• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

7965 Insights courses in Glasgow delivered Online

Property Development, Property Law & Estate Agent (QLS)

By Imperial Academy

3 QLS Endorsed Diploma | QLS Hard Copy Certificate Included | 10 CPD Courses | Lifetime Access | 24/7 Tutor Support

Property Development, Property Law & Estate Agent (QLS)
Delivered Online On Demand
£399

Performance Management Course

3.5(2)

By Elearncollege

Description Performance Management Diploma Performance Management is an essential skill for professionals in today's fast-paced, competitive world. The Performance Management Diploma is a comprehensive online course that provides a thorough understanding of the techniques and tools needed to effectively manage, evaluate, and improve employee performance. The course begins with an introduction to Performance Management, detailing its significance in the modern workplace. As participants progress through the course, they will learn about the importance of Performance Management and how it plays a pivotal role in achieving organizational goals. This diploma offers practical insights into setting realistic and measurable performance objectives, a crucial step in the performance management process. The Performance Management Diploma covers a wide range of performance evaluation methods, including both traditional and contemporary techniques. This allows participants to understand and assess the strengths and weaknesses of different methods, empowering them to select the most suitable approach for their organization. Furthermore, participants will gain valuable insights into the art of providing constructive feedback and coaching to employees, a vital skill for any manager or supervisor. They will also learn how to develop effective performance improvement plans, tailored to the needs of individual employees, helping them to achieve their full potential. Performance Metrics and Key Performance Indicators (KPIs) are important elements of the performance management process, allowing organizations to track and measure their progress towards their objectives. The Performance Management Diploma offers an in-depth exploration of these crucial tools, enabling participants to identify and monitor the most relevant performance indicators for their organization. In addition to these key topics, participants will gain an understanding of Performance Appraisal and how it fits into the overall performance management process. This diploma course also delves into Performance Management Systems, exploring how technology can be used to enhance the performance management process, streamline workflows, and improve data accuracy. Finally, participants will learn about the importance of continuous improvement, and how organizations can implement it to achieve sustained growth and success. By completing the Performance Management Diploma, participants will have a comprehensive understanding of the entire performance management process, from setting performance objectives to evaluating performance and providing feedback, and developing performance improvement plans. They will also be well-equipped with the skills and knowledge needed to implement effective Performance Management Systems and drive continuous improvement in their organization. Overall, the Performance Management Diploma is an invaluable resource for professionals looking to enhance their skills and knowledge in performance management. Whether you are a manager, supervisor, or HR professional, this course will provide you with the tools and insights needed to effectively manage and improve employee performance, ultimately contributing to the success of your organization. What you will learn 1:Introduction to Performance Management 2:The Importance of Performance Management 3:Setting Performance Objectives 4:Performance Evaluation Methods 5:Feedback and Coaching 6:Performance Improvement Plans 7:Performance Metrics and KPIs 8:Performance Appraisal 9:Performance Management Systems 10:Continuous Improvement Course Outcomes After completing the course, you will receive a diploma certificate and an academic transcript from Elearn college. Assessment Each unit concludes with a multiple-choice examination. This exercise will help you recall the major aspects covered in the unit and help you ensure that you have not missed anything important in the unit. The results are readily available, which will help you see your mistakes and look at the topic once again. If the result is satisfactory, it is a green light for you to proceed to the next chapter. Accreditation Elearn College is a registered Ed-tech company under the UK Register of Learning( Ref No:10062668). After completing a course, you will be able to download the certificate and the transcript of the course from the website. For the learners who require a hard copy of the certificate and transcript, we will post it for them for an additional charge.

Performance Management Course
Delivered Online On Demand9 days
£99

EC-Council Certified Ethical Hacker (CEH) v12

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The Certified Ethical Hacking v12 course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Overview Information security controls, laws, and standards. Various types of footprinting, footprinting tools, and countermeasures. Network scanning techniques and scanning countermeasures Enumeration techniques and enumeration countermeasures Vulnerability analysis to identify security loopholes in the target organization?s network, communication infrastructure, and end systems. System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities. Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures. Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing. Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures. DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures. Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures. Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures. Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures. SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures. Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools. Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools. Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures. Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools. Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap. Threats to IoT and OT platforms and defending IoT and OT devices. Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools. CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so you will be better positioned to setup your security infrastructure and defend against future attacks. An understanding of system weaknesses and vulnerabilities helps organizations strengthen their system security controls to minimize the risk of an incident. CEH was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to achieve the CEH credential. You will be exposed to an entirely different posture toward the responsibilities and measures required to be secure. Now in its 12th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies. 1 - Introduction to Ethical Hacking Information Security Overview Cyber Kill Chain Concepts Hacking Concepts Ethical Hacking Concepts Information Security Controls Information Security Laws and Standards 2 - 2 - Foot-printing and Reconnaissance Footprinting Concepts Footprinting through Search Engines Footprinting through Web Services Footprinting through Social Networking Sites Website Footprinting Email Footprinting Who is Footprinting DNS Footprinting Network Footprinting Footprinting through Social Engineering Footprinting Tools Footprinting Countermeasures 3 - Scanning Networks Network Scanning Concepts Scanning Tools Host Discovery Port and Service Discovery OS Discovery (Banner Grabbing/OS Fingerprinting) Scanning Beyond IDS and Firewall Draw Network Diagrams 4 - Enumeration Enumeration Concepts NetBIOS Enumeration SNMP Enumeration LDAP Enumeration NTP and NFS Enumeration SMTP and DNS Enumeration Other Enumeration Techniques Enumeration Countermeasures 5 - Vulnerability Analysis Vulnerability Assessment Concepts Vulnerability Classification and Assessment Types Vulnerability Assessment Solutions and Tools Vulnerability Assessment Reports 6 - System Hacking System Hacking Concepts Gaining Access Escalating Privileges Maintaining Access Clearing Logs 7 - Malware Threats Malware Concepts APT Concepts Trojan Concepts Virus and Worm Concepts Fileless Malware Concepts Malware Analysis Countermeasures Anti-Malware Software 8 - Sniffing Sniffing Concepts Sniffing Technique: MAC Attacks Sniffing Technique: DHCP Attacks Sniffing Technique: ARP Poisoning Sniffing Technique: Spoofing Attacks Sniffing Technique: DNS Poisoning Sniffing Tools Countermeasures Sniffing Detection Techniques 9 - Social Engineering Social Engineering Concepts Social Engineering Techniques Insider Threats Impersonation on Social Networking Sites Identity Theft Countermeasures 10 - Denial-of-Service DoS/DDoS Concepts DoS/DDoS Attack Techniques BotnetsDDoS Case Study DoS/DDoS Attack Tools Countermeasures DoS/DDoS Protection Tools 11 - Session Hijacking Session Hijacking Concepts Application Level Session Hijacking Network Level Session Hijacking Session Hijacking Tools Countermeasures 12 - Evading IDS, Firewalls, and Honeypots IDS, IPS, Firewall, and Honeypot Concepts IDS, IPS, Firewall, and Honeypot Solutions Evading IDS Evading Firewalls IDS/Firewall Evading Tools Detecting Honeypots IDS/Firewall Evasion Countermeasures 13 - Hacking Web Servers Web Server Concepts Web Server Attacks Web Server Attack Methodology Web Server Attack Tools Countermeasures Patch Management Web Server Security Tools 14 - Hacking Web Applications Web Application Concepts Web Application Threats Web Application Hacking Methodology Web API, Webhooks, and Web Shell Web Application Security 15 - SQL Injection SQL Injection Concepts Types of SQL Injection SQL Injection Methodology SQL Injection Tools Evasion Techniques Countermeasures 16 - Hacking Wireless Networks Wireless Concepts Wireless Encryption Wireless Threats Wireless Hacking Methodology Wireless Hacking Tools Bluetooth Hacking Countermeasures Wireless Security Tools 17 - Hacking Mobile Platforms Mobile Platform Attack Vectors Hacking Android OS Hacking iOS Mobile Device Management Mobile Security Guidelines and Tools 18 - IoT and OT Hacking IoT Hacking IoT Concepts IoT Attacks IoT Hacking Methodology IoT Hacking Tools Countermeasures OT Hacking OT Concepts OT Attacks OT Hacking Methodology OT Hacking Tools Countermeasures 19 - Cloud Computing Cloud Computing Concepts Container Technology Serverless Computing Cloud Computing Threats Cloud Hacking Cloud Security 20 - Cryptography Cryptography Concepts Encryption Algorithms Cryptography Tools Public Key Infrastructure (PKI) Email Encryption Disk Encryption Cryptanalysis Countermeasures Additional course details: Nexus Humans EC-Council Certified Ethical Hacker (CEH) v.12 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified Ethical Hacker (CEH) v.12 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

EC-Council Certified Ethical Hacker (CEH) v12
Delivered OnlineFlexible Dates
£3,495

Strategy in uncertain times: what replaces strategic planning?

By Strategy Insights

This Strategy Insights Masterclass will explore how the approach to strategy is changing, and how organisations are strengthening their strategic capabilities for uncertain times.

Strategy in uncertain times: what replaces strategic planning?
Delivered OnlineFlexible Dates
£50

VMware Horizon: Deploy and Manage [V8.8]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Tier 1 Operators, administrators, and architects for VMware Horizon Overview By the end of the course, you should be able to meet the following objectives: Recognize the features and benefits of VMware Horizon Define a use case for your virtual desktop and application infrastructure Use vSphere to create VMs to be used as desktops for VMware Horizon Create and optimize Windows VMs to create VMware Horizon desktops Install and Configure Horizon Agent on a VMware Horizon desktop Configure, manage, and entitle desktop pools of full VMs Configure and manage the VMware Horizon Client systems and connect the client to a VMware Horizon desktop Configure, manage, and entitle pools of instant-clone desktops Create and use Remote Desktop Services (RDS) desktops and application pools Monitor the VMware Horizon environment using the VMware Horizon Console Dashboard and Horizon Help Desk Tool Identify VMware Horizon Connection Server installation, architecture, and requirements Describe the authentication and certificate options for the VMware Horizon environment Recognize the integration process and benefits of Workspace ONE Access™ and Horizon 8 Compare the remote display protocols that are available in VMware Horizon Describe the 3D rendering options available in Horizon 8 Discuss scalability options available in Horizon 8 Describe different security options for the Horizon environment This five-day course gives you the hands-on skills to deliver virtual desktops and applications through a single virtual desktop infrastructure platform. You build on your skills in configuring and managing VMware Horizon© 8 through a combination of lecture and hands-on labs. You learn how to configure and deploy pools of virtual machines and how to provide a customized desktop environment to end-users. Additionally, you learn how to install and configure a virtual desktop infrastructure platform. You learn how to install and configure VMware Horizon© Connection Server?, VMware Unified Access Gateway?, how to configure a load balancer for use with Horizon, and how to establish Cloud Pod Architecture. Course Introduction Introductions and course logistics Course objectives Introduction to VMware Horizon Recognize the features and benefits of Horizon Describe the conceptual and logical architecture of Horizon Introduction to Use Case Convert customer requirements to use-case attributes Define a use case for your virtual desktop and application infrastructure vSphere for VMware Horizon Explain basic virtualization concepts Use VMware vSphere© Client? to access your VMware vCenter System and VMware ESXi? hosts Create a Windows virtual machine using vSphere Create Windows Desktops Outline the steps to install Horizon Agent on Windows virtual machines Install Horizon Agent on a Windows virtual Machine Optimize and prepare Windows virtual machines to set up Horizon desktop VMs Create Linux Desktops Create a Linux VM for Horizon Install Horizon Agent on a Linux virtual machine Optimize and prepare Linux virtual machines to set up Horizon desktop VMs Creating and Managing Desktop Pools Identify the steps to set up a template for desktop pool deployment List the steps to add desktops to the VMware Horizon© Connection Server? inventory Compare dedicated-assignment and floating-assignment pools Outline the steps to create an automated pool Define user entitlement Explain the hierarchy of global, pool-level, and user-level policies VMware Horizon Client Options Describe the different clients and their benefits Access the Horizon desktop using various Horizon clients and HTML Configure integrated printing, USB redirection, and the shared folders option Configure session collaboration and media optimization for Microsoft Teams Creating and Managing Instant-Clone Desktop Pools List the advantages of instant clones Explain the provisioning technology used for instant clone desktop pools Set up an automated pool of instant clones Push updated images to instant clone desktop pools Creating RDS Desktop and Application Pools Explain the difference between an RDS desktop pool and an automated pool Compare and contrast an RDS session host pool, a farm, and an application pool Create an RDS desktop pool and an application pool Access RDS desktops and application from Horizon Client Use the instant clone technology to automate the build-out of Remote Desktop Session Host farms Configure load-balancing for RDSHs on a farm Monitoring VMware Horizon Monitor the status of the Horizon components using the Horizon Administrator console dashboard Monitor desktop sessions using the HelpDesk tool Monitor the performance of the remote desktop using the Horizon Performance Tracker Horizon Connection Server Recognize the VMware Horizon reference architecture Identify the Horizon Connection Server supported features Identify the recommended system requirements for Horizon Connection Server Configure the Horizon event database Outline the steps for the initial configuration of Horizon Connection Server Discuss the AD LDS database as a critical {an important component?} component of the Horizon Connection Server installation Horizon Protocols Compare the remote display protocols that are available in VMware Horizon Describe the BLAST Display Protocol Codecs Summarize the BLAST Codec options List the ideal applications for each BLAST codec Describe the BLAST and PCoIP ADMX GPO common configurations Graphics in Horizon Describe the 3D rendering options available in Horizon 8 Compare vSGA and vDGA List the steps to configure graphics cards for use in a Horizon environment Securing Connections: Network Compare tunnels and direct connections for client access to desktops Discuss the benefits of using Unified Access Gateway List the Unified Access Gateway firewall rules Configure TLS certificates in Horizon Securing Connections: Authentication Compare the authentication options that Horizon Connection Server supports Restrict access to the Horizon remote desktops using restricted entitlements Describe the smart card authentication methods that Horizon Connection Server supports Explain the purpose of permissions, roles, and privileges in VMware Horizon Create custom roles Horizon Scalability Describe the purpose of a replica connection server Explain how multiple Horizon Connection Server instances in a pod maintain synchronization List the steps to configure graphics cards for use in a Horizon environment Configure a load balancer for use in a Horizon environment Explain Horizon Cloud Pod Architecture LDAP replication. Explain Horizon Cloud Pod Architecture scalability options Horizon Cloud and Universal Broker Recognize the features and benefits of Horizon Cloud Service Use Universal broker to connect to a Horizon Cloud instance Configure and pair the Horizon Cloud Connector appliance with Horizon Connection Server Workspace ONE Access and Virtual Application Management Recognize the features and benefits of Workspace ONE Access Explain identity management in Workspace ONE Access Explain access management in Workspace ONE Access Describe the requirements to install and configure True SSO in a Horizon environment Describe the Workspace ONE Access directory integration Deploy virtual applications with Workspace services Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Horizon: Deploy and Manage [V8.8] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Horizon: Deploy and Manage [V8.8] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware Horizon: Deploy and Manage [V8.8]
Delivered OnlineFlexible Dates
£4,250

Botany, Hydroponics and Agricultural Science

4.7(47)

By Academy for Health and Fitness

Embark on a captivating journey into the realm of plants, cultivation, and the science behind sustainable agriculture with our exclusive "Botany, Hydroponics, and Agricultural Science" bundle. This comprehensive bundle brings together the wisdom of nature and the marvels of modern science to offer you a truly enriching learning experience. What sets this bundle apart is that it features two QLS-endorsed courses, guaranteeing you hardcopy certificates upon completion. Moreover, it boasts an impressive selection of five CPD-QS accredited courses, ensuring that you gain a wealth of knowledge in relevant fields. Get ready to unlock the secrets of the green world and pave your way to success! Key Features of the Botany, Hydroponics and Agricultural Science Bundle: 3 QLS-Endorsed Courses: We proudly offer 3 QLS-endorsed courses within our Botany, Hydroponics and Agricultural Science bundle, providing you with industry-recognized qualifications. Plus, you'll receive a free hardcopy certificate for each of these courses. QLS Course 01: Botany QLS Course 02: Hydroponics Gardening Online Course QLS Course 03: Agricultural Science 5 CPD QS Accredited Courses: Additionally, our bundle includes 5 relevant CPD QS accredited courses, ensuring that you stay up-to-date with the latest industry standards and practices. Course 01: Ecology Course 02: Environmental Law 2021 Course 03: Animal Science Course 04: Zoology Course 05: Environmental Health In Addition, you'll get Five Career Boosting Courses absolutely FREE with this Bundle. Course 01: Professional CV Writing Course 02: Job Search Skills Course 03: Self-Esteem & Confidence Building Course 04: Professional Diploma in Stress Management Course 05: Complete Communication Skills Master Class Convenient Online Learning: Our Botany, Hydroponics and Agricultural Science courses are accessible online, allowing you to learn at your own pace and from the comfort of your own home. Learning Outcomes: Acquire an in-depth understanding of botany, exploring the fascinating world of plants, their structure, and physiological processes. Master the art of hydroponics gardening, learning how to cultivate plants without soil, optimising growth, and maximising yields. Delve into the realm of agricultural science, discovering the principles behind sustainable farming practices and the latest advancements in the field. Explore the intricate relationships within ecosystems through the study of ecology, gaining insights into the delicate balance of nature. Develop a solid foundation in environmental law, acquiring knowledge about current legislation and regulations governing environmental protection. Uncover the wonders of animal science and zoology, unravelling the mysteries of animal behaviour, anatomy, and classification. Gain an understanding of environmental health, exploring the impact of various factors on human well-being and the measures to mitigate risks. Embark on a captivating journey through the world of botany, hydroponics, and agricultural science. This comprehensive course bundle provides you with a deep understanding of plants, their growth processes, and the science behind sustainable farming practices. Discover the wonders of hydroponics gardening as you learn how to cultivate plants without soil, harnessing cutting-edge techniques to maximise yields. Delve into the realm of agricultural science, exploring the latest advancements in the field and gaining insights into sustainable farming methods. Furthermore, you will explore the intricate relationships within ecosystems through the study of ecology, examine the impact of environmental factors on human health, and develop a strong foundation in animal science and zoology. CPD 250 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Aspiring botanists seeking to expand their knowledge and understanding of plant life. Garden enthusiasts interested in exploring the world of hydroponics gardening and maximising their plant cultivation skills. Individuals involved in or aspiring to work in the agricultural sector, aiming to gain a comprehensive understanding of sustainable farming practices. Environmental enthusiasts and professionals seeking to enhance their knowledge in ecology, environmental law, and environmental health. Career path Agricultural Scientist: £26,000 - £48,000 per year Botanist: £23,000 - £40,000 per year Environmental Consultant: £25,000 - £45,000 per year Ecologist: £21,000 - £38,000 per year Zoologist: £20,000 - £40,000 per year Animal Health Technician: £18,000 - £30,000 per year Certificates Digital certificate Digital certificate - Included Hard copy certificate Hard copy certificate - Included

Botany, Hydroponics and Agricultural Science
Delivered Online On Demand41 hours
£309

Business Writing

By Nexus Human

Duration 1 Days 6 CPD hours Writing is a key method of communication for most people, and it?s one that many people struggle with. This workshop will give participants a refresher on basic writing concepts (such as spelling, grammar, and punctuation), and an overview of the most common business documents (such as proposals, reports, and agendas), giving you that extra edge in the workplace. 1 - Getting Started Workshop Objectives Pre-Assignment Review 2 - Working with Words Spelling Grammar Creating a Cheat Sheet 3 - Constructing Sentences Parts of a Sentence Punctuation Types of Sentences 4 - Creating Paragraphs The Basic Parts Organization Methods 5 - Writing Meeting Agendas The Basic Structure Choosing a Format Writing the Agenda 6 - Writing E-mails Addressing Your Message Grammar and Acronyms 7 - Writing Business Letters The Basic Structure Choosing a Format Writing the Letter 8 - Writing Proposals The Basic Structure Choosing a Format Writing the Proposal 9 - Writing Reports The Basic Structure Choosing a Format Writing the Report 10 - Other Types of Documents Requests for Proposals Projections Executive Summaries Business Cases 11 - Proofreading and Finishing A Proofreading Primer How Peer Review Can Help Printing and Publishing 12 - Wrapping Up Words from the Wise Additional course details: Nexus Humans Business Writing training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Business Writing course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Business Writing
Delivered OnlineFlexible Dates
£450

Cloud Operations on AWS

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for System administrators and operators who are operating in the AWS Cloud Informational technology workers who want to increase the system operations knowledge. Overview Identify the AWS services that support the different phases of Operational Excellence, an AWS Well-Architected Framework pillar Manage access to AWS resources using AWS accounts and organizations and AWS Identity and Access Management (IAM) Maintain an inventory of in-use AWS resources by using AWS services, such as AWS Systems Manager, AWS CloudTrail, and AWS Config Develop a resource deployment strategy using metadata tags, Amazon Machine Images (AMIs), and AWS Control Tower to deploy and maintain an AWS cloud environment Automate resource deployment by using AWS services, such as AWS CloudFormation and AWS Service Catalog Use AWS services to manage AWS resources through CloudOps lifecycle processes, such as deployments and patches Configure a highly available cloud environment that uses AWS services, such as Amazon Route 53 and Elastic Load Balancing, to route traffic for optimal latency and performance Configure AWS Auto Scaling and Amazon EC2 Auto Scaling to scale out your cloud environment based on demand Use Amazon CloudWatch and associated features, such as alarms, dashboards, and widgets, to monitor your cloud environment Manage permissions and track activity in your cloud environment by using AWS services, such as AWS CloudTrail and AWS Config Deploy your resources to an Amazon Virtual Private Cloud (Amazon VPC), establish necessary connectivity to your Amazon VPC, and protect your resources from disruptions of service State the purpose, benefits, and appropriate use cases for mountable storage in your AWS Cloud environment Explain the operational characteristics of object storage in the AWS Cloud, including Amazon Simple Storage Service (Amazon S3) and Amazon S3 Glacier Build a comprehensive cost model to help gather, optimize, and predict your cloud costs by using services such as AWS Cost Explorer and the AWS Cost & Usage Report This course teaches systems operators and anyone performing cloud operations functions how to manage and operate automatable and repeatable deployments of networks and systems on AWS. You will learn about cloud operations functions, such as installing, configuring, automating, monitoring, securing, maintaining, and troubleshooting these services, networks, and systems. The course also covers specific AWS features, tools, and best practices related to these functions. Prerequisites Successfully completed the AWS Technical Essentials course Background in either software development or systems administration Proficiency in maintaining operating systems at the command line, such as shell scripting in Linux environments or cmd/PowerShell in Windows Basic knowledge of networking protocols (TCP/IP, HTTP) 1 - Introduction to Cloud Operations on AWS What is Cloud Operations AWS Well-Architected Framework AWS Well-Architected Tool 2 - Access Management AWS Identity and Access Management (IAM) Resources, accounts, and AWS Organizations 3 - System Discovery Methods to interact with AWS services Tools for automating resource discovery Inventory with AWS Systems Manager and AWS Config Hands-On Lab: Auditing AWS Resources with AWS Systems Manager and AWS Config 4 - Deploy and Update Resources Cloud Operations in deployments Tagging strategies Deployment using Amazon Machine Images (AMIs) Deployment using AWS Control Tower 5 - Automate Resource Deployment Deployment using AWS CloudFormation Deployment using AWS Service Catalog Hands-On Lab: Infrastructure as Code 6 - Manage Resources AWS Systems Manager Hands-On Lab: Operations as Code 7 - Configure Highly Available Systems Distributing traffic with Elastic Load Balancing Amazon Route 53 8 - Automate Scaling Scaling with AWS Auto Scaling Scaling with Spot Instances Managing licenses with AWS License Manager 9 - Monitor and Maintain System Health Monitoring and maintaining healthy workloads Monitoring AWS infrastructure Monitoring applications Hands-On Lab: Monitor Applications and Infrastructure 10 - Data Security and System Auditing Maintaining a strong identity and access foundation Implementing detection mechanisms Automating incident remediation 11 - Operate Secure and Resilient Networks Building a secure Amazon Virtual Private Cloud (Amazon VPC) Networking beyond the VPC 12 - Mountable Storage Configuring Amazon Elastic Block Store (Amazon EBS) Sizing Amazon EBS volumes for performance Using Amazon EBS snapshots Using Amazon Data Lifecycle Manager to manage your AWS resources Creating backup and data recovery plans Configuring shared file system storage Hands-On Lab: Automating with AWS Backup for Archiving and Recovery 13 - Object Storage Deploying Amazon Simple Storage Service (Amazon S3) Managing storage lifecycles on Amazon S3 14 - Cost Reporting, Alerts, and Optimization Gaining AWS cost awareness Using control mechanisms for cost management Optimizing your AWS spend and usage Hands-On Lab: Capstone lab for CloudOps Additional course details: Nexus Humans Cloud Operations on AWS training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cloud Operations on AWS course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cloud Operations on AWS
Delivered OnlineFlexible Dates
£2,025

Salesforce Experience (Community) Cloud Consultant Training

By Packt

Immerse into the intricacies of Salesforce Experience Cloud with our training course and explore building sites, Salesforce CMS, content moderation, gamification, and partner portal setups. Learn about sharing rules, dashboards, and Salesforce CMS integration with a focus on user management, social login, and Lightning Bolts.

Salesforce Experience (Community) Cloud Consultant Training
Delivered Online On Demand10 hours 26 minutes
£52.99

Project Management Fundamentals - Chinese: On-Demand

By IIL Europe Ltd

Project Management Fundamentals - Chinese: On-Demand The course provides practical skills, concepts and principles that can be brought back to the workplace, as well as the insights needed to adapt them to specific project contexts. Many projects are managed by competent and efficient project managers who have not received professional project management training. The work of these project managers includes optimizing processes, planning marketing, developing new products, event planning and implementation, and other project work. Project Management Fundamentals (PMF) is a project management course specially designed for such people, aiming to help such managers build a solid project management knowledge base without affecting their own work too much. The course covers practical skills, theoretical foundations, working principles required in real work situations, and how to flexibly apply the acquired knowledge to special project situations. The goal of this lesson is to improve the quality of work by learning how to plan, manage and control projects effectively. Based on this, the course will focus on a process-oriented, analytically-oriented and systems-oriented approach. These frameworks will help students improve their problem-solving and decision-making skills in real-world projects, with particular emphasis on the collaborative, effective communication, and interpersonal skills needed to manage projects. These contents will run through the entire PMF course, and will be explained in the following two units: People and Projects Execution , Communication , and Building Project Teams What You Will Learn At the end of the course you will be able to: Describe the value of strong project management Identify the characteristics of successful projects and project managers Recognize how current agile/adaptive practices fit into project management Explore the project management process, including initiating, planning, executing, monitoring and controlling, and closing Use project management processes and tools based on case studies and real-world contexts Create a preliminary project plan Use standard project management terminology Basic Concepts Project Management and Related Definitions The Value and Emphasis of Project Management Competitive Constraints and Project Success project life cycle People and Projects Overview of people and projects project manager project team people and projects in the organization Initiating and Defining Requirements Startup project Create a project charter Conduct stakeholder assessments define requirements Using a Work Breakdown Structure Define the Work Breakdown Structure (WBS) Create a working WBS use WBS Managing Project Risk Rationale for risk management Risk Planning Overview identify risks analyze risk Planning Risk Responses Implement response and monitor risks Adaptive Environmental Considerations Estimate Preparation Define estimates Estimation method Estimation practice estimated cost Verify estimates Scheduling Define the scheduling process and related terminology Sorting and defining dependencies Determine the critical path Consider Schedule Risk vs Optimizing Schedule Execution , Communication , and Building Project Teams From Baseline to Execution Project Communications and Stakeholder Relations efficient team Monitoring and Control Define Monitoring and Control Observing how to control from the perspective of competitive constraints Variance Analysis and Corrective Action (Earned Value) Adaptive Environmental Considerations Closing Project finishing project Focus on Project Transition Focus on post-project evaluation

Project Management Fundamentals - Chinese: On-Demand
Delivered Online On Demand16 hours
£1,250