• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1672 Environment courses delivered Live Online

VMware Telco Cloud Platform: Install, Configure, Manage [V2.0]

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Telco cloud system administrators and telco network operations engineers Professionals who work with telco or enterprise and datacenter networks Designers and operations engineers who manage telco workloads Overview By the end of the course, you should be able to meet the following objectives: List VMware Telco Cloud Platform layered architecture and deployment procedures Describe the VMware Telco Cloud Platform virtual infrastructure requirements List the use cases of VMware vSphere and VMware vCenter Server Describe the VMware Telco Cloud Platform networking and storage requirements Describe the architecture of VMware Tanzu™ Standard for Telco Configure management and workload clusters for containers as a service functionality Instantiate network services and network functions Enumerate troubleshooting concepts and Day 2 operations for VMware Telco Cloud Platform This three-day, hands-on training course provides you with the advanced knowledge, skills, and tools to achieve competency in operating and troubleshooting the VMware Telco Cloud Platform? environment. In this course, you are introduced to the VMware Telco Cloud Platform infrastructure, deployment options, and procedures. You also deploy Kubernetes clusters and understand the detailed configuration settings of management and workload clusters. You onboard and instantiate network functions and network services using hands-on lab exercises.In addition, you are presented with various types of technical problems in VMware Telco Cloud Platform, which you will identify, analyze, and solve through a systematic troubleshooting process. his three-day, hands-on training course provides you with the advanced knowledge, skills, and tools to achieve competency in operating and troubleshooting the VMware Telco Cloud Platform™ environment. In this course, you are introduced to the VMware Telco Cloud Platform infrastructure, deployment options, and procedures. You also deploy Kubernetes clusters and understand the detailed configuration settings of management and workload clusters. You onboard and instantiate network functions and network services using hands-on lab exercises. In addition, you are presented with various types of technical problems in VMware Telco Cloud Platform, which you will identify, analyze, and solve through a systematic troubleshooting process.

VMware Telco Cloud Platform: Install, Configure, Manage [V2.0]
Delivered OnlineFlexible Dates
Price on Enquiry

Essential DHCP for engineers

5.0(3)

By Systems & Network Training

Essential DHCP training course description Almost all businesses use DHCP. This course builds on delegates existing IP knowledge and focuses on IP Address management using DHCP. Also covered is the role of DHCP in plug and play environments. What will you learn Explain how DHCP works. Configure DHCP servers. Troubleshoot DHCP. Essential DHCP training course details Who will benefit: Anyone working with TCP/IP. Prerequisites: TCP/IP Foundation for engineers Duration 1 day Essential DHCP training course contents Introduction What is DHCP?, IP configuration: Address, mask, default gateway, DNS. History of DHCP: RARP, BOOTP. Hands on Client configuration, releasing and renewing. DHCP servers Installation. Base configuration: Scope. Lease period. DHCP options. Hands on Server setup, Impact of lease times. Server monitoring. How DHCP works Client states. Obtaining, renewing leases. DHCP messages: DISCOVER, OFFER, REQUEST, NAK, ACK, DECLINE, RELEASE, INFORM. Hands on Troubleshooting DHCP using Wireshark. DHCP architecture DHCP relay agents. Server platforms, resilience, DHCP fail over, split scopes. Dynamic DNS and DHCP. Hands on DDNS, routers, Troubleshooting.

Essential DHCP for engineers
Delivered in Internationally or OnlineFlexible Dates
£967

Process Mapping and Standard Operating Procedure (SOP) Writing

By Research Quality Association

Course Information This course aims to empower you with the expertise to proficiently navigate process mapping and master the art of crafting Standard Operating Procedures (SOPs) within regulated environments. Whether you're engaged in activities that demand process improvement, continual enhancement, or SOP creation, this course offers invaluable insights tailored to your needs. It caters to individuals tasked with managing, documenting, and implementing processes and SOPs, irrespective of prior experience or skills. Our curriculum does not focus on specific software or approaches, focusing instead on fundamental principles and adaptable concepts applicable across diverse organisational landscapes. Benefits include: Hands-on experience in mapping processes An understanding of how process maps can be used to define, communicate and continually improve complex processes An understanding of best practice for SOPs using of process maps/process flow diagrams and process mind maps to complement text An insight into the preparation of concise and user friendly SOPs. This course is structured to encourage delegates to:  Discuss and develop ideas Develop a practical approach for creating process maps and writing SOPs Understand how to use process maps in SOPs effectively Discuss how process mapping for preparing SOPs can be applied to process improvement for SOPs. Is this course for you? The course is designed for all those with responsibility for managing, documenting and implementing processes and SOPs. It assumes no prior experience or skills. The course does not recommend any specific software or approach, but explores the principles and ideas that can be applied in any organisation. What will you learn? Hands-on experience in mapping processes An understanding of how process maps can be used to define, communicate and continually improve complex processes An understanding of best practice for SOPs using of process maps/process flow diagrams and process mind maps to complement text An insight into the preparation of concise and user friendly SOPs. By the end of the course you will be able to: Create process maps and write clearer more concise SOPs Understand how to use process maps in SOPs effectively Understand how process mapping can be applied to process improvement and better SOPs. Tutors Tutors will be comprised of (click the photos for biographies): Laura Brown Director, Laura Brown Training and Development David Butler VP of Quality, Resolian Programme Please note timings may be subject to alteration. Day 1 09:00 Welcome, Introductions and Course Objectives Why Companies manage by process. 10:00 Exercise 1 - First Steps Mechanisms for process mapping, levels at which it can be applied, and the roles and responsibilities of process owners. 10:30 Exercise 1 - Feedback 10:45 Break 11:00 Mapping Processes The stages involved in mapping processes including how to construct a SIPOC chart. 11:45 Exercise 2 - Mapping A Process A first opportunity to practice your new process mapping skills. 12:30 Exercise 2 - Feedback 13:00 Lunch 14:00 Exercise 3 - Discussion of Options for Format, Structure and Layout What Makes A Good SOP? Discussion of options for format, structure, level of detail of SOPs and the use of process maps for SOP writing. A case study example of a good SOP which uses a flow chart/process map. 14:45 Exercise 3 - Feedback 15:00 Break 15:15 A Case Study example of a good SOP that uses a flow chart / process map 15:30 Exercise 4 Discussion of the content of an SOP using a Process Map 15:35 Exercise 4 - Feedback 15:45 Key Writing Considerations 16:15 Exercise 5 16:45 Exercise 5 - Feedback 17:00 Close of Day Day 2 09:00 Review of Day 1 09:15 Using Metrics Selecting and using metrics to monitor and improve processes. 10:00 Exercise 6 - Practice in Process Mapping Creating Process Maps from multi-source information. 11:00 Break 11:15 Exercise 6 - Feedback 11:45 Common Pitfalls Common problems and tips for good Process Mapping. 12:15 Demonstration of Process Mapping on a PC 12:45 Lunch 13:30 Exercise 7 - Mind Mapping 14:30 Exercise 7 - Feedback 15:00 Break 15:15 Exercise 8 - Using Process Maps to Write an SOP Applying your process mapping skills as part of writing an SOP 15:30 Exercise 8 - Feedback 15:45 Course Review and Follow-up 16:00 Close of Course Extra Information Face-to-face course Course Material Course material will be available in PDF format for delegates attending this course. The advantages of this include: Ability for delegates to keep material on a mobile device Ability to review material at any time pre and post course Environmental benefits – less paper being used per course. The material will be emailed in advance of the course and RQA will not be providing any printed copies of the course notes during the training itself. Delegates wishing to have a hard copy of the notes should print these in advance to bring with them. Alternatively delegates are welcome to bring along their own portable devices to view the material during the training sessions. Remote course Course Material This course will be run completely online. You will receive an email with a link to our online system, which will house your licensed course materials and access to the remote event. Please note this course will run in UK timezone. The advantages of this include: Ability for delegates to keep material on a mobile device Ability to review material at any time pre and post course Environmental benefits – less paper being used per course Access to an online course group to enhance networking. You will need a stable internet connection, a microphone and a webcam. Development Level Learn

Process Mapping and Standard Operating Procedure (SOP) Writing
Delivered in person or OnlineFlexible Dates
£858 to £1,112

Personal Productivity

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for In this course, students will learn how to establish routines, set goals, create an efficient environment, and use time-honored planning and organizational tools to use their time more effectively. Overview Upon successful completion of this course, students will take ownership of their time management in order to achieve their goals and lead a more productive life. In this course, students will learn how to establish routines, set goals, create an efficient environment, and use time-honored planning and organizational tools to use their time more effectively. Getting Started Icebreaker Housekeeping Items The Parking Lot Workshop Objectives Setting SMART Goals The Three P's The SMART Way Prioritizing Your Goals Evaluating and Adapting The Power of Routines What is a Routine? Personal Routines Professional Routines Six Easy Ways to Simplify Your Life Scheduling Yourself The Simple Secret of Successful Time Management Developing a Tracking System Scheduling Appointments Scheduling Tasks Keeping Yourself on Top of Tasks The One-Minute Rule The Five-Minute Rule What To Do When You Feel Like You're Sinking Tackling New Tasks and Projects Why We Procrastinate Nine Ways to Overcome Procrastination Eat That Frog! Using Project Management Techniques The Triple Constraint Creating the Schedule Using a RACI Chart Creating a Workspace Setting Up the Physical Layout Ergonomics 101 Using Your Computer Efficiently Organizing Files and Folders Organizing Paper Files Organizing Electronic Files Scheduling Archive and Clean-Up Managing E-Mail Using E-mail Time Wisely Taking Action! Making the Most of Your E-mail Program Taking Time Back from Handheld Devices Tackling Procrastination Why We Procrastinate Nine Ways to Overcome Procrastination Eat That Frog Wrapping Up Words from the Wise Review of Parking Lot Lessons Learned Completion of Action Plans and Evaluations

Personal Productivity
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Implementing an Integrated Threat Defense Solution (SECUR201) v1.2

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course is designed for technical professionals who need to know how to deploy a Cisco Integrated Threat Defense solution in their network environment. Cisco integrators and partners Systems and network engineers Technical architects Technical support personnel Overview After taking this course, you should be able to: Understand the network security landscape and the Cisco Integrated Threat Defense (ITD) solutions Describe the key components of the ITD solution and their use in the network Configure the Cisco Identity Services Engine (ISE) for a baseline of operation in the ITD solution Configure the integration between the Cisco Stealthwatch and Cisco ISE platforms Configure the integration between the Cisco Firepower and ISE platforms Configure the integration between Cisco Firepower and Cisco Advanced Malware Protection (AMP) for Endpoints The Implementing an Integrated Threat Defense Solution (SECUR201) v1.2 course provides an analysis of the cybersecurity landscape with an emphasis on the importance of an integrated threat defense architecture. Through a combination of lessons and hands-on practice, you will learn to deploy and integrate Cisco©?s Integrated Threat Defense solutions which include: Cisco Identity Services Engine (ISE), Cisco Stealthwatch, Cisco Firepower NGFW, and Cisco AMP for Endpoints. This course provides you with the knowledge and skills to implement and integrate solution components with existing network services, integrate solution components with the pxGrid (Platform Exchange Grid) framework, integrate network and endpoint-based malware protection, and observation of security dataflow after the introduction of malware. Course Outline Integrated Threat Defense Introduction ITD Products Identity Services Engine Setup Integration of Stealthwatch with Identity Services Engine Integration of Firepower with Identity Services Engine Integration of Firepower with AMP for Endpoints Lab outline Connecting to the Lab Environment Integrating ISE and Active Directory Integrating ISE and Cisco Adaptive Security Appliance (ASA) Configuring pxGrid and Client Certificates Integrating Stealthwatch with Identity Services Engine Integrating Network Visibility Module (NVM) with AnyConnect Integrating Firepower with Identity Services Engine Integrating AMP for Endpoints with Firepower

Cisco Implementing an Integrated Threat Defense Solution (SECUR201) v1.2
Delivered OnlineFlexible Dates
Price on Enquiry

Business Process Modeling: Virtual In-House Training

By IIL Europe Ltd

Business Process Modeling: Virtual In-House Training This course is part of IIL's Business Analysis Certificate Program (BACP), a program designed to help prepare individuals pass the IIBA® Certification exam to become a Certified Business Analysis Professional (CBAP®). Learn more at www.iil.com/bacp A process model is a description of a process in terms of its steps or actions, the data flowing between them and participants in the process, machines, systems, and organizations involved. Modeling is a critical business analysis skill. It applies graphical and text communication techniques to describe the actions, objects, and relationships acted upon in the process and the steps that act upon them. This course teaches the technique of process modeling and ties together the core methods of process, behavior, and data modeling to enable business analysts to fully describe business processes in levels of detail from multiple perspectives. What you will Learn Upon completion, participants will be able to: Identify business processes and their components Work with UML diagrams Use process modeling in business diagramming Diagram and model business processes Foundation Concepts The role of the business analyst The IIBA® BABOK® Knowledge Areas Business Process Modeling (BPM) and the business analyst A practical approach to business process modeling The Context for Modeling Business Processes Overview of context for business process modeling Analyzing stakeholder information Modeling best practices Critical inputs for BPM: Business Rules Critical inputs for BPM: Context Diagrams Data Models Overview of data modeling Entity relationship diagrams Object-oriented approach Class diagrams Other data models Process Models - Part I (Non-UML) Overview of process modeling Data flow diagrams Workflow diagrams Flowcharts Process Models - Part II (UML) Overview of UML Process Models UML Activity Diagrams UML Sequence Diagrams Usage Models - Part I (Non-UML) Overview of usage modeling Prototyping options Static prototyping and storyboards Dynamic prototyping User Interface Design and user stories Usage Models - Part II (UML Use Cases) Overview of Use Cases Use Case diagrams Use Case descriptions Use Cases and the product life cycle Integrating the Models Overview of integrating the models General analysis best practices Specific analysis techniques summary Best practices for transition to design Summary and Next Steps What did we learn and how can we implement this in our work environments?

Business Process Modeling: Virtual In-House Training
Delivered OnlineFlexible Dates
£1,250

Program Management Skills: Virtual In-House Training

By IIL Europe Ltd

Program Management Skills: Virtual In-House Training Program managers coordinate and give oversight to the efforts of marketing groups, project teams, product delivery, maintenance and support, operations and staff from various functional groups, including suppliers, business partners, and other external bodies. The goal is to ensure that proposed business transformation, through the delivery of complex products and processes, is implemented to realize the organization's strategic benefits and objectives, for which the program was selected. The goals of this course are twofold: To provide participants with key program management principles and techniques, recognized as best practices, to enable more effective program management; and to leverage core elements of the program management life cycle, processes, tools and techniques, to enable program management effectiveness. The participant will learn and apply the principles of program management through discussions, activities, and case study exercises. What You Will Learn At the end of this workshop, you will be able to: Maximize the transformational impact of a program according to the business needs Explain management principles and techniques and apply them within a program context Implement program governance and organization that will produce expected benefits Plan for and manage benefit realization, risks, issues, and quality Manage component projects' interdependencies that are linked to both program and strategic objectives Engage program stakeholders effectively. Improve communication and action planning effectiveness for programs in organizations Getting Started Introductions Course structure Course goals and objectives Foundation Concepts Fundamental definitions and concepts Program challenges and benefits Program best practices and success criterion Stakeholder management Governance: program management office and program boards Standard for Program Management overview Vision, Leadership, and the Business Case What is vision, why, and how? Leadership vs. Management Program business case Program Organization and Governance Program organization Program governance Program board roles and responsibilities Benefits Management Benefits explored Benefits management Benefits realization Program Management Planning Program management plan Program blueprint and roadmap Program component dossier Program tranches Program estimating Program scheduling Program Monitoring and Controlling Program Control - An Overview Program Monitoring and Controlling Monitoring and Controlling Transition Program Risk and Issue Management Risk and issue management overview Program risk management Program issue management Program Quality Management Program quality management overview Program quality management principles Program Stakeholder Management Stakeholder engagement overview Stakeholder engagement planning EI, trust, communication and stakeholder engagement Program Closure and Benefits Sustainment Program closure overview Closing the program Program benefits sustainment Summary What did we learn, and how can we implement this in our work environments?

Program Management Skills: Virtual In-House Training
Delivered OnlineFlexible Dates
£1,250

Symantec Endpoint Protection 14.X - Configure And Protect

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is for Network, IT security, and systems administration professionals in a Security Operations position who are tasked with configuring optimum security settings for endpoints protected by Symantec Endpoint Protection 14. Overview At the completion of the course, you will be able to: Protect against Network Attacks and Enforcing Corporate Policies using the Firewall Policy. Blocking Threats with Intrusion Prevention. Introducing File-Based Threats. Preventing Attacks with SEP. Layered Security. Securing Windows Clients. Secure Mac Clients. Secure Linux Clients. Controlling Application and File Access. Restricting Device Access for Windows and Mac Clients. Hardening Clients with System Lockdown. Customizing Policies based on Location. Managing Security Exceptions. This course is designed for the network, IT security, and systems administration professionals in a Security Operations position who are tasked with configuring optimum security settings for endpoints protected by Symantec Endpoint Protection 14. Introduction Course environment Lab environment Introducing Network Threats Describing how Symantec Endpoint Protection protects each layer of the network stack Discovering the tools and methods used by attackers Describing the stages of an attack Protecting against Network Attacks and Enforcing Corporate Policies using the Firewall Policy Preventing network attacks Examining Firewall Policy elements Evaluating built-in rules Creating custom firewall rules Enforcing corporate security policy with firewall rules Blocking network attacks using protection and stealth settings Configuring advanced firewall feature Blocking Threats with Intrusion Prevention Introducing Intrusion Prevention technologies Configuring the Intrusion Prevention policy Managing custom signatures Monitoring Intrusion Prevention events Introducing File-Based Threats Describing threat types Discovering how attackers disguise their malicious applications Describing threat vectors Describing Advanced Persistent Threats and a typical attack scenario Following security best practices to reduce risks Preventing Attacks with SEP Layered Security Virus and Spyware protection needs and solutions Describing how Symantec Endpoint Protection protects each layer of the network stack Examining file reputation scoring Describing how SEP protects against zero-day threats and threats downloaded through files and email Describing how endpoints are protected with the Intelligent Threat Cloud Service Describing how the emulator executes a file in a sandbox and the machine learning engine?s role and function Securing Windows Clients Platform and Virus and Spyware Protection policy overview Tailoring scans to meet an environment?s needs Ensuring real-time protection for clients Detecting and remediating risks in downloaded files Identifying zero-day and unknown threats Preventing email from downloading malware Configuring advanced options Monitoring virus and spyware activity Securing Mac Clients Touring the SEP for Mac client Securing Mac clients Monitoring Mac clients Securing Linux Clients Navigating the Linux client Tailoring Virus and Spyware settings for Linux clients Monitoring Linux clients Providing Granular Control with Host Integrity Ensuring client compliance with Host Integrity Configuring Host Integrity Troubleshooting Host Integrity Monitoring Host Integrity Controlling Application and File Access Describing Application Control and concepts Creating application rulesets to restrict how applications run Monitoring Application Control events Restricting Device Access for Windows and Mac Clients Describing Device Control features and concepts for Windows and Mac clients Enforcing access to hardware using Device Control Discovering hardware access policy violations with reports, logs, and notifications Hardening Clients with System Lockdown What is System Lockdown? Determining to use System Lockdown in Whitelist or Blacklist mode Creating whitelists for blacklists Protecting clients by testing and Implementing System Lockdown Customizing Policies based on Location Creating locations to ensure the appropriate level of security when logging on remotely Determining the criteria and order of assessment before assigning policies Assigning policies to locations Monitoring locations on the SEPM and SEP client Managing Security Exceptions Creating file and folder exceptions for different scan types Describing the automatic exclusion created during installation Managing Windows and Mac exclusions Monitoring security exceptions

Symantec Endpoint Protection 14.X - Configure And Protect
Delivered OnlineFlexible Dates
Price on Enquiry

Train the trainer (In-House)

By The In House Training Company

At some point in your life you will have attended a training course or workshop, but what happens when you are asked to deliver one? Some people relish the opportunity while others are challenged by it. Whatever you feel about training others, it is a skill that is admired and can be studied and learned. With the trainer you will be learning the techniques, skills and understanding you need and you will have the chance to deliver a short training session to others, receive feedback and having the confidence to deliver it for real in your job. The training will comprise one day followed by a half day when all those able to attend will deliver and have feedback on a 20 minute training activity. To be able to create and maintain an environment conducive to learning and engagement To understand basic learning theory and practice and the difference between training, facilitating and learning To understand how adults learn and how to apply it as a trainer To be able to plan and deliver a training activity using the appropriate set of skills and behaviours To be able to review and evaluate learning and identify how outcomes are met To manage the learning process and the participant engagement in the training environment To be able to present effectively and appropriately to a variety of audiences To deliver and receive feedback on a short delivered training activity with peers To review and evaluate learning and have an action plan to take back and put into practice DAY ONE (full-day) 1 Welcome, housekeeping, how the day will be run Introductions (and making the most of them) Warm up - breaking the ice followed by review and feedback Creating an environment conducive to learning and engagement; managing expectations well as a trainer Group task with feedback and review in plenary 2 What is training and how do adults learn? Trainer input: David Kolb's Learning Cycle Group tasks 3 How to plan a session and what to include - trainer input Starting at the end and working backwards Linking outcomes to purposeful activities Practice task and planning time for day two using a template 4 The skills and behaviours of a brilliant trainer Modelling skills and behaviours Creative task and discussion 5 Mini reviewing task De-brief - using reviewing in training 6 How to manage the process Trainer input followed by practice Paying conscious attention to language (verbal and non verbal), feelings and responses in the room and managing yourself as a trainer 7 The trainer's toolkit #1 Key tools, materials and templates Choosing different tools and approaches with different audiences Know your audience 8 The trainer's toolkit #2 Key tools, materials and templates continued Addressing trainer good practice 9 Review, evaluation and action planning activities Why and what should we be evaluating and why it's important Action planning task Group review task DAY TWO (half-day) The day will comprise a series of 30 minute timed sessions where each delegate will present and deliver a training activity with the group. The training activity will be prepared and planned in advance and will take 20 minutes (+ or - 2 minutes) to deliver in real time. This will be followed by review and feedback from the trainer and peers to complete the total of 30 minutes as a time slot. Reiteration of the task and discussion can take place with the trainer if needed, and there is time included in Day One to support the training planning.

Train the trainer (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry

Pure Healing

By Selena joy lovett

https://www.patreon.com/moonhealinganddivination/membership

Pure Healing
Delivered OnlineFlexible Dates
£54