Duration 3 Days 18 CPD hours This course is intended for This intermediate course is for experienced SQL end users, application programmers, database administrators, and user support staff who need more advanced knowledge of SQL. Overview Discuss basic relational database concepts Use some of the OLAP features of DB2, such as GROUPing and RANKing functions Create tables, views and indexes Use referential integrity, check constraints and triggers Use outer joins, and join tables to themselves Use CASE expressions, and the CAST function Identify the impact of Summary Tables, Materialized Query Tables, and temporary tables Use complex subqueries Use a greater number of scalar SQL functions Use advanced SQL constructs, such as recursive SQL and table expressions Define User-Defined Distinct Types and User-Defined Functions Avoid several of the most common causes for poorly-performing SQL This course teaches you how to make use of advanced SQL techniques to access DB2 databases in different environments. This course is appropriate for customers working in all DB2 environments, specifically for z/OS, Linux, UNIX, and Windows. Introduction Identify the purpose of the clauses in the SELECT statement Describe the key differences among the IBM DB2 platforms Describe and use some of the OLAP features of DB2, such as GROUPING functions like CUBE and ROLLUP, and the RANK, DENSE_RANK and ROW_NUMBER functions Create Objects Code statements to: Create tables and views, Alter tables, Create indexes, Implement referential integrity (RI), and Define triggers and check constraints Identify impacts and advantages of referential integrity, including impacts of delete rules Identify considerations when using triggers and check constraints Define and make use of INSTEAD OF triggers Join Retrieve data from more than one table via inner and outer joins Use outer joins (LEFT, RIGHT, FULL) Use ANTI JOINS Join a table to itself Use UNION and UNION ALL Use EXCEPT and INTERCEPT CASE, CAST, Summary Tables, and Materialized Query Tables Identify when CASE expressions can be used Code CASE expressions in SELECT list and in the WHERE clause Identify when CAST specifications can be used Identify the advantages of using Summary (Materialized Query) Tables and Temporary tables Identify the advantages of using Materialized Query Tables (MQTs) Identify when and how to use Temporary tables Using Subqueries Code subqueries using the ALL, ANY/SOME, and EXISTS keywords Code correlated subqueries Choose the proper type of subquery to use in each case Scalar Functions Extend your knowledge of scalar functions which: Manipulate arithmetic data, Manipulate date values, and Manipulate character data Examples of scalar functions that are addressed in this course: SUBSTR POSSTR COALESCE/VALUE DECIMAL ROUND DIGITS CHAR DATE/TIME Table Expressions and Recursive SQL Identify reasons for using table expressions and recursive SQL Use nested and common table expressions Identify the difference between views and table expressions Code recursive SQL Control the depth of recursion when coding recursive SQL UDTs/UDFs and Performance Describe the concepts behind User-Defined Types, User-Defined Functions and Stored Procedures Predict when queries will use indexes to get better performance Identify concepts of predicate processing State introductory concepts about index structure State general best practices advice Additional course details: Nexus Humans CE131 IBM DB2 SQL Workshop for Experienced Users training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CE131 IBM DB2 SQL Workshop for Experienced Users course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 1 Days 6 CPD hours This course is intended for The primary audience for this course is as follows: Cloud solution architects Cloud administrators Customer sales engineers DevOps engineers Sales engineers Systems engineers Technical solutions architects Overview After you complete this course the learner will be able to meet these overall objectives: Describe what clouds are supported and how to configure clouds for Cost Optimizer Examine the Cost Optimizer snapshots of costs incurred by the various clouds installed for an organization CLDCO, Mulitcloud Cost Optimization with Cisco CloudCenter Suite is a 1-day course that teaches you how the reporting and analysis of consumption the cost optimizer provides, functions within a Cisco© CloudCenter Suite. The cost optimizer works together with two other primary mechanisms: a workload manager that helps users deploy applications and manage governance policies, and an action orchestrator that provides seamless integration and workflow automation. Through lessons and hands-on experiences, you will learn the functionality of the CloudCenter cost optimizer.This course will help you:Acquire the advanced skills and techniques using the CloudCenter Suite for a consistent experience across all environments, whether you plan to deploy in the cloud or on-premisesLearn how to use the tools of cost management and workload optimization by leveraging the functionality of the entire CloudCenter suite Implementing Cisco CloudCenter Suite Cost Optimizer Cisco CloudCenter Suite Cost Optimizer Examining Cost Optimizer Inventory, Reports, Rightsizing, and Troubleshooting Configure Cost and Inventory Reports in the User Interface Additional course details: Nexus Humans Cisco Multicloud Cost Optimization with Cisco CloudCenter Suite (CLDCO) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Multicloud Cost Optimization with Cisco CloudCenter Suite (CLDCO) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for Participants who have actual experience in the data centre and/or IT infrastructures are best suited. Attendance of the CDCP© course is recommended but not a requirement. Overview After completion of the course the participant will be able to: 1. Develop and review their data centre strategy 2. Use different risk assessment methodologies together with practical tips specifically for data centre migrations to reduce the risk during a data centre migration 3. Understand different migration strategies 4. Understand the legal aspects when migrating a data centre 5. Understand the importance of Business Service Reviews and Service Level Objectives 6. Size and design the target data centre 7. Understand the importance of detailed discovery and how dependencies influence migration waves 8. Understand the safety requirements during migration 19. Get lots of practical tips when moving to another data centre This course is designed to expose participants to a step-by-step methodology which will enable them to reduce the risks involved when undertaking a data centre migration. It will also give participants a lot of valuable practical hints and tips by trainers having extensive experience in moving and consolidating mission critical data centre. Data Centre Strategy Data centre lifecycle Reasons to migrate a data centre Alternatives to data centre migration Consolidation Outsourcing Cloud computing Upgrade existing data centre or build new Project Management Project management and methods Scope statement Statement Of Work (SOW) Work Breakdown Structure (WBS) Allocate time to the project Cost and estimation methodology Project communication Risk Management Risk management and methods Risk identification Risk assessment methodologies Qualitative approach Semi-quantitative approach Quantitative approach Risk evaluation Risk treatment Risk in data centre migrations Migration Strategies Different data centre migration strategies Heterogeneous migration Homogeneous migration Physical migration Different IT transformations Pre-migration transformation Migration transformation Post-migration transformation Legal Aspects Regulatory requirements Contractual considerations Legal aspects when decommissioning High Level Discovery & Planning The importance of Business Service Reviews The concept of Availability The concept of Recoverability The importance of Service Level Objectives Requirements on designing the target IT architecture Information needed for high level planning Design Target Data Centre Requirements for the target data centre Sizing the data centre Architectural requirements Cooling requirements Power requirements Security Detailed Discovery and Planning The importance of discovery Automated discovery tools Asset management Network and system dependencies Detailed migration planning Migration waves Staffing Warranties and insurance Safety Safety precautions Technical safety review Electrical safety Lifting Personal safety during migration Fire safety during migration Security Controversy between access and security Access control Managing security during migration Security during migration Key management Practical hints and tips Continuous improvement Implementation Rehearsal Route investigation Resourcing Logistics team Packing Transport Installing the equipment Post migration support End of Project Why project closure Lessons learned Phased completion of project Criteria for project closure The outcome of the project End of project Exam: Certified Data Centre Migration Specialist Actual course outline may vary depending on offering center. Contact your sales representative for more information.
Duration 1 Days 6 CPD hours This course is intended for This course is intended for business and IT managers who may need to consider or work within a cloud computing environment. Overview Upon successful completion of this course, students will be able to: - identify the pros and cons of the cloud computing technology and determine its impact on businesses.- differentiate the currently-available cloud services.- differentiate cloud categories and adoption measures.- identify risks involved and risk mitigation measures in cloud computing. In this course, students will define cloud computing technology and describe its impact on IT scenario. Introducing Cloud Computing Impact of the Cloud on Businesses Cloud Computing?An Overview Cloud Components Differentiating Cloud Services Infrastructure as a Service (IaaS)?An Overview Platform as a Service (PaaS)?An Overview Software as a Service (SaaS)?An Overview Integrating Cloud Services Categories of Cloud Deployment Models Migration to the Cloud Identifying Risks and Risk Mitigation Measures Cloud Computing Risks Cloud Computing Risk Mitigation Measures Additional course details: Nexus Humans Introduction to Cloud Computing training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Introduction to Cloud Computing course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Anyone whose position requires CCSP certificationIndividuals whose responsibilities involve procuring, securing, and managing cloud environments or purchased cloud services Overview In-depth coverage of the six domains required to pass the CCSP exam:Architectural concepts and design requirementsCloud data securityCloud platform and infrastructure securityCloud application securityOperationsLegal and compliance This course is the most comprehensive review of cloud security concepts and industry best practices covering the six domains of the CCSP Common Body of Knowledge (CBK). You will gain knowledge in identifying the types of controls necessary to administer various levels of confidentiality, integrity, and availability, with regard to securing data in the cloud. You will identify the virtual and physical components of the cloud infrastructure with regard to risk management analysis, including tools and techniques necessary for maintaining a secure cloud infrastructure. You will gain an understanding in cloud software assurance and validation, utilizing secure software, and the controls necessary for developing secure cloud environments. You will identify privacy issues and audit processes utilized within a cloud environment, including auditing controls, assurance issues, and the specific reporting attributes. Architectural Concepts and Design Requirements Cloud Data SecurityCloud Platform and Infrastucture Security Cloud Application SecurityOperations Legal and compliance
Duration 5 Days 30 CPD hours This advanced course teaches the design principles for creating a Citrix Virtual Apps and Desktops virtualization solution. In this training, you will also learn how to assess existing environments, explore different scenarios, and make design decisions based on business requirements. This course covers the Citrix Consulting approach to design and covers the key design decisions through lectures, lab exercises, and interactive discussions. You will also learn about additional considerations and advanced configurations for multi-location solutions and disaster recovery planning. This training will help you prepare for the Citrix Certified Expert in Virtualization (CCE-V) exam. Additional course details: Nexus Humans CWS-415 Citrix Virtual Apps and Desktops 7 Assessment, Design and Advanced Configuration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CWS-415 Citrix Virtual Apps and Desktops 7 Assessment, Design and Advanced Configuration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
leadership management training course MBTI personality profiling
NPORS Cat And Genny Training or Cable Avoidance Training Prioritising the safety of underground utilities in construction and excavation projects is essential, necessitating comprehensive Cat and Genny training. In these sessions, workers receive education on operating Cable Avoidance Tools (CAT) and Signal Generators (Genny), Cat and Genny. The Cat and Genny use electromagnetic signals to detect buried cables and pipes before digging commences. Through comprehensive Cat and Genny training, workers become proficient in using CAT and Genny equipment, enabling them to accurately map out the locations of underground infrastructure. This proactive approach not only enhances on-site safety but also contributes to efficient project management by minimising the risk of accidental damage and costly delays. The aim of the NPORS Cat & Genny Training is to Provide training in Cable Avoidance and Service Location (Cat and Genny).The Cat and Genny Course is designed for any person working on the roads, setting out before a build, surveying and any others who may be excavating an area where pipes or cables may be buried underground. Price Match Promise Book with Confidence at Vally Plant Training At Vally Plant Training, we guarantee unbeatable value with our Price Match Promise. When you choose us for your Cat and Genny Course, you can book with confidence, knowing that we will not be beaten on price. If you find a lower price for the same NPORS Cat And Genny Course, we’ll match it—ensuring you receive top-quality training at the best possible rate. Your skills, our commitment—always at the best price. CAT & GENNY Training is designed for construction professionals and workers involved in excavation who need to operate Cable Avoidance Tools and Signal Generators. This training is ideal for individuals who have prior experience in excavation but require formal instruction on the safe and effective use of these specific tools to prevent accidental damage to underground services. Participants should have a basic understanding of excavation work, and if unsure of their eligibility for this advanced training, are encouraged to contact our training coordinators for more information. The CAT & GENNY training program is divided into two main sections: a theoretical module and a practical application module. The theory part covers the principles of operation, safety procedures, and risk assessment associated with underground utility detection. The practical module provides hands-on experience with both the Cable Avoidance Tool and Signal Generator, emphasising field techniques and problem-solving. Upon completion of the Cat And Genny course, participants will receive comprehensive revision materials to reinforce key concepts covered during the training. Introduction to CAT and Genny Training CAT and Genny , also referred to as CAT & Genny or CAT and Genny Training, are essential tools used in the construction and utility sectors to help locate and avoid underground cables and pipes during excavation works. CAT, which stands for Cable Avoidance Tool, is designed to detect signals naturally emitted by metallic services like electrical cables. Meanwhile, the Genny, short for Signal Generator, is used alongside the CAT to apply a signal to underground utilities that do not naturally emit detectable signals, such as telecoms or fibre . Understanding how to operate these tools is crucial for anyone involved in excavation. Proper use of CAT and Genny can prevent costly and dangerous errors, such as accidentally cutting through power lines or water pipes. The training not only focuses on how to use these devices effectively but also covers the best practices for scanning different types of terrain and interpreting the signals received. This ensures that workers can conduct their tasks safely and efficiently, minimising the risk of disruption and damage to underground services. What Is CAT and Genny Training? CAT and Genny Training provides comprehensive instruction on using Cable Avoidance Tools (CAT) and Signal Generators (Genny) to locate underground utilities safely. This training is critical to reduce the risk of accidentally striking underground assets during excavation, which can lead to severe safety hazards and financial losses. What Does Our CAT and Genny Training Course Cover? Our CAT and Genny Training Course covers: Basics of operating CAT and Genny equipment: Understanding the device controls, functions, and proper handling. Detection techniques: Learning how to detect different types of services, including electric, gas, and water. Practical applications: Hands-on training with both simulated and live environments to practice safe scanning and detection. Safety protocols: Emphasising safety procedures to prevent injuries and accidents. Legal compliance: Overview of health and safety regulations related to excavation work. Who Needs CAT and Genny Training? CAT and Genny Training is essential for anyone involved in excavation and groundworks. This includes utility workers, construction workers, civil engineers, site managers, and anyone else who may need to locate underground utilities as part of their job. The Cat And Genny Course is crucial for preventing damage to underground infrastructure like gas, water, telecoms and electrical lines, which can result in costly repairs and dangerous accidents. Do You Need to Be Trained to Use a CAT Scanner? Yes, training is highly recommended to use a CAT scanner effectively and safely. While not legally mandatory, proper training ensures that operators can accurately interpret the scanner’s signals and avoid potential hazards when working near underground utilities. Specialised Genny Tool Training Course Overview: The Genny Course is designed specifically to train users on the effective operation of the Genny tool, a crucial component of the CAT and Genny system used for detecting underground utilities. Key Learning Outcomes: → Understanding Genny Signals: Participants will learn how different signals can be applied and traced using the Genny, improving their ability to detect non-metallic utilities such as plastic water pipes. → Optimising Signal Strength: Training includes adjusting the Genny’s signal strength to suit various soil conditions and utility types, ensuring clearer and more accurate detections. Practical Applications: → Hands-on Practice: Extensive field practice sessions are included to give participants real-world experience in using the Genny effectively. →Troubleshooting Common Issues: Learners will be taught how to troubleshoot common operational issues to minimise downtime and enhance field productivity. Advanced Techniques: → Using Genny with CAT4: Instructions on how to integrate Genny use with the CAT4 detector for enhanced detection capabilities. → Interpreting and Mapping: Skills in interpreting the Genny’s output and using integrated mapping tools for accurate utility mapping. Safety Protocols: → Safe Operation Practices: Emphasis on safety measures to prevent accidents during the use of high-frequency signals. → Maintenance and Daily Checks: Training on regular maintenance routines and daily checks to keep the Genny in optimal working condition. Certification: → Qualification and Certification: Upon completion of the course, participants receive a certification that validates their proficiency in using the Genny tool according to industry standards. Scanning Techniques with CAT and Genny General Scanning Techniques: → Sweeping Motion: Always use a slow, steady sweeping motion with the CAT device. Begin scanning at least a few meters away from the expected area of the utilities to avoid missing any signals. → Directional Scans: Perform scans in multiple directions — both parallel and perpendicular to the expected direction of the utility lines to ensure thorough coverage. → Depth Perception: Adjust the depth settings based on preliminary scans to get an accurate depth estimate of buried utilities. Specific Use of Genny: → Direct Connection: When available, use the direct connection method with the Genny to induce a precise signal into a specific utility line. This is particularly useful in crowded areas with multiple utility lines. → Induction Mode: Use the Genny’s induction mode when direct connections are not possible. Ensure the Genny is placed on the ground vertically for optimal signal transmission. How to Use the CAT and Genny to Find Hidden Wires and Pipes Getting Ready: Check the Tools: Make sure the CAT and Genny are ready to use and have full batteries. Set Up the Genny: Pick the right sound for the Genny to use so it can find wires or pipes under the ground. If you can, connect the Genny to the pipe or wire with a special wire. Using the Genny: Stand it on the Ground: Put the Genny on the ground where you think there might be something hidden. Turn it on to send a beep into the ground. Connect it for Better Finding: Sometimes, you connect the Genny to something like a pipe for a clearer beep. Using the CAT: Start with Power Mode: Turn on the CAT and use the power mode to find beeps from wires that are on. Try Radio Mode: Next, switch to radio mode to hear beeps from metal things like pipes. Finally, Use Genny Signal Mode: Use this mode to hear the special beeps from your Genny to find hidden stuff like plastic pipes. How to Look Properly: Move Slowly: Walk slowly with the CAT over the area. If you move too fast, you might miss some beeps. Check in a Cross Pattern: First walk in one direction and then the other direction to make sure you cover all the area. Understanding What You Hear: Listen to the Beeps: A loud beep means you are close to a wire or pipe. If the beep sounds the same as you move, it probably means you found a wire or pipe. Staying Safe: Look Before You Dig: Always check by looking in the hole to make sure what the CAT and Genny found before you start digging. Keep the Tools Working Well: Make sure your tools are working right by checking them often. 500 mm from utilities; Always use insulated digging tools when close to underground utilities Frequently Asked Questions On Cat & Genny Training What is CAT and Genny training? CAT and Genny training provides instruction on how to use Cable Avoidance Tools (CAT) and Signal Generators (Genny) effectively to detect underground utilities and avoid accidental strikes during excavation. The training covers operational techniques, safety procedures, and the correct interpretation of the equipment’s signals. Why is CAT and Genny training important for construction workers? This Cat And Genny Course is crucial for safety and efficiency on construction sites. It helps workers avoid costly damages to underground utilities such as water pipes, electricity cables, and communication lines, which can lead to severe consequences including service outages, legal liabilities, and endangerment of worker and public safety. 3. How Long Is the Certification Valid? The certification received after completing CAT and Genny Training is generally valid for three to five years. After this period, a refresher course is recommended to keep up with new technologies and changing safety regulations. 4. Is CAT and Genny training required by law in the UK? While not specifically mandated by law, CAT and Genny training is strongly recommended under the UK Health and Safety Executive guidelines (HSE) to meet the legal duties under the Health and Safety at Work Act. It is considered best practice for anyone involved in excavation works. Cat & Genny Training Available 7 days a week to suit your business requirements. VPT have a team of friendly and approachable instructors, who have a wealth of knowledge of cable avoidance and the construction industry We have our own training centre conveniently located close to the M5 junction 9, In Tewkesbury. With its own purpose-built practical training area to simulate an actual working environment for the cat & genny course. Our Cable Avoidance training and test packages are priced to be competitive. Discounts are available for multiple bookings We can send a fully qualified NPORS cat & genny Tester to your site nationwide, to reduce the amount of time away from work Our more courses: Polish your abilities with our dedicated Lift Supervision Training, Slinger Signaller Training, Telehandler Training, Cat & Genny Training, Plant Loader Securer, Ride-On Road Roller, Abrasive Wheel Training, Lorry Loader Training and Scissor Lift Training sessions. Learn the safe and effective operation of these vital machines, crucial for construction and maintenance tasks. Elevate your skills and career prospects by enrolling in our comprehensive courses today.
Overview This is a 1 Day Product course and as such is designed for participants who wish to improve the depth of their technical knowledge surrounding Exotic Options. Who the course is for Equity and Derivative sales Equity and Derivative traders Equity & Derivatives structurers Quants IT Equity portfolio managers Insurance Company investment managers Risk managers Course Content To learn more about the day by day course content please request a brochure To learn more about schedule, pricing & delivery options, book a meeting with a course specialist now
This dynamic programme empowers attendees to enhance their emotional intelligence, forge meaningful connections in every interaction, engage in impactful coaching conversations, and cultivate resilience and psychological safety. Through interactive workshops, compelling discussions, and practical exercises, participants will acquire skills and insights necessary to foster a space for collaboration helping shape an environment of trust and openness in their professional and personal spaces