Master the essentials of professional waiting with this CPD accredited course designed to refine your service skills and boost your confidence in any dining setting. Whether you're new to hospitality or looking to sharpen your knowledge, this course offers a clear pathway to understanding the role of a waiter with finesse and efficiency. You’ll gain insights into customer interaction, table etiquette, and the smooth delivery of service—all presented in a way that’s easy to grasp and apply. Ideal for those aiming to enhance their hospitality credentials, this course covers key topics such as menu knowledge, order handling, and maintaining professionalism under pressure. Delivered entirely online, it suits busy schedules and encourages learning at your own pace. With a touch of wit woven through the content, it keeps you engaged without ever losing sight of the skills that matter most to employers and diners alike. Still not convinced? Take a glimpse of the key benefits you'll get with - Lessons prepared in collaboration with Professionals User-friendly Learner Management System (LMS) Syllabus designed in line with the standards of the UK Education System Updated Study Materials focusing both on Knowledge and Skill based training Guidance to expand in 'a' territory and move forward with Waiter profession Free Assessment to test learners' knowledge and skills Course Curriculum: Module 01: Customer Service and Service Sequence Module 02: Equipment Handling Technique Module 03: Hygiene Module 04: Beverage and Tobacco Module 05: Understanding Risks and Preventive Measures Module 06: Food & Beverage Control and Selling Techniques Module 07: Tips and Hints for Success in Waiter profession Course Assessment You will immediately be given access to a specifically crafted MCQ test upon completing the Waiter - CPD Accredited course. For each test, the pass mark will be set to 60%. Accredited Certificate After successfully completing this Waiter - CPD Accredited course, you will qualify for the CPD Quality Standards (CPD QS) certified certificate from Training Express. CPD 10 CPD hours / points Accredited by The CPD Quality Standards (CPD QS) Who is this course for? The Waiter - CPD Accredited training is ideal for highly motivated individuals or teams who want to enhance their skills and efficiently skilled employees. Requirements There are no formal entry requirements for the course, with enrollment open to anyone! Career path Learn the essential skills and knowledge you need to excel in your professional life with the help & guidance from our Waiter - CPD Accredited training.
Understanding British citizenship is more than knowing when to wave a Union Jack. This CPD-accredited online diploma breaks down the essentials, from how to legally enter and remain in the UK, to the finer points of national identity, immigration law, and the implications of Brexit. Whether you’re preparing for a citizenship test or simply want to make sense of the red tape, this course offers clear guidance through the maze of British nationality rules, visa options, and dual citizenship matters—all without the confusing jargon. You’ll also explore key aspects of British life, including rights to live and work in the UK and what to expect when job-seeking before and after your application. With modules covering EEA vs non-EEA statuses, legislation updates, and cultural insights, the course helps bring clarity to what becoming a British citizen really involves. It’s ideal for anyone looking to better understand their legal position or navigate the next steps with confidence—all through flexible, online learning. Course Curriculum: Module 01: What Is British Citizenship? Module 02: Different Types of British Citizenship Module 03: Nationality, Immigration and Legislation Module 04: Enter and Stay in the UK Both Temporarily and Permanently Module 05: Citizenship Application Tests Module 06: Dual Nationality and Citizenship Module 07: Brexit and Its Implications for EEA and Non-EEA Citizens Module 08: Living Rights in the UK Module 09: Seeking Employment in the UK (Before and After the Application) Module 10: Obtaining Visas for the UK Module 11: British Life and Culture Course Assessment You will immediately be given access to a specifically crafted MCQ test upon completing an online module. For each test, the pass mark will be set to 60%. Accredited Certificate After successfully completing this British Citizenship Diploma - CPD Accredited course, you will qualify for the CPD Quality Standards (CPD QS) certified certificate from Training Express. CPD 10 CPD hours / points Accredited by The CPD Quality Standards (CPD QS) Who is this course for? The British Citizenship Diploma - CPD Accredited training is ideal for highly motivated individuals or teams who want to enhance their skills and efficiently skilled employees. Requirements There are no formal entry requirements for the course, with enrollment open to anyone! Career path Learn the essential skills and knowledge you need to excel in your professional life with the help & guidance from our British Citizenship Diploma - CPD Accredited training.
Struggling with debt can feel overwhelming—but it doesn’t have to be permanent. Our Debt Management - CPD Accredited Course is designed to help individuals understand, organise, and effectively tackle personal or business-related debt. From identifying short-term liabilities to managing long-term financial commitments, this course offers a strategic path to regaining control over your finances. Whether you’re looking to build a budget, explore debt financing options, or deal confidently with debt collectors, you’ll find practical guidance and expert-driven insights in every module. With a clear, structured approach, this course walks you through topics such as debt assessment, counselling, legal frameworks, and even the lesser-known benefits of certain types of debt. You’ll also gain an understanding of when bankruptcy may be the right option and how to handle the process. Ideal for anyone seeking to improve their financial literacy or take meaningful steps towards becoming debt-free, this online course can be studied at your own pace, from anywhere. No fluff—just clear strategies, straight talk, and tools you can use. Course Curriculum: Module 01: Introduction to Debt Management Module 02: Long Term and Short Term Debt Module 03: Identifying Your Debt Module 04: Debt Management Plan Module 05: Debt Assessment Module 06: Debt Financing Module 07: Building Budget Module 08: Debt Counselling Module 09: When Is Debt Good? Module 10: Avoiding Debt Problems Module 11: How to Handle Debt Collectors Module 12: How to Get Out of Debt Module 13: Dealing with Bankruptcy and Insolvency Module 14: Laws and Regulations Course Assessment You will immediately be given access to a specifically crafted MCQ test upon completing an online module. For each test, the pass mark will be set to 60%. Accredited Certificate After successfully completing this Debt Management - CPD Accredited course, you will qualify for the CPD Quality Standards (CPD QS) certified certificate from Training Express. CPD 10 CPD hours / points Accredited by The CPD Quality Standards (CPD QS) Who is this course for? The Debt Management - CPD Accredited training is ideal for highly motivated individuals or teams who want to enhance their skills and efficiently skilled employees. Requirements There are no formal entry requirements for the course, with enrollment open to anyone! Career path Learn the essential skills and knowledge you need to excel in your professional life with the help & guidance from our Debt Management - CPD Accredited training.
Lone Worker Training is an essential course designed to equip individuals with the knowledge and confidence needed to navigate the unique challenges faced when working independently. This CPD-accredited programme covers every key aspect of lone working, from understanding legal duties and personal rights to effective risk assessment and monitoring. Whether you work remotely, off-site, or in isolated conditions, this course guides you through recognising hazards, adopting safe practices, and responding confidently to potential threats, ensuring your wellbeing remains a top priority. With a clear focus on personal safety and safe workplace arrangements, this training provides valuable insights into identifying risks and managing them proactively. It also addresses common difficulties lone workers encounter, including prevention strategies against violence and advice on maintaining effective supervision even when physically alone. Designed to support professionals across various sectors, this course offers a structured and engaging learning experience that blends theoretical knowledge with practical guidance — all delivered in a flexible online format tailored to your schedule. Enhance your awareness and protect yourself effectively with this essential training for anyone working solo. Course Curriculum: Module 01: Basics of Lone Working Module 02: Legal Duties of Lone Working Module 03: Rights and Responsibilities in Lone Working Module 04: Risk Assessment and Control Measures Module 05: Monitoring and Supervision Module 06: Training and Development Module 07: Problems that Affect Lone Workers Module 08: Practical Tips to Avoid Violence Module 09: Personal Safety Module 10: Safe Workplace Arrangements Course Assessment You will immediately be given access to a specifically crafted MCQ test upon completing an online module. For each test, the pass mark will be set to 60%. Accredited Certificate After successfully completing this Lone Worker Training - CPD Accredited course, you will qualify for the CPD Quality Standards (CPD QS) certified certificate from Training Express. CPD 10 CPD hours / points Accredited by The CPD Quality Standards Who is this course for? The Lone Worker Training - CPD Accredited training is ideal for highly motivated individuals or teams who want to enhance their skills and efficiently skilled employees. Requirements There are no formal entry requirements for the course, with enrollment open to anyone! Career path Learn the essential skills and knowledge you need to excel in your professional life with the help & guidance from our Lone Worker Training - CPD Accredited training.
Embark on a riveting expedition into the realm of website security with our course, 'Website Hacking From Scratch.' Delve deep into the labyrinth of potential vulnerabilities, from SQL injections to XSS vulnerabilities, equipping yourself with the prowess to identify and safeguard against digital threats. By course end, learners are not only conversant with the anatomy of website vulnerabilities but are also adept at leveraging tools like Owasp ZAP for holistic website fortification. Learning Outcomes Gain comprehensive insights into the foundation of website vulnerabilities and their exploitation. Understand and identify risks associated with file uploads, code executions, and session management. Acquire proficiency in detecting and safeguarding against SQL and XSS vulnerabilities. Master the use of automated tools, such as Owasp ZAP, in vulnerability detection. Develop strategies for effective post-exploitation management. Why choose this Website Hacking From Scratch course? Unlimited access to the course for a lifetime. Opportunity to earn a certificate accredited by the CPD Quality Standards after completing this course. Structured lesson planning in line with industry standards. Immerse yourself in innovative and captivating course materials and activities. Assessments are designed to evaluate advanced cognitive abilities and skill proficiency. Flexibility to complete the Website Hacking From Scratch Course at your own pace, on your own schedule. Receive full tutor support throughout the week, from Monday to Friday, to enhance your learning experience. Who is this Website Hacking From Scratch course for? Aspiring cybersecurity enthusiasts eager to delve into website security. Web developers keen to fortify their sites against potential breaches. IT professionals aiming to enhance their repertoire with security expertise. Entrepreneurs looking to ensure the robustness of their online platforms. Individuals curious about ethical hacking and its applications. Career path Ethical Hacker: £25,000 - £70,000 Penetration Tester: £30,000 - £60,000 Cybersecurity Analyst: £28,000 - £55,000 IT Security Consultant: £35,000 - £75,000 Web Security Manager: £40,000 - £80,000 Information Security Officer: £45,000 - £85,000 Prerequisites This Website Hacking From Scratch does not require you to have any prior qualifications or experience. You can just enrol and start learning.This Website Hacking From Scratch was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Certification After studying the course materials, there will be a written assignment test which you can take at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £4.99 Original Hard Copy certificates need to be ordered at an additional cost of £8. Course Curriculum Course Introduction Course Introduction 00:02:00 Preparation - Creating a Penetration Testing Lab Lab Overview & Needed Software 00:08:00 Installing Kali 2019 As a Virtual Machine Using a Ready Image 00:10:00 Installing Kali 2019 As a Virtual Machine 00:10:00 Installing Metasploitable As a Virtual Machine 00:04:00 Preparation - Linux Basics Basic Overview of Kali Linux 00:05:00 The Linux Terminal & Basic Linux Commands 00:11:00 Configuring Metasploitable & Lab Network Settings 00:06:00 Website Basics What is a Website? 00:04:00 How To Hack a Website? 00:04:00 Information Gathering Gathering Information Using Whois Lookup 00:05:00 Discovering Technologies Used On The Website 00:06:00 Gathering Comprehensive DNS Information 00:10:00 Discovering Websites On The Same Server 00:04:00 Discovering Subdomains 00:12:00 Discovering Sensitive Files 00:07:00 Analysing Discovered Files 00:04:00 Maltego - Discovering Servers, Domains & Files 00:08:00 Maltego - Discovering Websites, Hosting Provider & Emails 00:05:00 File Upload Vulnerabilities What are they? And How To Discover & Exploit Basic File Upload Vulnerabilities 00:07:00 HTTP Requests - GET & POST 00:04:00 Intercepting HTTP Requests 00:07:00 Exploiting More Advanced File Upload Vulnerabilities 00:04:00 Exploiting More Advanced File Upload Vulnerabilities 00:04:00 [Security] Fixing File Upload Vulnerabilities 00:06:00 Code Execution Vulnerabilities What are they? & How To Discover & Exploit Basic Code Execution Vulnerabilities 00:07:00 Exploiting Advanced Code Execution Vulnerabilities 00:06:00 [Security] - Fixing Code Execution Vulnerabilities 00:06:00 Local File Inclusion Vulnerabilities (LFI) What are they? And How To Discover & Exploit Them 00:06:00 Gaining Shell Access From LFI Vulnerabilities - Method 1 00:07:00 Gaining Shell Access From LFI Vulnerabilities - Method 2 00:11:00 Remote File Inclusion Vulnerabilities (RFI) Remote File Inclusion Vulnerabilities - Configuring PHP Settings 00:04:00 Remote File Inclusion Vulnerabilities - Discovery & Exploitation 00:06:00 Exploiting Advanced Remote File Inclusion Vulnerabilities 00:03:00 [Security] Fixing File Inclusion Vulnerabilities 00:06:00 SQL Injection Vulnerabilities What is SQL 00:06:00 Dangers of SQL Injections 00:03:00 SQL Injection Vulnerabilities - SQLi In Login Pages Discovering SQL Injections In POST 00:08:00 Bypassing Logins Using SQL Injection Vulnerability 00:05:00 Bypassing More Secure Logins Using SQL Injections 00:06:00 [Security] Preventing SQL Injections In Login Pages 00:08:00 SQL Injection Vulnerabilities - Extracting Data From The Database Discovering SQL Injections in GET 00:07:00 Reading Database Information 00:05:00 Finding Database Tables 00:04:00 Extracting Sensitive Data Such As Passwords 00:04:00 SQL Injection Vulnerabilities - Advanced Exploitation Discovering & Exploiting Blind SQL Injections 00:06:00 Discovering a More Complicated SQL Injection 00:07:00 Extracting Data (passwords) By Exploiting a More Difficult SQL Injection 00:05:00 Bypassing Filters 00:05:00 Bypassing Security & Accessing All Records 00:09:00 [Security] Quick Fix To Prevent SQL Injections 00:07:00 Reading & Writing Files On The Server Using SQL Injection Vulnerability 00:06:00 Getting A Reverse Shell Access & Gaining Full Control Over The Target Web Server 00:08:00 Discovering SQL Injections & Extracting Data Using SQLmap 00:07:00 [Security] - The Right Way To Prevent SQL Injection 00:05:00 XSS Vulnerabilities Introduction - What is XSS or Cross Site Scripting? 00:03:00 Discovering Basic Reflected XSS 00:04:00 Discovering Advanced Reflected XSS 00:05:00 Discovering An Even More Advanced Reflected XSS 00:07:00 Discovering Stored XSS 00:03:00 Discovering Advanced Stored XSS 00:04:00 XSS Vulnerabilities - Exploitation Hooking Victims To BeEF Using Reflected XSS 00:06:00 Hooking Victims To BeEF Using Stored XSS 00:04:00 BeEF - Interacting With Hooked Victims 00:04:00 BeEF - Running Basic Commands On Victims 00:04:00 BeEF - Stealing Credentials/Passwords Using A Fake Login Prompt 00:02:00 Bonus - Installing Veil 3.1 00:06:00 Bonus - Veil Overview & Payloads Basics 00:07:00 Bonus - Generating An Undetectable Backdoor Using Veil 3 00:10:00 Bonus - Listening For Incoming Connections 00:07:00 Bonus - Using A Basic Delivery Method To Test The Backdoor & Hack Windows 10 00:07:00 BeEF - Gaining Full Control Over Windows Target 00:04:00 [Security] Fixing XSS Vulnerabilities 00:07:00 Insecure Session Management Logging In As Admin Without a Password By Manipulating Cookies 00:06:00 Discovering Cross Site Request Forgery Vulnerabilities (CSRF) 00:07:00 Exploiting CSRF Vulnerabilities To Change Admin Password Using a HTML File 00:07:00 Exploiting CSRF Vulnerabilities To Change Admin Password Using Link (Preview) 00:06:00 [Security] The Right Way To Prevent CSRF Vulnerabilities 00:09:00 Brute Force & Dictionary Attacks What Are Brute Force & Dictionary Attacks? 00:04:00 Creating a Wordlist 00:07:00 Launching a Wordlist Attack & Guessing Login Password Using Hydra 00:14:00 Discovering Vulnerabilities Automatically Using Owasp ZAP Scanning Target Website For Vulnerabilities 00:04:00 Analysing Scan Results 00:04:00 Post Exploitation Post Exploitation Introduction 00:04:00 Interacting With The Reverse Shell Access Obtained In Previous Lectures 00:07:00 Escalating Reverse Shell Access To Weevely Shell 00:08:00 Weevely Basics - Accessing Other Websites, Running Shell Commands etc 00:07:00 Bypassing Limited Privileges & Executing Shell Commands 00:05:00 Downloading Files From Target Webserver 00:05:00 Uploading Files To Target Webserver 00:08:00 Getting a Reverse Connection From Weevely 00:08:00 Accessing The Database 00:09:00 Resources Resources - Website Hacking From Scratch 00:00:00 Assignment Assignment - Website Hacking From Scratch 00:00:00
In this competitive job market, you need to have some specific skills and knowledge to start your career and establish your position. This SEO Masterclass will help you understand the current demands, trends and skills in the sector. The course will provide you with the essential skills you need to boost your career growth in no time. The SEO Masterclass will give you clear insight and understanding about your roles and responsibilities, job perspective and future opportunities in this field. You will be familiarised with various actionable techniques, career mindset, regulations and how to work efficiently. This course is designed to provide an introduction to SEO Masterclass and offers an excellent way to gain the vital skills and confidence to work toward a successful career. It also provides access to proven educational knowledge about the subject and will support those wanting to attain personal goals in this area. Learning Objectives Learn the fundamental skills you require to be an expert Explore different techniques used by professionals Find out the relevant job skills & knowledge to excel in this profession Get a clear understanding of the job market and current demand Update your skills and fill any knowledge gap to compete in the relevant industry CPD accreditation for proof of acquired skills and knowledge Who is this Course for? Whether you are a beginner or an existing practitioner, our CPD accredited SEO Masterclass is perfect for you to gain extensive knowledge about different aspects of the relevant industry to hone your skill further. It is also great for working professionals who have acquired practical experience but require theoretical knowledge with a credential to support their skill, as we offer CPD accredited certification to boost up your resume and promotion prospects. Entry Requirement Anyone interested in learning more about this subject should take this SEO Masterclass. This course will help you grasp the basic concepts as well as develop a thorough understanding of the subject. The course is open to students from any academic background, as there is no prerequisites to enrol on this course. The course materials are accessible from an internet enabled device at anytime of the day. CPD Certificate from Course Gate At the successful completion of the course, you can obtain your CPD certificate from us. You can order the PDF certificate for £9 and the hard copy for £15. Also, you can order both PDF and hardcopy certificates for £22. Career path The SEO Masterclass will help you to enhance your knowledge and skill in this sector. After accomplishing this course, you will enrich and improve yourself and brighten up your career in the relevant job market. Course Curriculum Section 01: SEO & Inbound Marketing Become a Master of Search Engine Optimization and Inbound Marketing Today 00:05:00 Transcending keywords and link building with a mindset of serving viewers and solving 00:10:00 How I get 2 5+ million impressions a month on Google and YouTube 00:19:00 How To Get 1,000 Clicks A Day From Google Organic Search 00:15:00 Top 25 SEO Tips for 2020! 00:23:00 Worst SEO strategies I have confirmed are terrible 00:11:00 Section 02: Building Connections Aiming for Lifetime Connections 00:07:00 Where to start Fix and improve what we see! 00:06:00 Play nice with others! Haters and competitors are friends! 00:08:00 Tutorials build a rock solid foundation 00:04:00 Entertain to keep people coming back and have fun 00:07:00 Stories stick with us 00:06:00 Long videos, posts, and descriptions ideal like Wikipedia 00:05:00 Section 03: Hosting and Optimization Scalable web host makes viral growth possible and high ranking easier 00:13:00 Email marketing helps build relationships and links naturally 00:12:00 Word Press Plug-in Setup + Best Dashboard Performance Settings 00:20:00 HTTPS is included as a ranking factor in Google 00:01:00 Ensure complete coverage of your own name in search results 00:05:00 Register your domain for a long time to show stability over time 00:04:00 Edit the date published when making any changes 00:02:00 Setup automatic sharing on social media to help get viewers 00:04:00 Section 04: Google Analytics Insights Google analytics introduction for beginners 00:04:00 Google analytics admin dashboard for account and property creation plus Ad Words link 00:07:00 Google analytics home dashboard from users, sessions, channel, and device 00:12:00 Site speed and suggestions to improve user experience and rank higher 00:09:00 Behaviour tab with all pages to see where more traffic is 00:05:00 Acquisition source medium and referrals for understanding how we get traffic 00:10:00 Conversion tracking and advanced features 00:04:00 Section 05: Google Webmaster Tools and Search Console Google webmaster tools settings to become a verified owner 00:03:00 New Google search console overview 00:04:00 Submit a Word Press XML sitemap fast with Yoast SEO plugin 00:03:00 Performance reports for queries, pages, countries, and devices 00:10:00 Welcome to the top! 00:03:00 Certificate and Transcript Order Your Certificates or Transcripts 00:00:00
Duration 5 Days 30 CPD hours This course is intended for Linux system administrators, virtualization administrators, and hybrid infrastructure engineers interested in deploying large-scale virtualization solutions and managing virtual servers in their datacenters, based on the Red Hat Virtualization open virtualization management platform. Overview Configure Red Hat Virtualization Configure networking and storage for use with Red Hat Virtualization Manage user accounts and access to the Red Hat Virtualization environment Install and manage virtual machines in Red Hat Virtualization Use templates for rapid virtual machine deployment Manage virtual machine snapshots and images Migrate virtual machines and explore high-availability options Deploy, configure, manage, and migrate virtual environments Red Hat Virtualization (RH318) teaches you the skills needed to deploy, administer, and operate virtual machines in your organization using Red Hat© Virtualization. Through numerous hands-on exercises, you will demonstrate the ability to deploy and configure the Red Hat Virtualization infrastructure and use it to provision and manage virtual machines. This offering also prepares you for the Red Hat Certified Specialist in Virtualization exam. This course is based on Red Hat Enterprise Virtualization 4.3 and Red Hat Enterprise Linux© 7.6 and 8, as well as Red Hat Hyperconverged Infrastructure for Virtualization 1.6. 1 - Red Hat Virtualization overview Explain the purpose and architecture of Red Hat Virtualization. 2 - Install and configure Red Hat Virtualization Install a minimal Red Hat Virtualization environment and use it to create a virtual machine. 3 - Create and manage datacenters and clusters Organize hypervisors into groups using datacenters and clusters. 4 - Manage user accounts and roles Configure user accounts using a central directory service, then use roles to assign access to resources based on job responsibilities. 5 - Adding physical hosts Add additional Red Hat Virtualization hosts automatically, and move and remove hosts from datacenters as needed. 6 - Scale Red Hat Virtualization infrastructure Add Red Hat Virtualization hosts automatically, configure Red Hat Enterprise Linux hosts when appropriate, and move and remove hosts from data centers as needed. 7 - Manage Red Hat Virtualization networks Separate network traffic into multiple networks on one or more interfaces to improve the performance and security of Red Hat Virtualization. 8 - Manage Red Hat Virtualization storage Create and manage data and ISO storage domains. 9 - Deploy and manage virtual machines Operate virtual machines in the Red Hat Virtualization environment. 10 - Migrate virtual machines Migrate and control automatic migration of virtual machines. 11 - Manage virtual machine images Manage virtual machine snapshots and disk images. 12 - Automating virtual machine deployment Automate deployment of virtual machines by using templates and cloud-init. 13 - Back up and upgrade Red Hat Virtualization Back up, restore, and upgrade the software in a Red Hat Virtualization environment. 14 - Explore high-availability practices Explain procedures to improve the resilience and reliability of Red Hat Virtualization by removing single points of failure and implementing high-availability features. 15 - Perform comprehensive review Demonstrate skills learned in this course by installing and configuring Red Hat Virtualization; using the platform to create and manage virtual machines; and backing up and updating components of Red Hat Virtualization. Additional course details: Nexus Humans Red Hat Virtualization (RH318) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Red Hat Virtualization (RH318) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Senior Linux system administrators who use high-availability clustering and fault-tolerant shared storage technologies to maximize resiliency of production services. Overview Install and configure a Pacemaker-based high availability cluster. Create and manage highly available services. Troubleshoot common cluster issues. Work with shared storage (iSCSI) and configure multipathing. Implement Logical Volume Manager (LVM) in cluster-aware configurations. Configure GFS2 file systems on storage shared by multiple nodes. Deploy reliable, available critical production services in a high availability cluster In the Red Hat High Availability Clustering (RH436) course, you will learn how to provide highly available network services to a mission-critical enterprise environment through the deployment and management of shared storage and server clusters. Created for senior Linux system administrators, this 4-day course strongly emphasizes lab-based activities. You will set up a cluster of systems running the Pacemaker component of the Red Hat Enterprise Linux High-Availability Add-On, and deploy Linux-based services such as web servers and databases on that cluster. Cluster storage components from the Resilient Storage Add-On are also covered; installations and applications that require multiple cluster nodes can access the same storage simultaneously. This includes Logical Volume Manager (LVM) Shared Volume Groups, Red Hat Global File System 2 (GFS2), and Device-Mapper Multipath. This course is based on Red Hat Enterprise Linux 8.3. Prerequisites Red Hat Certified System Administrator (RHCSA) exam (EX200) and associated courses. Red Hat Cerfitied Engineer (RHCE) exam (EX294) and associated courses. 1 - Creating high availability clusters Create a basic high availability cluster. 2 - Managing cluster nodes and quorum Manage node membership in the cluster and describe how it impacts cluster operation. 3 - Isolating malfunctioning cluster nodes Isolate unresponsive cluster nodes to protect data and recover services and resources after a failure. 4 - Creating and configuring resources Create basic resources and resource groups to provide highly available services. 5 - Troubleshooting high availability clusters Identify, diagnose, and fix cluster issues. 6 - Automating cluster and resource deployment Deploy a new high availability cluster and cluster resources using Ansible automation. 7 - Managing two-node clusters Operate two-node clusters while identifying and avoiding issues specific to a two-node cluster configuration. 8 - Accessing iSCSI storage Configure iSCSI initiators on your servers to access block-based storage devices provided by network storage arrays or Ceph storage clusters. 9 - Accessing storage devices resiliently Configure resilient access to storage devices that have multiple access paths. 10 - Configuring LVM in clusters Select, configure, and manage the correct LVM configuration for use in your cluster. 11 - Providing storage with the GFS2 cluster file system Use the GFS2 cluster file system to simultaneously pProvide tightly coupled shared storage that can be accessed by multiple nodes. 12 - Eliminating single points of failure Identify and eliminate single points of failure in your cluster to decrease risk and increase average service availability. Note: Course outline is subject to change with technology advances and as the nature of the underlying job evolves. For questions or confirmation on a specific objective or topic, please contact a training specialist. Additional course details: Nexus Humans Red Hat High Availability Clustering (RH436) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Red Hat High Availability Clustering (RH436) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This intermediate course is for experienced SQL end users, application programmers, database administrators, and user support staff who need more advanced knowledge of SQL. Overview Discuss basic relational database concepts Use some of the OLAP features of DB2, such as GROUPing and RANKing functions Create tables, views and indexes Use referential integrity, check constraints and triggers Use outer joins, and join tables to themselves Use CASE expressions, and the CAST function Identify the impact of Summary Tables, Materialized Query Tables, and temporary tables Use complex subqueries Use a greater number of scalar SQL functions Use advanced SQL constructs, such as recursive SQL and table expressions Define User-Defined Distinct Types and User-Defined Functions Avoid several of the most common causes for poorly-performing SQL This course teaches you how to make use of advanced SQL techniques to access DB2 databases in different environments. This course is appropriate for customers working in all DB2 environments, specifically for z/OS, Linux, UNIX, and Windows. Introduction Identify the purpose of the clauses in the SELECT statement Describe the key differences among the IBM DB2 platforms Describe and use some of the OLAP features of DB2, such as GROUPING functions like CUBE and ROLLUP, and the RANK, DENSE_RANK and ROW_NUMBER functions Create Objects Code statements to: Create tables and views, Alter tables, Create indexes, Implement referential integrity (RI), and Define triggers and check constraints Identify impacts and advantages of referential integrity, including impacts of delete rules Identify considerations when using triggers and check constraints Define and make use of INSTEAD OF triggers Join Retrieve data from more than one table via inner and outer joins Use outer joins (LEFT, RIGHT, FULL) Use ANTI JOINS Join a table to itself Use UNION and UNION ALL Use EXCEPT and INTERCEPT CASE, CAST, Summary Tables, and Materialized Query Tables Identify when CASE expressions can be used Code CASE expressions in SELECT list and in the WHERE clause Identify when CAST specifications can be used Identify the advantages of using Summary (Materialized Query) Tables and Temporary tables Identify the advantages of using Materialized Query Tables (MQTs) Identify when and how to use Temporary tables Using Subqueries Code subqueries using the ALL, ANY/SOME, and EXISTS keywords Code correlated subqueries Choose the proper type of subquery to use in each case Scalar Functions Extend your knowledge of scalar functions which: Manipulate arithmetic data, Manipulate date values, and Manipulate character data Examples of scalar functions that are addressed in this course: SUBSTR POSSTR COALESCE/VALUE DECIMAL ROUND DIGITS CHAR DATE/TIME Table Expressions and Recursive SQL Identify reasons for using table expressions and recursive SQL Use nested and common table expressions Identify the difference between views and table expressions Code recursive SQL Control the depth of recursion when coding recursive SQL UDTs/UDFs and Performance Describe the concepts behind User-Defined Types, User-Defined Functions and Stored Procedures Predict when queries will use indexes to get better performance Identify concepts of predicate processing State introductory concepts about index structure State general best practices advice Additional course details: Nexus Humans CE131 IBM DB2 SQL Workshop for Experienced Users training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CE131 IBM DB2 SQL Workshop for Experienced Users course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for Network professionals and who design, build, operate, manage, and troubleshoot software-defined networking and security, and application owners who need visibility across multi-cloud environments Overview By the end of the course, you should be able to meet the following objectives: Explain the features and architecture of VMware Aria Operations for Networks Describe the VMware Aria Operations for Networks installation processes and requirements Navigate the VMware Aria Operations for Networks GUI Recognize major use cases for VMware Aria Operations for Networks and their benefits Deploy VMware Aria Operations for Networks Use VMware Aria Operations for Networks to monitor, operate, analyze, and troubleshoot the infrastructure supporting your applications This two-day, hands-on course gives you the skills to deploy and use VMware Aria Operations? for Networks to ensure an optimized, highly available, and secure infrastructure for your applications. You will learn the features, components, architecture, and benefits of VMware Aria Operations for Networks and how to use it to simplify daily operation and troubleshooting tasks. Course Introduction Introductions and course logistics Course objectives Introduction to VMware Aria Operations for Networks Identify the use cases for VMware Aria Operations for Networks Access the VMware Aria Operations for Networks Home page View VMware Aria Operations for Networks entity data Perform searches for specific entity data Create entity search queries Find and use event data VMware Aria Operations for Networks Architecture and Components Identify the components of VMware Aria Operations for Networks Describe the function of each component and how the components interact Check the health of VMware Aria Operations for Networks components VMware Aria Operations for Networks Installation Deploy VMware Aria Operations for Networks components Configure the pairing relationship between the platform VM and the collector VM Troubleshoot platform VM and collector VM configuration problems Explain how data sources export flow information Add VMware vCenter Server© to VMware Aria Operations for Networks Add a VMware NSX to VMware Aria Operations for Networks Configure IPFIX Distinguish between the mechanisms used to scale VMware Aria Operations for Networks Select the appropriate scaling mechanism for your environment Describe how clusters are expanded Integrate VMware Aria Operations with VMware Aria Operations for Networks Import a VMware Aria Operations for Networks instance into VMware Aria Suite Lifecycle VMware Aria Operations for Networks Use Cases Explain use cases for VMware Aria Operations for Networks Create VMware Aria Operations for Networks applications Perform application discovery Plan and optimize micro-segmentation and security for applications Explain the use of flow analytics Use flow information from physical devices in security planning Generate virtual machine path topologies between entities using flows Extract useful information from path topologies Validate NSX deployments Monitor and troubleshoot NSX events Operations and Troubleshooting Common Issues Perform VMware Aria Operations for Networks operations by using VMware vSphere© tags Use the flow analytics dashboards to perform flow analysis Set and configure Intents to identify aberrations in the behaviour of entities Use VMware Aria Operations for Networks tools to troubleshoot common problems Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Aria Operations for Networks: Install, Configure, Manage [V6.8] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Aria Operations for Networks: Install, Configure, Manage [V6.8] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.