This course provides the delegate with the theoretical and practical skills to undertake non-licensed works with ACM's. Persons requiring this type of training would include trade operatives undertaking tasks with ACM's as defined in HSG210 and in accordance with CAR 2012 Reg 3(2). In addition to the Asbestos Awareness, those employees whose work will knowingly disturb ACMs, and which is defined as non-licensable work or NNLW, should receive additional task-specific information, instruction and training.
MJ Electrical Training offers a one-day online course for a Health & Safety Exemption, which can be used when applying for an ECS Labourers card. ECS (Electrotechnical Certification Scheme) is a card scheme for electrotechnical operatives in the UK. The ECS Labourer card is designed for those working in a supporting role within the electrotechnical industry.
MJ Electrical Training offers a one-day online course for a Health & Safety Exemption, which can be used when applying for an ECS Labourers card. ECS (Electrotechnical Certification Scheme) is a card scheme for electrotechnical operatives in the UK. The ECS Labourer card is designed for those working in a supporting role within the electrotechnical industry.
This course provides the delegate with the theoretical and practical skills to undertake non-licensed works with ACM's. Persons requiring this type of training would include trade operatives undertaking tasks with ACM's as defined in HSG210 and in accordance with CAR 2012 Reg 3(2). In addition to the Asbestos Awareness, those employees whose work will knowingly disturb ACMs, and which is defined as non-licensable work or NNLW, should receive additional task-specific information, instruction and training.
Asbestos Awareness training is a legal requirement for any worker who may encounter asbestos during their work. Modules will provide relevant and detailed knowledge about the dangers of asbestos, the products that contain asbestos, what it looks like, where it may have been used and the practical steps that can be taken to reduce their risk of exposure. In addition to common mandatory modules, learners will also choose a selection of modules relevant to their occupational pathway.
Asbestos Awareness training is a legal requirement for any worker who may encounter asbestos during their work. Modules will provide relevant and detailed knowledge about the dangers of asbestos, the products that contain asbestos, what it looks like, where it may have been used and the practical steps that can be taken to reduce their risk of exposure. In addition to common mandatory modules, learners will also choose a selection of modules relevant to their occupational pathway.
Duration 5 Days 30 CPD hours This course is intended for This course is for wireless engineers who work in the following roles: Consulting systems engineer Network administrator Network engineer Network manager Sales engineer Systems engineer Technical solutions architect Wireless design engineer Wireless engineer Overview After taking this course, you should be able to: Describe and implement a Cisco-recommended structured design methodology Describe and implement industry standards, amendments, certifications, and Requests For Comments (RFCs) Describe and implement Cisco enhanced wireless features Describe and implement the wireless design process Describe and implement specific vertical designs Describe and implement site survey processes Describe and implement network validation processes The Designing Cisco Enterprise Wireless Networks (ENWLSD) v1.1 course gives you the knowledge you need to design Cisco© wireless networks. The course covers design specifics from scenario design concepts through the installation phase and into post-deployment validation.This course, including the self-paced material, helps prepare you to take the exam, Designing Cisco Enterprise Wireless Networks (300-425 ENWLSD), which leads to to the new CCNP© Enterprise and Cisco Certified Specialist ? Enterprise Wireless Design certifications. Describing and Implementing a Structured Wireless Design Methodology Importance of Planning Wireless Design with a Structured Methodology Cisco Structured Design Model Cisco Design Guides and Cisco Validated Designs for Wireless Networks Role of the Project Manager When Designing Wireless Networks Describing and Implementing Industry Protocols and Standards Wireless Standards Bodies Institute of Electrical and Electronics Engineers (IEEE) 802.11 Standard and Amendments Wi-Fi Alliance (WFA) Certifications Relevant Internet Engineering Task Force (IETF) Wireless RFCs Practice Activity Describing and Implementing Cisco Enhanced Wireless Features Hardware and Software Choices for a Wireless Network Design Cisco Infrastructure Settings for Wireless Network Design Cisco Enhanced Wireless Features Examining Cisco Mobility and Roaming Mobility and Intercontroller Mobility in a Wireless Network Optimize Client Roaming in a Wireless Network Cisco Workgroup Bridge (WGB) and WGB Roaming in a Wireless Network Describing and Implementing the Wireless Design Process Overview of Wireless Design Process Meet with the Customer to Discuss the Wireless Network Design Customer Information Gathering for a Wireless Network Design Design the Wireless Network Deployment of the Wireless Network Validation and Final Adjustments of the Wireless Network Wireless Network Design Project Documents and Deliverables Describing and Implementing Specific Vertical Designs Designs for Wireless Applications Wireless Network Design Within the Campus Extend Wireless Networks to the Branch Sites Examining Special Considerations in Advanced Wireless Designs High-Density Designs in Wireless Networks Introducing Location and Cisco Connected Mobile Experiences (CMX) Concepts Design for Location FastLocate and HyperLocation Bridges and Mesh in a Wireless Network Design Redundancy and High Availability in a Wireless Network Describing and Implementing the Site Survey Processes Site Survey Types Special Arrangements Needed for Site Surveys Safety Aspects to be Considered During Site Surveys Site Survey Tools in Cisco Prime Infrastructure Third-Party Site Survey Software and Hardware Tools Describing and Implementing Wireless Network Validation Processes Post-installation Wireless Network Validation Making Post-installation Changes to a Wireless Network Wireless Network Handoff to the Customer Installation Report
Duration 2 Days 12 CPD hours This course is intended for Participants who have actual experience in the data centre and/or IT infrastructures are best suited. Attendance of the CDCP© course is recommended but not a requirement. Overview After completion of the course the participant will be able to: 1. Develop and review their data centre strategy 2. Use different risk assessment methodologies together with practical tips specifically for data centre migrations to reduce the risk during a data centre migration 3. Understand different migration strategies 4. Understand the legal aspects when migrating a data centre 5. Understand the importance of Business Service Reviews and Service Level Objectives 6. Size and design the target data centre 7. Understand the importance of detailed discovery and how dependencies influence migration waves 8. Understand the safety requirements during migration 19. Get lots of practical tips when moving to another data centre This course is designed to expose participants to a step-by-step methodology which will enable them to reduce the risks involved when undertaking a data centre migration. It will also give participants a lot of valuable practical hints and tips by trainers having extensive experience in moving and consolidating mission critical data centre. Data Centre Strategy Data centre lifecycle Reasons to migrate a data centre Alternatives to data centre migration Consolidation Outsourcing Cloud computing Upgrade existing data centre or build new Project Management Project management and methods Scope statement Statement Of Work (SOW) Work Breakdown Structure (WBS) Allocate time to the project Cost and estimation methodology Project communication Risk Management Risk management and methods Risk identification Risk assessment methodologies Qualitative approach Semi-quantitative approach Quantitative approach Risk evaluation Risk treatment Risk in data centre migrations Migration Strategies Different data centre migration strategies Heterogeneous migration Homogeneous migration Physical migration Different IT transformations Pre-migration transformation Migration transformation Post-migration transformation Legal Aspects Regulatory requirements Contractual considerations Legal aspects when decommissioning High Level Discovery & Planning The importance of Business Service Reviews The concept of Availability The concept of Recoverability The importance of Service Level Objectives Requirements on designing the target IT architecture Information needed for high level planning Design Target Data Centre Requirements for the target data centre Sizing the data centre Architectural requirements Cooling requirements Power requirements Security Detailed Discovery and Planning The importance of discovery Automated discovery tools Asset management Network and system dependencies Detailed migration planning Migration waves Staffing Warranties and insurance Safety Safety precautions Technical safety review Electrical safety Lifting Personal safety during migration Fire safety during migration Security Controversy between access and security Access control Managing security during migration Security during migration Key management Practical hints and tips Continuous improvement Implementation Rehearsal Route investigation Resourcing Logistics team Packing Transport Installing the equipment Post migration support End of Project Why project closure Lessons learned Phased completion of project Criteria for project closure The outcome of the project End of project Exam: Certified Data Centre Migration Specialist Actual course outline may vary depending on offering center. Contact your sales representative for more information.
Duration 5 Days 30 CPD hours This course is intended for If you are getting ready for a career as an entry-level information technology (IT) professional or personal computer (PC) service technician, the CompTIA© A+© Certification course is the first step in your preparation. Overview In this course, you will install, configure, optimize, troubleshoot, repair, upgrade, and perform preventive maintenance on personal computers, digital devices, and operating systems. You will:Identify the hardware components of personal computers and mobile digital devices.Identify the basic components and functions of operating systems.Identify networking and security fundamentals.Identify the operational procedures that should be followed by professional PC technicians.Install, configure, and troubleshoot display devices.Install and configure peripheral components.Manage system components.Manage data storage.Install and configure Microsoft Windows.Optimize and maintain Microsoft Windows.Work with other operating systems.Identify the hardware and software requirements for client environment configurations.Identify network technologies.Install and configure networking capabilities.Support mobile digital devices.Support printers and multifunction devices.Identify security threats, vulnerabilities, and controls.Implement security controls.Troubleshoot system-wide issues. In this course, you will acquire the essential skills and information you will need to install, upgrade, repair, configure, troubleshoot, optimize, and perform preventative maintenance of basic personal computer hardware and operating systems. Hardware Fundamentals Topic A: Personal Computer Components Topic B: Storage Devices Topic C: Mobile Digital Devices Topic D: Connection Interfaces Operating System Fundamentals Topic A: PC and Mobile Operating Systems Topic B: PC Operating System Tools and Utilities Networking & Security Fundamentals Topic A: Network Types Topic B: Network Components Topic C: Common Network Services Topic D: Cloud Concepts Topic E: Security Fundamentals Safety & Operational Procedures Topic A: Basic Maintenance Tools and Techniques Topic B: Personal and Electrical Safety Topic C: Environmental Safety and Materials Handling Topic D: Professionalism and Communication Topic E: Organizational Policies and Procedures Topic F: Troubleshooting Theory Supporting Display Devices Topic A: Install Display Devices Topic B: Configure Display Devices Topic C: Troubleshoot Video and Display Devices Installing & Configuring Peripheral Components Topic A: Install and Configure Input Devices Topic B: Install and Configure Output Devices Topic C: Install and Configure Input/Output Devices Topic D: Install and Configure Expansion Cards Managing System Components Topic A: Identify Motherboard Components and Features Topic B: Install and Configure CPUs and Cooling Systems Topic C: Install Power Supplies Topic D: Troubleshoot System Components Managing Data Storage Topic A: Identify RAM Types and Features Topic B: Troubleshoot RAM Issues Topic C: Install and Configure Storage Devices Topic D: Configure the System Firmware Topic E: Troubleshoot Hard Drives and RAID Arrays Installing & Configuring Microsoft Windows Topic A: Implement Client-Side Virtualization Topic B: Install Microsoft Windows Topic C: Use Microsoft Windows Topic D: Configure Microsoft Windows Topic E: Upgrade Microsoft Windows Optimizing & Maintaining Microsoft Windows Topic A: Optimize Microsoft Windows Topic B: Back Up and Restore System Data Topic C: Perform Disk Maintenance Topic D: Update Software Working with Other Operating Systems Topic A: The OS X Operating System Topic B: The Linux Operating System Customized Client Enviroments Topic A: Types of Common Business Clients Topic B: Custom Client Environments Networking Technologies Topic A: TCP/IP Properties and Characteristics Topic B: TCP/IP Topic C: Internet Connections Topic D: Ports and Protocols Topic E: Networking Tools Installing & Configuring Networking Capabilities Topic A: Configure Basic Windows Networking Topic B: Configure Network Perimeters Topic C: Using Windows Networking Features Topic D: Install and Configure SOHO Networks Supporting Mobile Digital Devices Topic A: Install and Configure Exterior Laptop Components Topic B: Install and Configure Interior Laptop Components Topic C: Other Mobile Devices Topic D: Mobile Device Accessories and Ports Topic E: Mobile Device Connectivity Topic F: Mobile Device Synchronization Topic G: Troubleshoot Mobile Device Hardware Supporting Printers & Multifunction Devices Topic A: Printer and Multifunction Technologies Topic B: Install and Configure Printers Topic C: Maintain Printers Topic D: Troubleshoot Printers Security Threats, Vulnerabilities, and Controls Topic A: Common Security Threats and Vulnerabilities Topic B: General Security Controls Topic C: Mobile Security Controls Topic D: Data Destruction and Disposal Methods Implementing Security Controls Topic A: Secure Operating Systems Topic B: Secure Workstations Topic C: Secure SOHO Networks Topic D: Secure Mobile Devices Troubleshooting System-Wide Issues Topic A: Troubleshoot PC Operating Systems Topic B: Troubleshoot Mobile Device Operating Systems and Applications Topic C: Troubleshoot Wired and Wireless Networks Topic D: Troubleshoot Common Security Issues
Duration 5 Days 30 CPD hours This course is intended for If you are getting ready for a career as an entry-level information technology (IT) professional or personal computer (PC) service technician, the CompTIA© A+© Certification course is the first step in your preparation. Overview In this course, you will install, configure, optimize, troubleshoot, repair, upgrade, and perform preventive maintenance on personal computers, digital devices, and operating systems. You will:Identify the hardware components of personal computers and mobile digital devices.Identify the basic components and functions of operating systems.Identify networking and security fundamentals.Identify the operational procedures that should be followed by professional PC technicians.Install, configure, and troubleshoot display devices.Install and configure peripheral components.Manage system components.Manage data storage.Install and configure Microsoft Windows.Optimize and maintain Microsoft Windows.Work with other operating systems.Identify the hardware and software requirements for client environment configurations.Identify network technologies.Install and configure networking capabilities.Support mobile digital devices.Support printers and multifunction devices.Identify security threats, vulnerabilities, and controls.Implement security controls.Troubleshoot system-wide issues. In this course, you will acquire the essential skills and information you will need to install, upgrade, repair, configure, troubleshoot, optimize, and perform preventative maintenance of basic personal computer hardware and operating systems. Hardware Fundamentals Topic A: Personal Computer Components Topic B: Storage Devices Topic C: Mobile Digital Devices Topic D: Connection Interfaces Operating System Fundamentals Topic A: PC and Mobile Operating Systems Topic B: PC Operating System Tools and Utilities Networking & Security Fundamentals Topic A: Network Types Topic B: Network Components Topic C: Common Network Services Topic D: Cloud Concepts Topic E: Security Fundamentals Safety & Operational Procedures Topic A: Basic Maintenance Tools and Techniques Topic B: Personal and Electrical Safety Topic C: Environmental Safety and Materials Handling Topic D: Professionalism and Communication Topic E: Organizational Policies and Procedures Topic F: Troubleshooting Theory Supporting Display Devices Topic A: Install Display Devices Topic B: Configure Display Devices Topic C: Troubleshoot Video and Display Devices Installing & Configuring Peripheral Components Topic A: Install and Configure Input Devices Topic B: Install and Configure Output Devices Topic C: Install and Configure Input/Output Devices Topic D: Install and Configure Expansion Cards Managing System Components Topic A: Identify Motherboard Components and Features Topic B: Install and Configure CPUs and Cooling Systems Topic C: Install Power Supplies Topic D: Troubleshoot System Components Managing Data Storage Topic A: Identify RAM Types and Features Topic B: Troubleshoot RAM Issues Topic C: Install and Configure Storage Devices Topic D: Configure the System Firmware Topic E: Troubleshoot Hard Drives and RAID Arrays Installing & Configuring Microsoft Windows Topic A: Implement Client-Side Virtualization Topic B: Install Microsoft Windows Topic C: Use Microsoft Windows Topic D: Configure Microsoft Windows Topic E: Upgrade Microsoft Windows Optimizing & Maintaining Microsoft Windows Topic A: Optimize Microsoft Windows Topic B: Back Up and Restore System Data Topic C: Perform Disk Maintenance Topic D: Update Software Working with Other Operating Systems Topic A: The OS X Operating System Topic B: The Linux Operating System Customized Client Enviroments Topic A: Types of Common Business Clients Topic B: Custom Client Environments Networking Technologies Topic A: TCP/IP Properties and Characteristics Topic B: TCP/IP Topic C: Internet Connections Topic D: Ports and Protocols Topic E: Networking Tools Installing & Configuring Networking Capabilities Topic A: Configure Basic Windows Networking Topic B: Configure Network Perimeters Topic C: Using Windows Networking Features Topic D: Install and Configure SOHO Networks Supporting Mobile Digital Devices Topic A: Install and Configure Exterior Laptop Components Topic B: Install and Configure Interior Laptop Components Topic C: Other Mobile Devices Topic D: Mobile Device Accessories and Ports Topic E: Mobile Device Connectivity Topic F: Mobile Device Synchronization Topic G: Troubleshoot Mobile Device Hardware Supporting Printers & Multifunction Devices Topic A: Printer and Multifunction Technologies Topic B: Install and Configure Printers Topic C: Maintain Printers Topic D: Troubleshoot Printers Security Threats, Vulnerabilities, and Controls Topic A: Common Security Threats and Vulnerabilities Topic B: General Security Controls Topic C: Mobile Security Controls Topic D: Data Destruction and Disposal Methods Implementing Security Controls Topic A: Secure Operating Systems Topic B: Secure Workstations Topic C: Secure SOHO Networks Topic D: Secure Mobile Devices Troubleshooting System-Wide Issues Topic A: Troubleshoot PC Operating Systems Topic B: Troubleshoot Mobile Device Operating Systems and Applications Topic C: Troubleshoot Wired and Wireless Networks Topic D: Troubleshoot Common Security Issues Additional course details: Nexus Humans Managing and Troubleshooting PCs - Part 2 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Managing and Troubleshooting PCs - Part 2 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.