• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1678 Environment courses in Warlingham delivered Live Online

Managing Safely - IOSH Award (In-House)

By The In House Training Company

This is a very popular, comprehensive, practical and experiential programme, covering: Assessing risks: Defines and demystifies risk and risk assessment. Risk assessments and a simple scoring system are introduced, and participants carry out assessments. Controlling risks: Cutting risks down, concentrating on the best techniques to control key risks and how to choose the right methods. Understanding your responsibilities: The legal framework; health & safety management systems. Identifying hazards: The main issues any organisation has to deal with: entrances and exits, work traffic, fire, chemicals, electricity, physical and verbal abuse, bullying, stress, noise, housekeeping and the working environment, slips, trips and falls, working at height, computers and manual handling. Investigating accidents and incidents: Why accidents should be investigated, why things go wrong and how to carry out an investigation when they do. Measuring performance: How checking performance can help to improve health & safety. How to develop basic performance indicators. Auditing and proactive and reactive measuring. Protecting the environment: Introduction to waste and pollution. How organisations and individual managers can get involved in cutting down their environmental impacts. The programme enables participants to: Assess and control risks and hazards Understand their own responsibilities for safety and health Investigate incidents Measure their own performance Reflect on good practice and plan how to ensure the safety of the staff for whom they are responsible

Managing Safely - IOSH Award (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry

ZL00 IBM zVM and zLinux Bootcamp

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for IT professionals who will be responsible for the support of guests and other virtual machines running in the z/VM environment. It assumes that these persons will have little or no experience in the z/VM environment. Additionally anyone responsible for installing, customizing, and maintaining Linux on System z. Overview Describe the process of running guests under z/VM Define virtual machines to z/VM and reload the directory Customize the CP component of the z/VM system Customize the TCP/IP files on z/VM Apply service to the z/VM system Install SUSE Linux on System z Install additional packages Describe zLinux system management process Describe zLinux backup and recovery procedures Manage and update zLinux network connectivity issues Implement the z/VM Performance Toolkit Prerequisite to z/VM and Linux Connectivity and Management (ZV100) Prerequisite to z/VM RACF and DirMaint Implementation (ZV200) Introduces system programmers to the tasks required to support a z/VM operating system; providing an overview of the processes required to install z/VM & perform the required tailoring steps to support guest operating system virtual machines & CMS users. z/VM and zLinux overview . Installation . Directory . CP system configuration . z/VM networking . VMSES/E . Installing SUSE Linux on System z . Installing additional packages . Network connectivity . System management . Backup and recovery . z/VM Performance Toolkit configuration .

ZL00 IBM zVM and zLinux Bootcamp
Delivered OnlineFlexible Dates
Price on Enquiry

Agile Sprint Planning: In-House Training

By IIL Europe Ltd

Agile Sprint Planning: In-House Training The goal of the course is to provide you and your team with the ability to develop effective and realistic Sprint plans. Without effective Sprint Plans, iterations are set up for failure. But Sprint Planning cannot be improved on its own, in isolation. The Scrum processes are highly intertwined and influence each other. The surrounding artifacts, events, and roles must be examined closely, and enhanced, in order to improve Sprint Planning. This course will remind you of the theory to reinforce the principles, but will concentrate on next-level skills, so that you and the team are able to create realistic and usable Sprint Plans. This course is not introductory. You are already aware of the Scrum framework and have been implementing Scrum on your projects. Now is the time to improve efficiency and effectiveness, to facilitate successful Agile projects. What you will Learn You'll learn how to: Identify and correlate the key symptoms and root causes of ineffective sprint plans Improve key Product Backlog elements Evaluate Agile roles in sprint planning Appraise key product practices Enhance project transparency The Product Backlog User stories Acceptance Criteria Backlog Refinement Supporting Roles Product Owner (the Backlog) Development Team Stakeholders and SMEs Supporting Product Practices Roadmaps and release plans and story maps Definition of Done Technical Debt Transparency Daily Scrums Information radiators Retrospectives Sprint Planning Capacity and Velocity Sprint Planning Meetings The Sprint Backlog Summary What did we learn, and how can we implement this in our work environments?

Agile Sprint Planning: In-House Training
Delivered in London or UK Wide or OnlineFlexible Dates
£1,495

H005G IBM Spectrum Scale Basic Administration for Linux and AIX

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This lecture and exercise-based course is for individuals who want to understand how to install, configure, and manage an IBM Spectrum Scale storage cluster. Overview After completing this course, you should be able to: Summarize the key features of IBM Spectrum Scale Describe IBM ESS and Spectrum Scale RAID Install IBM Spectrum Scale and configure a cluster Manage a cluster Implement information lifecycle management (ILM) Configure IBM Spectrum Scale high availability features Back up critical cluster data This course is intended for IT professionals tasked with administering an IBM Spectrum Scale storage cluster in environments running Linux and AIX nodes. The course includes information on installing, configuring, and monitoring an IBM Spectrum Scale cluster. Many Spectrum Scale features are described in lecture materials and then implemented in lab exercises. These features include: Storage management, high availability options, cluster management, and information lifecycle management (ILM) tools. Note: Although the lab environment is running the Linux operating system, the differences in Spectrum Scale compared with an AIX environment are minor. Therefore, the skills acquired during the course can be applied in both Linux and AIX environments. Welcome and course overview Unit 1 - IBM Spectrum Scale overview Exercise 1 - Cluster node preparation Unit 2 - Installation and cluster configuration Exercise 2 - Installation and cluster configuration Unit 3 - Cluster management Exercise 3 - Cluster management and configuration Unit 4 - Information Lifecycle Management (ILM) Exercise 4 - Storage pools, filesets, and policies Unit 5 - High availability and cluster data backups Exercise 5 - Replication and snapshots Course wrap-up and evaluation

H005G IBM Spectrum Scale Basic Administration for Linux and AIX
Delivered OnlineFlexible Dates
Price on Enquiry

Veeam Availability Suite v11: Configuration and Management (VASv11CM)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is suitable for anyone responsible for configuring, managing or supporting a Veeam Availability Suite v11 environment. Students should be experienced professionals with solid knowledge of servers, storage, networking and virtualization. Overview After completing this course, attendees should be able to: Describe Veeam Availability Suite components usage scenarios and relevance to your environment. Effectively manage data availability in on-site, off-site, cloud and hybrid environments. Ensure both Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs) are met. Configure Veeam Availability Suite to ensure data is protected effectively. Adapt with an organization's evolving technical and business data protection needs. Ensure recovery is possible, effective, efficient, secure and compliant with business requirements. Provide visibility of the business data assets, reports and dashboards to monitor performance and risks. The Veeam© Availability Suite? v11: Configuration and Management training course is a three-day, technical deep dive focused on teaching IT professionals the skills to configure, manage and support a Veeam Availability Suite v11 solution. With extensive hands-on-labs, the class enables administrators and engineers to effectively manage data in an ever-changing technical and business environment, bringing tangible benefit to businesses in the digital world. Introduction Describe RTOs and RPOs, what they mean for your business, how to manage and monitor performance against them The 3-2-1 Rule and its importance in formulating a successful backup strategy Identify key Veeam Availability Suite components and describe their usage scenarios and deployment types Building backup capabilities Backup methods, the appropriate use cases and impact on underlying file systems Create, modify, optimize and delete backup jobs, including Agents and NAS Backup jobs. Explore different tools and methods to maximize environment performance Ensure efficiency by being able to select appropriate transport modes while being aware of the impact of various backup functions on the infrastructure Building replication capabilities Identify and describe the options available for replication and impacts of using them Create and modify replication jobs, outline considerations to ensure success Introduce the new Continuous Data Protection (CDP) policy Secondary backups Simple vs. advanced backup copy jobs, how to create and modify them using best practices to ensure efficient recovery Discuss using tapes for backups Advanced repository capabilities Ensure repository scalability using a capability such as SOBR on-premises and off-site including integration with cloud storage Ensure compatibility with existing deduplication appliances Introduce the new hardened repository Protecting data in the cloud Review how Veeam can protect the data of a cloud native application Review how Veeam Cloud Connect enables you to take advantage of cloud services built on Veeam Review how Veeam can be used to protect your Office 365 data Restoring from backup Ensure you have the confidence to use the correct restore tool at the right time for restoring VMs, bare metal and individual content such as files and folders Utilize Secure Restore to prevent the restoration of malware Describe how to use Staged Restore to comply with things like General Data Protection Regulation (GDPR) before releasing restores to production Identify, describe and utilize the different explores and instant recovery tools and features Recovery from replica Identify and describe in detail, failover features and the appropriate usage Develop, prepare and test failover plans to ensure recovery Disaster recovery from replica to meet a variety of real-world recovery needs Testing backup and replication Testing backups and replicas to ensure you can recover, what you need, when you need to Configure and setup virtual sandbox environments based on backup, replicas and storage snapshots Veeam Backup Enterprise Manager and Veeam ONE Introduce the concept of monitoring your virtual, physical and cloud environments with Veeam Backup Enterprise Manager and Veeam ONE? Configuration backup Locate, migrate or restore backup configuration Additional course details: Nexus Humans Veeam Availability Suite v11: Configuration and Management (VASv11CM) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Veeam Availability Suite v11: Configuration and Management (VASv11CM) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Veeam Availability Suite v11: Configuration and Management (VASv11CM)
Delivered OnlineFlexible Dates
Price on Enquiry

VASCM-11 Veeam Availability Suite v11: Configuration and Management

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is suitable for anyone responsible for configuring, managing or supporting a Veeam Availability Suite v11 environment. Overview After completing this course, attendees should be able to: Describe Veeam Availability Suite components usage scenarios and relevance to your environment. Effectively manage data availability in on-site, off-site, cloud and hybrid environments. Ensure both Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs) are met. Configure Veeam Availability Suite to ensure data is protected effectively. Adapt with an organization's evolving technical and business data protection needs. Ensure recovery is possible, effective, efficient, secure and compliant with business requirements. Provide visibility of the business data assets, reports and dashboards to monitor performance and risks The Veeam© Availability Suite? v11: Configuration and Management training course is a three-day, technical deep dive focused on teaching IT professionals the skills to configure, manage and support a Veeam Availability Suite v11 solution. With extensive hands-on-labs, the class enables administrators and engineers to effectively manage data in an ever-changing technical and business environment, bringing tangible benefit to businesses in the digital world. This course is based on Veeam Availability Suite v11. Introduction Describe RTOs and RPOs, what they mean for your business, how to manage and monitor performance against them The 3-2-1 Rule and its importance in formulating a successful backup strategy Identify key Veeam Availability Suite components and describe their usage scenarios and deployment types Building backup capabilities Backup methods, the appropriate use cases and impact on underlying file systems Create, modify, optimize and delete backup jobs, including Agents and NAS Backup jobs. Explore different tools and methods to maximize environment performance Ensure efficiency by being able to select appropriate transport modes while being aware of the impact of various backup functions on the infrastructure Building replication capabilities Identify and describe the options available for replication and impacts of using them Create and modify replication jobs, outline considerations to ensure success Introduce the new Continuous Data Protection (CDP) policy Secondary backups Simple vs. advanced backup copy jobs, how to create and modify them using best practices to ensure efficient recovery Discuss using tapes for backups Advanced repository capabilities Ensure repository scalability using a capability such as SOBR on-premises and off-site including integration with cloud storage Ensure compatibility with existing deduplication appliances Introduce the new hardened repository Protecting data in the cloud Review how Veeam can protect the data of a cloud native application Review how Veeam Cloud Connect enables you to take advantage of cloud services built on Veeam Review how Veeam can be used to protect your Office 365 data Restoring from backup Ensure you have the confidence to use the correct restore tool at the right time for restoring VMs, bare metal and individual content such as files and folders Utilize Secure Restore to prevent the restoration of malware Describe how to use Staged Restore to comply with things like General Data Protection Regulation (GDPR) before releasing restores to production Identify, describe and utilize the different explores and instant recovery tools and features Recovery from replica Identify and describe in detail, failover features and the appropriate usage Develop, prepare and test failover plans to ensure recovery Disaster recovery from replica to meet a variety of real-world recovery needs Testing backup and replication Testing backups and replicas to ensure you can recover, what you need, when you need to Configure and setup virtual sandbox environments based on backup, replicas and storage snapshots Veeam Backup Enterprise Manager and Veeam ONE Introduce the concept of monitoring your virtual, physical and cloud environments with Veeam Backup Enterprise Manager and Veeam ONE Configuration backup Locate, migrate or restore backup configuration Additional course details: Nexus Humans VASCM-11 Veeam Availability Suite v11: Configuration and Management training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VASCM-11 Veeam Availability Suite v11: Configuration and Management course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VASCM-11 Veeam Availability Suite v11: Configuration and Management
Delivered OnlineFlexible Dates
Price on Enquiry

CV852 IBM DB2 11 for zOS System Administration

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This is an intermediate course for system administrators, database administrators, and other technical individuals, who manage and implement DB2 10 for z/OS. Administrators of DB2 11 for z/OS can acquire a view of the architecture and fundamental processes required to manage a DB2 11 for z/OS subsystem. Course Outline Start and stop the DB2 subsystem Explain the allocation CLIST used at logon for DB2 data sets Use Set SYSPARM command Locate the Command recognition character for the DB2 subsystem Query the system log to gain knowledge about the IPL process and information in the system log when DB2 is initialized or stopped Explore DB2 Address Spaces information Select the DB2 functions that best satisfy your site requirements Explain the use of RACF for DB2 connection security Explain the use of Roles and Trusted Context Implement security procedures for a DB2 environment Describe the components and address space structure of a DB2 subsystem Explain DB2 Program Flow for all environments Invoke and use DB2 TSO Facilities Use the DB2 Catalog to monitor authorizations Increase the size of the Active Log data sets Explain DB2 Logging Use SET LOG SUSPEND and SET LOG RESUME Use DSNJU004 to Print Log Map Interpret the output of the Print Log Map Utility DSNJU004 Use DSNJU003 to rename DB2 data sets Plan for recovery of a BSDS failure Monitor and control DB2 Explain transaction flow in IMS and CICS Describe the CICS and DB2 environment Make use and implement the extended 10-byte RBA and LRSN

CV852 IBM DB2 11 for zOS System Administration
Delivered OnlineFlexible Dates
Price on Enquiry

Scrum Master Certification with Integrated AI Concepts

By Front Porch Agility

This comprehensive course covers all Scrum principles and frameworks necessary to help participants understand how to guide a team and manage projects in a fast-paced agile environment. The course is meant for professionals who want to attain the certification of Scrum Master with deep insight into how AI can be utilized in increasing the effectiveness of agile practices. In addition to mastery of the core Scrum methodology, participants will be taken through state-of-the-art advancements in AI and machine learning in order to understand how these technologies can automate routine tasks, enhance decision-making, and continuous improvement. Real-world case studies and hands-on exercises will illustrate how to practically apply AI within Scrum to realize high efficiency and innovation for teams. Whether for enhancing one's career as a Scrum Master or the integration of AI into Agile practices, this course provides that ideal combination of conceptual theory and practical skills, assuring success in today's technology-driven world. Key Highlights: Certified Scrum Master training with AI applications Case studies in the real world about integrating AI in Scrum Hands-on projects to implement AI-driven tools and methodologies Workflow optimization techniques that ensure better collaboration of agile teams, with speeding up project delivery by the power of AI. Ideal for Scrum Masters, Agile Coaches, Product Owners, and tech pros looking to stay ahead.

Scrum Master Certification with Integrated AI Concepts
Delivered OnlineFlexible Dates
£114.50

CCES Check Point Certified Endpoint Specialist

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course is recommended for technical professionals who need to deploy and manage Endpoint Security within their security environment. Overview Explain how Endpoint Security works to enforce corporate security compliance for end users and their devices. Become familiar with the Check Point Endpoint Security Solution architecture and how it integrates with Check Point Network Security Management. Identify and describe key elements of the SmartEndpoint Management console. Discuss Endpoint Security Software Blade options and how they are managed from the SmartEndpoint Management console. Explain how to create and assign security policies for Endpoint clients using Endpoint Security. Understand deployment methods and server considerations for Endpoint Security Management installation. Identify the different ways to install and configure Endpoint clients. Recognize how to configure VPN connectivity to allow clients connecting outside of the network perimeter to securely access corporate resources. Understand how Endpoint Security authenticates and verifies clients connecting to the Endpoint Security Management Server. Describe additional server configurations that are available to help manage Endpoint clients. Recognize the different types of data security protections available to deploy on end user machines. Describe how Full Disk Encryption technology protects and recovers data accessed and stored on Endpoint computers. Understand how to secure removable media devices. Become familiar with the Remote Help tool and how it supports clients experiencing FDE and Media Encryption issues. Recognize the types of threats that target Endpoint computers. Describe Check Point SandBlast Agent and how to deploy it in the Endpoint Security environment. Explain how SandBlast Agent technology prevents malware from infiltrating Endpoint machines and corporate resources. Identify SmartEndpoint reporting tools used to monitor and respond quickly to security events. Understand how to troubleshoot and debug issues. The goal of this course is to provide a comprehensive understanding of Check Point Endpoint Security and how to deploy it within the corporate network environment. Course Topics Introduction to Endpoint Security Endpoint Security Management Deploying Endpoint Security Additional Endpoint Server Configurations Data Security Protection Advanced Threat Prevention Reporting and Troubleshooting LAB EXERCISES Installing the Endpoint Security Management Solution Deploying Endpoint Client Packages Deploying Endpoint Policy Servers Configuring High Availability for Endpoint Security Modifying Client Installations Working with Deployment Rules Working with SandBlast Agent Additional course details: Nexus Humans CCES Check Point Certified Endpoint Specialist training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CCES Check Point Certified Endpoint Specialist course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CCES Check Point Certified Endpoint Specialist
Delivered OnlineFlexible Dates
Price on Enquiry

Leadership in operations management (In-House)

By The In House Training Company

This programme provides an intensive, two-day overview of the key elements of operations management, including an array of practical tips and tools to help managers be more proactive and effective in the operations management environment - whether that's in an industrial manufacturing context or in operational leadership in the service sectors. At the end of the programme, participants will: Understand the 6Cs approach to operations management Be able to apply a range of practical tools and techniques to improve their personal effectiveness towards being a more effective operations manager Be able to prepare an action plan for the critical first (or next) 100 days in their operational leadership role 1 Introduction What is Operations Management and where does it fit in? What makes a successful Operations Manager? Introducing the 6Cs of Operations Management 2 Context Link to business strategy Making a year plan Performance measurement 3 Controls Governance Reputational controls Costs and budgets Quality Operational 4 Customers Internal External Stakeholder management 5 Communication Planning Meetings Reporting Emails Notices Networking Walking the talk 6 Care People Safety, Health, Environment & Security Assets 7 Continuous improvement Process Product Proactivity Link to KPIs and Year Plan 8 Putting it all together Action planning for the first (or next) 100 days Conclusions

Leadership in operations management (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry