• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1675 Environment courses in Belshill delivered Live Online

55342 Supporting and Troubleshooting Windows 11

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course is Enterprise Desktop Support Technicians (EDSTs). These technicians provide Tier 2 support to users with domain-joined computers running the Windows 11 OS, typically in medium to large enterprise organizations. Overview Important Windows 11 features How these features are used in an Active Directory How to troubleshoot these features This is a 5-day ILT course that is designed to provide you with the knowledge and skills required to support and troubleshoot Windows 11 PCs and devices in an on-premises Windows Server Active Directory domain environment. 1: Introducing Windows 11 Overview of Windows 11 Recommendations for typical troubleshooting procedures Troubleshooting installation and deployment Introduction to management and troubleshooting tools 2: Administering Windows 11 remotely Using Windows Admin Center Using Windows PowerShell Implementing Remote Management 3: Troubleshooting startup and performing system recovery Recovering Windows 11 Configuring the Registry Troubleshooting Windows 11 startup Implementing and troubleshooting BitLocker Troubleshooting OS service Issues 4: Troubleshooting devices and device drivers Overview of hardware troubleshooting Troubleshooting device drivers 5: Configuring and troubleshooting network connectivity Configuring network connectivity Troubleshooting network connectivity Implementing and troubleshooting name resolution Implementing and troubleshooting remote access 6: Troubleshooting Group Policy Overview of Group Policy Resolve GPO application issues on client devices 7: Configuring and Troubleshooting Security Settings Implementing network security Implementing Windows 11 security features Configuring and troubleshooting user accounts 8: Configuring and Troubleshooting User State Implementing and troubleshooting user state Implementing and troubleshooting Folder Redirection 9: Configuring and Troubleshooting Resource Access Configuring and troubleshooting file access. Configuring and troubleshooting shared folders. Implementing and troubleshooting Work Folders. Managing and troubleshooting printers. Recovering files. 10: Troubleshooting apps Troubleshooting desktop apps Troubleshooting app compatibility Managing UWP apps 11: Monitoring and Maintaining Windows 11 Monitoring Windows 11 Optimizing Windows 11 performance Managing Windows 11 updates

55342 Supporting and Troubleshooting Windows 11
Delivered OnlineFlexible Dates
£2,975

Managing Meetings

5.0(3)

By Lapd Solutions Ltd

Managing meetings, Meeting Management, Efficient Meetings, Moccasin Approach, Moccasin Manager,

Managing Meetings
Delivered in Birmingham + 1 more or UK Wide or OnlineFlexible Dates
£1,250 to £1,500

Project Quality Management: Virtual In-House Training

By IIL Europe Ltd

Project Quality Management: Virtual In-House Training In today's environment, quality is the responsibility of everyone. Project success is no longer just the fulfillment of a project on schedule, on budget, and within the scope. Today, projects aren't successful unless the customer's needs are met at the highest level of quality at the lowest cost to the organization. Project Managers must know customer needs, and manage to them throughout the project lifecycle, in order to gain acceptance. Project Quality Management provides an interactive, hands-on environment for participants to practice identification of critical quality requirements (quality planning), fulfillment of those requirements through well-designed processes (Quality Assurance), and statistical awareness of technical specifications of project deliverables (Quality Control). What You Will Learn You'll learn how to: Plan for higher quality project deliverables Measure key performance indicators on projects, processes, and products Turn data into useful project information Take action on analyzed data that will drive down non-value-added costs and drive up customer acceptance and satisfaction Reduce defects and waste in current project management processes Foundation Concepts Quality Defined Customer Focus Financial Focus Quality Management Process Management Cost of Quality Planning for Quality Project Manager Role in Planning Voice of the Customer Quality Management Plan Measurement System Accuracy Data Gathering Data Sampling Manage Quality Process Management Process Mapping Process Analysis Value Stream Mapping Standardization Visual Workplace and 5S Error Proofing (Poka-Yoke) Failure Mode and Effect Analysis Control Quality The Concept of Variation Common Cause Special Cause Standard Business Reports Tracking Key Measurements Control Charts Data Analysis Variation Root Cause Analysis Variance Management Designing for Quality

Project Quality Management: Virtual In-House Training
Delivered OnlineFlexible Dates
£850

Essential Frame Relay

5.0(3)

By Systems & Network Training

Frame Relay training course description A comprehensive look at Frame Relay, particularly with reference to a IP routed environment. Note this course is run as a workshop and therefore the contents are flexible. What will you learn Recognise the issues of using Frame Relay Describe Frame Relay. Configure a Cisco router to use Frame relay. Frame Relay training course details Who will benefit: Anyone working with Frame Relay. Prerequisites: Intro to data communications & networking Duration 1 day Frame Relay training course contents Introduction Packet switched networks, PVCs, SVCs. Topologies, Full mesh, partial mesh, Hub and spoke. Basics DLCI, CIR, LMI, the local loop. Configuring routers for Frame Relay Inverse ARP, static mappings, subinterfaces More Frame Relay Burst rates, FECN, BECN, the DE bit, Traffic shaping. Voice Over Frame Relay

Essential Frame Relay
Delivered in Internationally or OnlineFlexible Dates
£1,397

Microsoft Office 365 Online (with Teams for the Desktop)

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is intended for business users and knowledge workers in a variety of roles and fields who have competence in a desktop-based installation of the Microsoft Office 2010, 2013, or 2016 edition of the Microsoft Office productivity suite, and who are now extending Microsoft Office to a collaborative cloud-based Office 365 environment. Overview In this course, you will build upon your knowledge of the Microsoft Office desktop application suite to work productively in the cloud-based Microsoft Office 365 environment. You will: Sign in, navigate, and identify components of the Office 365 environment. Create, edit, and share documents with team members using the Office Online apps, SharePoint, OneDrive© for Business, and Delve. Collaborate and work with colleagues using the Yammer and Planner apps. Use email and manage contacts with Outlook on the web. Collaborate using Teams. Configure Teams. This course introduces working with shared documents in the familiar Office 365 online apps?Word, PowerPoint©, and Excel©?as an alternative to installing the Microsoft© Office desktop applications. This course also introduces several productivity apps including Yammer?, Planner, and Delve© that can be used in combination by teams for communication and collaboration. Prerequisites Outlook - Part 1 PowerPoint - Part 1 Word 2016 - Part 1 Using Microsoft Windows 10 1 - GETTING STARTED WITH OFFICE 365 Topic A: Sign In to Office 365 Topic B: Navigate the Office 365 Environment 2 - COLLABORATING WITH SHARED FILES Topic A: Work with Shared Documents in SharePoint Topic B: Edit Documents in Office Online Topic C: Collaborate on the SharePoint Site Topic D: Work with OneDrive for Business and Delve 3 - USING PRODUCTIVITY APPS Topic A: Work with Productivity Apps in Combination Topic B: Broadcast Messages with Yammer Topic C: Manage Tasks with the Planner App 4 - USING OUTLOOK ON THE WEB Topic A: Send and Receive Email Topic B: Manage Contacts Topic C: Schedule Appointments Topic D: Personalize Outlook on the Web 5 - COLLABORATING WITH TEAMS Topic A: Overview of Microsoft Teams Topic B: Converse and Share in Teams Topic C: Call and Meet in Teams Topic D: Collaborate with Office 365 Apps and Teams 6 - CONFIGURING TEAMS Topic A: Configure Teams Topic B: Configure Channels Topic C: Configure Tabs

Microsoft Office 365 Online (with Teams for the Desktop)
Delivered OnlineFlexible Dates
£295

4G demystified

5.0(3)

By Systems & Network Training

4G training course description This course is designed to give the delegate an understanding of the technologies used within a 3G UMTS mobile network. During the course we will investigate the UMTS air interface and the use of Wideband-Code Division Multiple Access (WCDMA) to facilitate high speed data access, together with HSPA to offer mobile broadband services. We will describe the use of soft handover rather than hard handover procedures and soft capacity sharing. The course includes a brief exploration of the UMTS protocol stack and the use of PDP Context and QoS support features. What will you learn Explain the 3G UMTS architecture. Describe the role of a Drifting & Serving RNC. Explain the use of ARQ & HARQ for mobile broadband. Describe how IMS integrates into the architecture. Describe the use of Media Gateway Controllers. Identify the temporary identities used within 3G UMTS. 4G training course details Who will benefit: Anyone working within the telecommunications area, especially within the mobile environment. Prerequisites: Mobile communications demystified Telecommunications Introduction Duration 2 days 4G training course contents LTE Introduction The path to LTE, 3GPP. LTE to LTE advanced. LTE Architecture The core, Access, roaming. Protocols: User plane, Control plane. Example information flows. Bearer management. Spectrum allocation. LTE technologies Transmission, reception, OFDMA, multiple antenna, MIMO. LTE Air interface Air interface protocol stack. Channels, Resource Grid, cell acquisition. Up and downlink controls. Layer 2 protocols. Cell acquisition Power on, selecting networks and cells. RRC connection. Attach procedure. Mobility management Roaming, RRC_IDLE, RRC_CONNECTED, cell reselection, handover, interoperation with UMTS and GSM networks. Voice and text IMS, QoS, policy and charging.

4G demystified
Delivered in Internationally or OnlineFlexible Dates
£2,477

Principles of COSHH

5.0(50)

By Pochat Training

QA Level 2 Award In Principles Of COSHH (RQF) Face to Face: Half-day course Virtual Classroom: Spread over 2 sessions of 2½ hr duration COSHH: Control of Substances Hazardous to Health Regulations 2002 Hazardous substances are everywhere, and COSHH assessments have to be undertaken in all businesses Run in an engaging and interactive way - see the video below Course Contents: Legal requirements relating to hazardous substances in the workplace Employer duties Employee duties Consequences of non-compliance Communicating safety information The different forms that hazardous substances can take Effects that may arise after exposure to hazardous substances The different routes that hazardous substances can enter the body How risk assessments reduce accidents and ill health at work The five step process of risk assessment The control hierarchy in relation to the safe use, handling, transporting, storage and disposal of substances hazardous to health Information to refer to when identifying and using hazardous substances Procedures for dealing with an incident involving hazardous substances Benefits of this course: COSHH stands for the 'Control of Substances Hazardous to Health' and falls under the Control of Substances Hazardous to Health Regulations 2002 This half day course is for all those who work, or wish to work, in a workplace that works with hazardous substances, such as in healthcare, in the manufacturing sector, cleaners, transport, utilities and even office environments Hazardous substances are everywhere, and COSHH assessments have to be undertaken in all businesses Candidates will learn about the legal requirements relating to hazardous substances, how risk assessments contribute to the safe use of hazardous substances, as well as the precautions and procedures required to ensure that the risks associated with hazardous substances are properly controlled Accredited, Ofqual regulated qualification: This QA Level 2 Award in Principles of COSHH (RQF) Course is a nationally recognised, Ofqual regulated qualification accredited by Qualsafe Awards.This means that you can be rest assured that your Principles of COSHH Certificate fulfills the legal requirements and is a very good way to make sure you and your employees are trained appropriately.The Ofqual Register number for this course is 603/0775/4

Principles of COSHH
Delivered in Chesterfield or Online + more
£85

Parenting a Child with Complex Needs Workshop

5.0(1)

By Born at the Right Time

2-part workshop for parents hosted by Rachel Wright, Founder of Born at the Right Time and author of 'The Skies I'm Under'.

Parenting a Child with Complex Needs Workshop
Delivered Online + more
FREE to £20

CWDP training course description The CWDP course consists of instructor-led training applicable to the design of wireless LANs using the latest technologies including 802.11n and 802.11ac. The course goes in-depth into the design process and provides attendees with the knowledge needed to plan, deploy and test modern 802.11-based networks. It also prepares students for the CWDP examination. Students who complete the course will acquire the necessary skills for preparing, planning performing and documenting site surveys and wireless LAN design procedures. What will you learn Design enterprise WiFi networks. Select appropriate antennas and Access points. Perform site surveys. Describe the security requirements required for enterprise networks. Test, validate and troubleshoot installations. CWDP training course details Who will benefit: Anyone looking for the skills to analyze, troubleshoot, and optimize any enterprise level Wi-Fi network, no matter which brand of equipment your organization deploys. Anyone looking to become a CWNP. Prerequisites: CWNA Duration 5 days CWDP training course contents WLAN design overview Importance of good design, Impact of bad design, Design process, Design skills, Design toolkit. Requirements analysis Pre-planning, Customer interaction, Requirements gathering, Discovering existing systems, Documenting the environment, Defining constraints, Creating documentation. Designing for clients and applications Client Device types, Application types, Application-specific design, High density design issues. Designing for industry Standard corporate networks, Industry-specific designs, Government, Healthcare, Hospitality, Retail, Public hotspots, Transportation, Mobile offices, Outdoor and mesh, Remote networks and branch offices, Last-miles / ISP and bridging. Vendor selection processes Defining vendor issues, Operational planes, Design models, Understanding architectures. Radio Frequency (RF) planning RF spectrum, RF behaviors, Modulation and coding schemes, RF accessories, Throughput factors. WLAN hardware selection Antennas, 802.11n and antennas, Choosing Aps, Powering Aps. Site surveys Site survey tools, Site survey preparation, Predictive site surveys, Manual site surveys, Site survey principles and processes. Designing for Quality of Service (QoS) QoS overview, QoS application points, Roaming support. Designing for security Bad security, Authentication solutions, Encryption solutions, Security best practices, Intrusion prevention. Installation testing, validation and troubleshooting Network health status, Troubleshooting and validation process, Troubleshooting and validation tools, Common problems. Hands-on lab exercises Hands-on labs depend on the audience and can include use of: Spectrum analyzers, Protocol analyzers, Site Survey software, Diagramming software, Various wireless access points, Various wireless adapters and antennas.

CWDP
Delivered in Internationally or OnlineFlexible Dates
£3,497

Security+

5.0(3)

By Systems & Network Training

Security+ training course description A hands on course aimed at getting delegates successfully through the CompTia Security+ examination. What will you learn Explain general security concepts. Describe the security concepts in communications. Describe how to secure an infrastructure. Recognise the role of cryptography. Describe operational/organisational security. Security+ training course details Who will benefit: Those wishing to pass the Security+ exam. Prerequisites: TCP/IP foundation for engineers Duration 5 days Security+ training course contents General security concepts Non-essential services and protocols. Access control: MAC, DAC, RBAC. Security attacks: DOS, DDOS, back doors, spoofing, man in the middle, replay, hijacking, weak keys, social engineering, mathematical, password guessing, brute force, dictionary, software exploitation. Authentication: Kerberos, CHAP, certificates, usernames/ passwords, tokens, biometrics. Malicious code: Viruses, trojan horses, logic bombs, worms. Auditing, logging, scanning. Communication security Remote access: 802.1x, VPNs, L2TP, PPTP, IPsec, RADIUS, TACACS, SSH. Email: S/MIME, PGP, spam, hoaxes. Internet: SSL, TLS, HTTPS, IM, packet sniffing, privacy, Javascript, ActiveX, buffer overflows, cookies, signed applets, CGI, SMTP relay. LDAP. sftp, anon ftp, file sharing, sniffing, 8.3 names. Wireless: WTLS, 802.11, 802.11x, WEP/WAP. Infrastructure security Firewalls, routers, switches, wireless, modems, RAS, PBX, VPN, IDS, networking monitoring, workstations, servers, mobile devices. Media security: Coax, UTP, STP, fibre. Removable media. Topologies: Security zones, DMZ, Intranet, Extranet, VLANs, NAT, Tunnelling. IDS: Active/ passive, network/host based, honey pots, incident response. Security baselines: Hardening OS/NOS, networks and applications. Cryptography basics Integrity, confidentiality, access control, authentication, non-repudiation. Standards and protocols. Hashing, symmetric, asymmetric. PKI: Certificates, policies, practice statements, revocation, trust models. Key management and certificate lifecycles. Storage: h/w, s/w, private key protection. Escrow, expiration, revocation, suspension, recovery, destruction, key usage. Operational/Organisation security Physical security: Access control, social engineering, environment. Disaster recovery: Backups, secure disaster recovery plans. Business continuity: Utilities, high availability, backups. Security policies: AU, due care, privacy, separation of duties, need to know, password management, SLAs, disposal, destruction, HR policies. Incident response policy. Privilege management: Users, groups, roles, single sign on, centralised/decentralised. Auditing. Forensics: Chain of custody, preserving and collecting evidence. Identifying risks: Assets, risks, threats, vulnerabilities. Role of education/training. Security documentation.

Security+
Delivered in Internationally or OnlineFlexible Dates
£2,797