Solutions with Cisco Cloud Services Router 1000V (CLDCSR) v1.0 Implementing Cisco Multicast (MCAST) v2.0 Cisco Prime Central Intermediate ? Administration and Operations (CPCI-AO) v1.0 Cisco Prime Network Intermediate ? Administration and Operation (CPNI-AO) v1.1 Cisco Prime Provisioning (CPP) v6.5 Cisco Prime Performance Manager (CPPERF) v1.0 Implementing Cisco Catalyst 9000 Switches (ENC9K) v1.0 Cisco Aggregation Services Router 9000 Series Essentials (ASR9KE) v6.0 Network Convergence System 5500 Series Router (NCS5500HW) v1.0 Cisco DNA Center Fast-Start Use Cases (A-SDA-FASTSTART) Getting Started with DNA Center Assurance (A-DNAC-ASSUR) v1.0 Overview of Cisco DNA Center Fast Start Use Cases for System Engineers (P-SDA-SYSEF) Planning and Deploying SD-Access Fundamentals (For Customers) (CUST-SDA-FUND) v1.0 Preparing the Identity Services Engine (ISE) for SD-Access (For Customers) (CUST-SDA-ISE) v1.0 SD-Access 1.2 Update Supplement (A-SDA-12UPDT) The SD-WAN Mastery Collection - Getting Started (For Customers) v1.0 (A-SDW-START) The SD-WAN Mastery Collection - Deploying the Data Plane (For Customers) v1.0 (A-SDW-DATPLN) The SD-WAN Mastery Collection - Developing the Overlay Topology (For Customers) v1.0 (A-SDW-OVRLAY) The SD-WAN Mastery Collection - Managing the Application Experience (For Customers) v1.0 (A-SDW-APPEXP) The SD-WAN Mastery Collection - Bringing Up the Control Plane Devices (For Customers) v1.0 (A-SDW-CTRPLN) Securing Branch Internet and Cloud Access with Cisco SD-WAN (A-SDW-BRSEC) Programming for Network Engineers (PRNE) v1.0 Cisco Optical Technology Intermediate (OPT200) v2.0 Advanced Implementing and Troubleshooting MPLS VPN Networks (AMPLS) BGP Bootcamp (BGP) Building Core Networks with OSPF, IS-IS, BGP and MPLS Bootcamp (BCN) Configuring BGP on Cisco Routers (BGP) v4.0 Implementing Cisco MPLS v3.0 Internetworking Technology Overview (ITO) Introduction to IP Multicast Bootcamp Introduction to IPsec VPN Bootcamp (IPsec VPN) Introduction to IPv6 Bootcamp (IPv6) Introduction to MPLS-VPN Bootcamp (MPLS-VPN) LAN Switching Bootcamp (LAN-SW) RP Bootcamp Troubleshooting for Network Support Engineers