• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1273 Enterprise courses

Electronic Document and Record Management System (EDRMS)

5.0(10)

By GBA Corporate

Overview EDRMS Electronic Document and Record Management System is basically a kind of IT-based system which is developed to manage the creation, tracking, storage and disposal of all physical and digital documents and records. Through this, we can easily keep track of various documents modified by different users. With the access of one application, many different tasks can be completed that revolve around document management. It enhances the security system where we can easily define whom to have access to what part of the documents. EDRMS is known by many other different names like Enterprise content management systems or digital asset management, document mapping and so on. This course shows participants how to deal with documents in an electronic way to get rid of the paper's hard copy which takes a lot of space and time. It will also update you with the EDRMS system and changes that happen to take place with the passage of time. The advanced technology leads to Advance EDRMS systems with enhanced features. 

Electronic Document and Record Management System (EDRMS)
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,626

Cisco Unified Contact Center Enterprise Advanced Administration v11.5 (UCCE-AA)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Cisco Unified Communications system channel partners and resellers. • System and technical support engineers. • Customers who are deploying and maintaining Cisco Unified CCE solution products. Overview Upon completing this course, the learner will be able to meet these overall objectives: • Understand CCE solutions, architecture, solution options, deployment models, integrated features and call flow options. • Apply advanced scripting principles using the expression editor and custom functions and implement silent monitoring and recording. • Understand Cisco Finesse administration and how to set up reason/wrap-up codes, desktop layout, custom variables, and workflow applications and implement Finesse IP Phone Agent. • Understand and implement VoiceXML applications and configure access to an external database via the VXML Server. • Understand the concepts behind translation routing to include when, why, and how to implement translation routing in a Cisco Unified CCE or traditional ICM environment. • Implement Cisco Unified CCE Options including Cisco Outbound dialing, Courtesy Callback, Agent Greeting/Whisper announcements, and Mobile Agent. • Understand advanced CUIC reporting concepts including administration, importing reports, and custom reporting. Helps prepare learners to implement more advanced functions and options in the Cisco Unified CCE environment. Cisco Unified Contact Center Enterprise Overview Lesson 1: Presenting Cisco Unified Contact Center Enterprise Lesson 2: Cisco Unified CCE Core Components Lesson 3: Cisco Unified CCE Options Lesson 4: Basic Call Flow Models Implementing Business Rules Lesson 1: Advanced Scripting and Routing Lesson 2: ICM Scripting Variables, Expressions, Formulas and Functions Lesson 3: Silent Monitoring and Recording Lesson 4: Advanced CVP Configurations Using Finesse Administration Lesson 1: Finesse Overview Lesson 2: Finesse Administration Lesson 3: Finesse IP Phone Agent Using CVP VoiceXML Applications Lesson 1: Basic VoiceXML Functionality Lesson 2: Using Call Studio Lesson 3: ICM Scripting for VoiceXML Applications Translation Routing Lesson 1: Traditional Translation Routing Lesson 2: Translation Routing to CVP Configuring Cisco Unified CCE Options Lesson 1: Cisco Outbound Option Lesson 2: Courtesy Callback Lesson 3: Agent Greeting/Whisper Announcements Lesson 4: Mobile Agent CUIC Reporting for the Advanced User Lesson 1: CUIC Overview Lesson 2: CUIC Administration Lesson 3: Importing and Using CVP Reports Lesson 4: Custom Reporting

Cisco Unified Contact Center Enterprise Advanced Administration v11.5 (UCCE-AA)
Delivered OnlineFlexible Dates
Price on Enquiry

NCSP 800-53 Practitioner Certification Training

By IIL Europe Ltd

The NCSP® 800-53 Practitioner accredited (APMG International), certified (NCSC/GCHQ-UK), and recognized (DHS-CISA-USA) certification course teaches Digital Business, Operational Stakeholders, Auditors, and Risk Practitioners a Fast-Track approach to adopting and adapting the NIST Cybersecurity Framework and its 800-53 controls across an enterprise and its supply chain.The course also teaches candidates how to build a Digital Value Management System (DVMS) CPD overlay model capable of enabling the quick adoption and adaption of new frameworks and models (NIST-CSF, NIST Privacy Framework, CMMC, etc.) that may be required to address internal, external (regulatory), and cyber threat landscape changes. Finally, the course teaches candidates how to ensure the organization's DVMS is designed for use within the organization and auditable by government regulators looking to verify regulatory outcomes. The NCSP Practitioner 800-53 course is designed for both the Implementer and Auditor topics and participants select the exam they want to take (or an additional exam can be ordered to be certified as both an implementer and auditor).

NCSP 800-53 Practitioner Certification Training
Delivered OnlineFlexible Dates
£2,995 to £3,995

Spring MVC With Spring Boot (All Modules) and Project

By Packt

Spring MVC is a Java framework that is used to build web applications; it follows the MVC design pattern. In this course, we'll learn all key Spring framework features to develop robust enterprise-grade web applications. We'll learn how to create a complete Spring-based web application from scratch, with Spring Security, MVC, Spring Data, View, and more. In the end, we will combine all the modules we have learned and create a real-time Todo application from scratch.

Spring MVC With Spring Boot (All Modules) and Project
Delivered Online On Demand8 hours 19 minutes
£74.99

BA (Hons.) Business Management - 24 Months

4.0(2)

By London School Of Business And Research

Its no secret the world has been changing before our eyes ! In order to confront the rapidly-evolving world around us, businesses need highly trained, adaptable and creative individuals to keep pace and stay innovative. BA (Hons) Business Management course is designed to train you for the jobs of the future; you'll be taught the fundamentals of business management in the wider context of the contemporary business landscape, ensuring your skills will remain flexible and adaptable as the world changes. The programme aims to develop pro-active decision makers, managers and leaders for a variety of careers in business sectors in a global context. The course combines practical professional experience with creative approaches to enterprise and innovation that will develop your entrepreneurial spirit. Program OverviewKey Highlights Program Duration: 24 Months (18 Months Option also available) Program Credits: 120 Designed for working Professionals 100% Online Global programme: Study anywhere, anytime on your laptop, phone or tablet. Study material: Comprehensive study materials and e-library support. No Written Exam. The Assessment is done via Submission of Assignment Online Lectures Timely Doubt Resolution Dedicated Student Success Manager Regular Networking Events with Industry Professionals LSBR Alumni Status Payment Plan: No Cost EMI Option

BA (Hons.) Business Management - 24 Months
Delivered Online On Demand
£7,200

Network management technologies

5.0(3)

By Systems & Network Training

Network management technologies course description A comprehensive tour of the available network management technologies available for todays networks. The course starts with basic tools such as syslog along with Python network automation. SNMP is then covered with the *flow technologies and streaming telemetry. Configuration management with ansible, Python, NETCONF and RESTCONF is then studied. The final part of the course looks at SDN. Hands on sessions are used throughout to reinforce the theory rather than teach specific manufacturer equipment. Note that sections are available as individual courses. What will you learn Evaluate network management technologies. Evaluate network management technologies. Recognise the weaknesses of SNMP versus NETCONF and streaming telemetry. Explain the role of NETCONF and RESTCONF. Compare & contrast *flow and streaming telemetry. Explain the role of SDN in network management. Automate network configuration with ansible and Python. Network management technologies course details Who will benefit: Those wishing to manage networks. (Previous Python experience is NOT needed) Prerequisites: Intro to data comms Duration 5 days Network management technologies course content Basic network management Network management What is network management? Benefits, issues. FCAPS model. Fault management, Configuration management, accounting, performance, security. What to manage, what not to manage. Managing network devices, managing servers. Monitoring networks Traditional network tools Ping..., SSH, syslog, TFTP for configurations. nmap. Wireshark. CLI. Web based management. Splunk. Nessus, snort, Kali. Hands on syslog, network inventories. Network automation using the CLI Programming and automating networks, netOps. Python, Git. Python network modules, SSH, paramiko, netmiko. EVE-NG. Hands onPython network modules. Structured versus unstructured data Problems with automation and unstructured data. XML, JSON, YAML. The role of YANG. Hands on Parsing data. SNMP SNMP architecture, SNMP MIBs, SMI, the SNMP protocol, polling security. Configuring SNMP. SNMPv1, v2, v3, SNMP security. Which version should you use? MIBs and MIB structure. mib-2, extra parts of mib-2, Private enterprise MIBs. Summary: What SNMP is good/bad at. Hands on Configuring agents and a NMS. MIB browsing. Server management Microsoft, Linux, application polling. WMI vs SNMP. Hands on: Application polling. Performance management *flow Polling, push vs pull, netflow, sflow, IPFIX, *flow. Flows. Where to monitor traffic. Comparing *flow with SNMP. Architecture: Generators and collectors. When flows are exported. NetFlow reporting products. SolarWinds. Hands on Netflow configuration. Collectors. Streaming telemetry Model driven telemetry, periodic/on change. Structured data. Telemetry protocol stack. gRPC and gNMI. Protobuf. gNMI operations. Telemetry architecture. Telegraf, databases, Grafana. Hands on Telemetry example. Configuration management Configuration management tools Chef, puppet, ansible, saltstack. Ansible architecture, controlling machines, nodes, agentless, SSH, modules. Inventories, playbooks, modules, network modules, jinja2 templates. Hands on Network configuration with ansible. NETCONF What is NETCONF? Protocol stack, Data stores, traffic flows, validating configurations, rollback. YANG data models and how YANG is used by NETCONF. XML. Explorers and other tools. Hands on anx, Python and NETCONF. RESTCONF The REST API, HTTP, What is RESTCONF? Tools including Postman. Comparison with NETCONF. Hands on Configuration with RESTCONF. Python network automation: configuration SSH issues. Using structured data. Jinja2. ncclient, requests, NAPALM, Nornir. Automated testing. Hands on Python network device configuration with nornir. Software Defined Networks and orchestration Classic SDN What is SDN? benefits. SDN architecture. SDN applications, SDN switches, SDN controllers, Network Operating Systems. Control plane, data plane. Northbound interfaces. SDN components. Southbound interfaces. OpenFlow. ONF, OpenFlow ports, Flow tables. Network virtualization Virtual networks, virtual switches, NfV. Service chaining. NfV and SDN. SDN implementations Classic SDN, Hybrid SDN, SDN via APIs, SDN via overlays. Data centre SDN, VXLAN, Service Provider SDN, SD WAN, Enterprise SDN, WiFi. SDN and open source OpenDaylight, OpenVSwitch, Open Networking Forum, Open Network Operating System. Hands onOpenStack. SD-WAN What is SD-WAN? Architecture: Edge, gateway, orchestrator, controller. Overlay and underlay. Use of MPLS, 4G/5G. Benefits and features. Secure Access Service Edge (SASE).

Network management technologies
Delivered in Internationally or OnlineFlexible Dates
£3,697

CompTIA Advanced Security Practitioner (CASP) - Video Training Course

4.3(43)

By John Academy

Description This CompTIA Advanced Security Practitioner (CASP) - Video Training Course establishes knowledgeable professionals in the field of advanced security practices. At first you will learn about the enterprise security architecture, security technology and resource technology. Then you will learn security design and solutions, application security design, managing risk, security policies, security procedures and enterprise security integration. Finally, you will learn about security research and analysis, disaster recovery and business continuity, managing risk in projects, legal issues and judgment and decision-making. It involves applying critical thinking and judgment across a broad spectrum of security disciplines to propose and implement solutions that map to enterprise drivers. This course will prepare you to pass the exam CompTIA Advanced Security Practitioner (CASP). So, if you are interested to get this course don't delay to join now. Assessment & Certification To achieve a formal qualification, you are required to book an official exam separately with the relevant awarding bodies. However, you will be able to order a course completion CPD Certificate by paying an additional fee. Hardcopy Certificate by post - £19 Soft copy PDF via email - £10 Requirements Our CompTIA Advanced Security Practitioner (CASP) - Video Training Course is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. The Enterprise Security Architecture The Basics of Enterprise Security FREE 01:00:00 The Enterprise Structure 00:21:00 Enterprise Security Requirements 00:09:00 The Enterprise Security Technology Common Network Security Components and Technologies 00:55:00 Communications and Collaboration Security 00:40:00 Cryptographic Tools and Techniques 00:56:00 Advanced Authentication 00:14:00 Enterprise Resource Technology Enterprise Storage Security Issues 01:18:00 Distributed, Shared, and Virtualized Computing 00:26:00 Cloud Computing and Security 00:10:00 Security Design and Solutions Network Security Design 02:22:00 Conduct a Security Assessment 00:55:00 Host Security 01:19:00 Managing Risk in Projects Create a Risk Management Plan 01:15:00 Identify Risks and Their Causes 00:11:00 Analyze Risks 00:19:00 Develop a Risk Response Plan 00:07:00 Integrating Advanced Authentication and Authorization Techniques Implement Authentication 00:19:00 Implement Advanced 00:07:00 Implementing Cryptographic Techniques Describe Cryptographic Concepts 00:19:00 Choose Cryptographic Techniques 00:31:00 Choose Cryptographic Implementation 00:07:00 Integrating Hosts, Storage, Networks, and Apps in a Secure Enterprise Architecture Implement Security Standards in the Enterprise 00:13:00 Select Technical Deployment Models 00:28:00 The Enterprise Structure 00:21:00 Secure Enterprise Application Integration Enablers 00:21:00 Security Research and Analysis Perform an Industry Trends and Impact Analysis 00:41:00 Perform an Enterprise Security Analysis 00:26:00 Disaster Recovery and Business Continuity BCP Fundamentals 00:21:00 BCP Implementation 00:10:00 DRP Fundamentals 00:18:00 DRP Implementation 00:03:00 Responding to and Recovering from Incidents Design Systems to Facilitate Incident Response 00:14:00 Conduct Incident and Emergency Responses 00:20:00 Legal Issues Computer Crime Laws and Regulations 00:16:00 Computer Crime Incident Response 00:17:00 Judgment and Decision-Making Develop Critical Thinking Skills 00:12:00 Determine the Root of a Problem 00:06:00 Use Judgment to Make Sound Decisions 00:18:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

CompTIA Advanced Security Practitioner (CASP) - Video Training Course
Delivered Online On Demand19 hours 5 minutes
£24

The PM and Enterprise Connection: How Project Managers 'Connect the Dots'

By IIL Europe Ltd

The PM and Enterprise Connection: How Project Managers 'Connect the Dots' Project/program management requires a number of soft- and hard-skills. One of the most critical skills for the PM to bring to an initiative is the ability to connect on multiple fronts. The most successful initiatives are those where the PM is skilled at connecting people, concepts, processes, and practices. Joanna Durand, Managing Director at Citi, Chair of the Citi Program Management Council and head of the Citi Global Program Management Office, will talk about the project and program manager's critical role as a 'connector.' This and other IIL Learning in Minutes presentations qualify for PDUs. Some titles, such as Agile-related topics may qualify for other continuing education credits such as SEUs, or CEUs. Each professional development activity yields one PDU for one hour spent engaged in the activity. Some limitations apply and can be found in the Ways to Earn PDUs section that discusses PDU activities and associated policies. Fractions of PDUs may also be reported. The smallest increment of a PDU that can be reported is 0.25. This means that if you spent 15 minutes participating in a qualifying PDU activity, you may report 0.25 PDU. If you spend 30 minutes in a qualifying PDU activity, you may report 0.50 PDU.

The PM and Enterprise Connection: How Project Managers 'Connect the Dots'
Delivered Online On Demand15 minutes
£10

The PM and Enterprise Connection: How Project Managers 'Connect the Dots'

By IIL Europe Ltd

The PM and Enterprise Connection: How Project Managers 'Connect the Dots' Project/program management requires a number of soft- and hard-skills. One of the most critical skills for the PM to bring to an initiative is the ability to connect on multiple fronts. The most successful initiatives are those where the PM is skilled at connecting people, concepts, processes, and practices. Joanna Durand, Managing Director at Citi, Chair of the Citi Program Management Council and head of the Citi Global Program Management Office, will talk about the project and program manager's critical role as a 'connector.' This and other IIL Learning in Minutes presentations qualify for PDUs. Some titles, such as Agile-related topics may qualify for other continuing education credits such as SEUs, or CEUs. Each professional development activity yields one PDU for one hour spent engaged in the activity. Some limitations apply and can be found in the Ways to Earn PDUs section that discusses PDU activities and associated policies. Fractions of PDUs may also be reported. The smallest increment of a PDU that can be reported is 0.25. This means that if you spent 15 minutes participating in a qualifying PDU activity, you may report 0.25 PDU. If you spend 30 minutes in a qualifying PDU activity, you may report 0.50 PDU.

The PM and Enterprise Connection: How Project Managers 'Connect the Dots'
Delivered Online On Demand30 minutes
£10

CompTIA Advanced Security Practitioner (CASP)

4.8(9)

By Skill Up

CompTIA Advanced Security Practitioner (CASP): Learn cutting-edge security protocols, risk management, and incident response. Elevate your cybersecurity career. Suitable for IT professionals.

CompTIA Advanced Security Practitioner (CASP)
Delivered Online On Demand19 hours 5 minutes
£25