• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

387 Installation courses delivered Live Online

Oracle Database - Managing Multitenant Architecture

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is intended for Administrator, Architect, and Database Administrator Overview Upon successful completion of this course, students will be able to Manage PDB snapshots, Encrypt data in PDBs and isolate PDB keystore, Monitor performance in CDBs and PDBs, Audit users in CDB and PDBs, Protect data with Database Vault policies in CDB and PDBs, Manage a CDB fleet, and Manage resource allocation between PDBs and within a PDB. This Oracle Database: Managing Multitenant Architecture course covers all aspects of the multitenant architecture, providing detailed information on the components of an Oracle multitenant container database. CDB BasicsCDB and Regular PDBsApplication PDBs and Application InstallationPDB CreationCDB and PDB ManagementStorageSecurityBackup and DuplicateRecovery and FlashbackPerformance MonitoringResources AllocationData MovementUpgrade methods Additional course details: Nexus Humans Oracle Database - Managing Multitenant Architecture training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Oracle Database - Managing Multitenant Architecture course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Oracle Database - Managing Multitenant Architecture
Delivered OnlineFlexible Dates
Price on Enquiry

C&G 2357 Level 3 Electrical NVQ

By Technique Learning Solutions

Who is this Level 3 NVQ aimed at? The electrical NVQ is designed for those with five or fewer years of experience in the electrical industry, and who have completed their City & Guilds 2365 Level two and three diplomas. Prior to joining, candidates will be assessed on their readiness for the Level 3 NVQ. What does this Electrical NVQ cover? This Level 3 Diploma covers Domestic, Commercial, and Industrial sectors – it will include a range of units of New Installations such as: Health and Safety Overseeing and organising work environment Applying environmental legislation Inspection and Testing Fault finding Professional discussions with assessors AM2 (this is a separate course and has an additional cost.) This is not a training course; it is an assessment of competence. Unlike other courses, this will not be based in a classroom or workshop – instead, candidates will complete this qualification on work placement. Candidates will complete electrical installations on-site, and they will then be assessed by a qualified assessor, building their portfolio. Only a small amount of this will involve going to a training centre. Before entering a workplace, your assessor will go over and help you understand: How to build a portfolio What range of evidence is required to meet the qualification criteria What assessors are looking for in order for candidates to demonstrate full professional competence Assessors will use a range of methods to evaluate candidate’s electrical installations such as; witness testimony, photographic evidence, direct observation, and reflective accounts. How long does the NVQ take to complete? The length differs for each candidate as it depends on how quickly they take to cover the types of work required to complete all units. If you have been working in the industry, previous jobs can be used as evidence to hurry the process up. What qualifications will I gain? Once candidates have completed their portfolio and other assessments, they will gain a formal City & Guilds Level 3 NVQ certificate. When candidates have completed their NVQ, they must move on to the AM2 end point assessment, which must be completed at an AM2 approved centre, such as our Sheffield centre.

C&G 2357 Level 3 Electrical NVQ
Delivered OnlineFlexible Dates
£500

18th Edition Update Training Course

By Technique Learning Solutions

This is an upgrade to and will replace, the already existing City & Guilds 17th Edition Wiring Regulations all subsequent amendments. Course Description: If you have passed your 17th Edition since the last amendment then you are eligible to take this short 1 day 18th Edition update course! Save time and money by covering the topics you need for the new regulations, without having to go over all that you already know. If you have not yet done the 17th Edition then you will need to take our 3 day 18th Edition course. Changes for 18th Edition are as follows: Protection against overvoltages – Clause 443 is likely to be overhauled. Protection against fire – Chapter 42 will be updated with extra information on arc fault detection Electrical Embedded heating – Section 753 will be extended to include embedded electrical heating systems for surface heating, and will include de-icing and frost prevention systems. Energy efficiency – There will be a brand new section covering energy efficiency Please be aware that the Wiring Regulations course is not designed to teach you every regulation in the book but it will teach you the best practices on how to reference the latest regulations as you would on the job. As such key topics currently covered on the 17th Edition will still be included. We have been delivering Wiring Regulations courses for many years and although it is mainly theory based you cannot beat real training in a real classroom. By training with other people in your class you will benefit from being able to ask relevant questions as well as finding the answers to many questions from your fellow students that you may not have even thought of. City & Guilds The City & Guilds 2382-22 course will replace the current C&G 2382-15 certificate. This upgrade course will outline the change in the regulations and candidates must complete an online, multiple choice exam. Focus: You will study the latest standard of the IEE wiring regulations, including essential subjects such as safety, selection and erection of electrical equipment. There are 8 key modules and current amendments: Section 1 – Scope, Object and FundamentalsSection 2 – DefinitionsSection 3 – Assessment of general characteristicsSection 4 – Protection for SafetySection 5 – Selection and Erection of equipmentSection 6 – Inspection & TestingSection 7 – Special Installations or locationsSection 8 – Functional Requirements This course does include the latest amendments such as: Electromagnetic Disturbance Surge Protection Medical locations Operating and Maintenance Gangways Arc Fault Detection Devices (AFDDs) Changes to fire safety requirements in chapter 422, covering the design of electrical installations in industrial, commercial and multiple-occupancy homes, as well as new information for ‘protected escape routes’ Protection against over voltages Changes across Part 7: Special Locations This classroom based course will show, teach and perfect you on how to reference and use the book for situations that you will encounter while working in the field.

18th Edition Update Training Course
Delivered OnlineFlexible Dates
£500

18th Edition Update 2022

By Technique Learning Solutions

We have available to book on a first come first served basis a 4hr 18th edition update course which will look at the changes in full, how it will effect your installations and best practice going forward, therefore answering all your questions. The release of the publication is due at the end of March 2022 and we will be running these courses in mid to late April, these always become fully booked and we shall only be running them for a short time period. All course material will be provided along with use of the new 18th edition book.

18th Edition Update 2022
Delivered OnlineFlexible Dates
£500

TS617 IBM Spectrum Protect - Implementation and Administration (v8.1.6)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Implementers and administrators who are new to IBM Spectrum Protect data management. Overview At the end of this course you should be able to: Describe the purpose of IBM Spectrum Protect Install and configure the IBM Spectrum Protect components Use the administrative and client interfaces Discuss storage methodology options and create storage pool Customize data movement and retention policies to meet business requirements Configure the IBM Spectrum Protect database and storage pools for protection Optimize client configuration Perform backup, restore, archive and retrieve operations Organize daily tasks required to protect the IBM Spectrum Protect environment Automate and monitor client and administrative tasks and events IBM Spectrum© Protect 8.1.6 is a data backup and recovery solution designed to help you manage your data retention, reduce the cost of storage, and provide appropriate recovery point objectives to meet any service level agreement. IBM Spectrum© Protect offers improved efficiency and flexibility using object-based data management and policy driven retention.This course will focus on implementation and basic administration of a IBM Spectrum© Protect environment. The hands-on lab exercises are performed on a Windows 2012 environment. The course materials include examples of AIX and Linux commands, when different from Windows. Components and conceptsInstallation and configurationInterfaces and monitoringStorage pools and devicesPolicy management, data movement, and explorationDatabase and storage pool managementClient configuration and managementClient data protectionDaily operations and maintenanceSchedules and reports Additional course details: Nexus Humans TS617 IBM Spectrum Protect - Implementation and Administration (v8.1.6) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the TS617 IBM Spectrum Protect - Implementation and Administration (v8.1.6) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

TS617 IBM Spectrum Protect - Implementation and Administration (v8.1.6)
Delivered OnlineFlexible Dates
Price on Enquiry

Carpentry

By NextGen Learning

Carpentry Course Overview This Carpentry course provides a comprehensive understanding of the fundamentals of woodworking, construction techniques, and key carpentry processes. Learners will gain essential skills to build structural and decorative woodwork, such as floor systems, framing, and staircases, with a focus on precision and safety. The course equips students with a solid foundation in carpentry practices, enabling them to effectively work with various materials, tools, and building techniques. Course Description Throughout the course, learners will explore topics such as tool usage, building materials, and the essentials of carpentry, including adhesives and fasteners. Modules on framing, flooring, roof structures, and exterior installations such as windows and doors provide a well-rounded skillset. This course also covers advanced areas such as concrete construction and stair design. By the end of the course, learners will be proficient in the basics of carpentry and ready to apply their knowledge in real-world settings, having gained an in-depth understanding of construction systems and processes. Carpentry Curriculum Module 01: Introduction to Carpentry Module 02: Tool Checklist and Use Module 03: Building Materials Module 04: Adhesives and Fasteners Module 05: Floor Systems Module 06: Wall Framing Module 07: Roof Framing and Siding Module 08: Windows and Exterior Doors Module 09: Stair Construction Module 10: Concrete Construction (See full curriculum) Who is this course for? Individuals seeking to pursue a career in carpentry. Professionals aiming to develop expertise in construction and building techniques. Beginners with an interest in woodworking or construction. Those looking to enhance their knowledge in the building and construction industry. Career Path Carpenter Construction Worker Building Technician Joiner Site Supervisor Renovation Specialist

Carpentry
Delivered OnlineFlexible Dates
£7.99

BE87 IBM Effective RACF Administration

By Nexus Human

Duration 4.5 Days 27 CPD hours This course is intended for This intermediate course is for people who are new to the RACF component of the z/OS Security Server, and responsible for security administration. This includes people who are planning to implement RACF for the first time, and people who are security administrators in installations where RACF is already implemented. Those inexperienced z/OS users may find the course Basics of z/OS RACF Administration (ES19) more appropriate Overview Identify the security requirements of a system Evaluate the facilities and options of RACF Define users to RACF Set up a RACF group structure Use RACF to protect resources Select options to tailor RACF Evaluate and implement RACF database and performance options Identify tools available for auditing Administer the system so that it is consistent with the installation's security goals Be a more effective security administrator using the RACF component of the z/OS Security Server to define users, set up group structures, define general resources, protect z/OS data sets, & use several RACF utilities. Security and RACF overview . Administering groups and users . Protecting z/OS data sets . Introduction to user administration and delegation and general resources . RACF database, tables, and performance options . RACF utilities and exits . RACF options . Auditing the RACF environment . Storage management and RACF . Security for JES facilities . Security classification .

BE87 IBM Effective RACF Administration
Delivered OnlineFlexible Dates
Price on Enquiry

Information Assurance (STIG) Overview (TT8800)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The intended audience for this comprehensive course on Information Assurance and STIGs includes professionals with roles such as: IT professionals - System administrators, network engineers, and security analysts who are responsible for maintaining and securing IT infrastructure and web applications. Developers - Software engineers and web developers who design, implement, and maintain web applications, and need to integrate security best practices throughout the development process. Project teams - Cross-functional teams that collaborate on application development projects, including members from development, testing, and deployment teams. Technical leads - Senior software engineers or architects who oversee technical aspects of projects and ensure the implementation of secure design and coding practices. Project managers - Professionals responsible for planning, executing, and closing projects, ensuring that security requirements are met throughout the project lifecycle. Overview Working in an interactive learning environment, guided by our application security expert, you'll explore: The concepts and terminology behind defensive coding Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against meaningful assets The entire spectrum of threats and attacks that take place against software applications in today's world The role that static code reviews and dynamic application testing to uncover vulnerabilities in applications The vulnerabilities of programming languages as well as how to harden installations The basics of Cryptography and Encryption and where they fit in the overall security picture The requirements and best practices for program management as specified in the STIGS The processes and measures associated with the Secure Software Development (SSD) The basics of security testing and planning Understand the concepts and terminology behind defensive coding Understand Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against meaningful assets Learn the entire spectrum of threats and attacks that take place against software applications in today's world Discuss the role that static code reviews and dynamic application testing to uncover vulnerabilities in applications Understand the vulnerabilities of programming language as well as how to harden installations Understand the basics of Cryptography and Encryption and where they fit in the overall security picture Understand the fundamentals of XML Digital Signature and XML Encryption as well as how they are used within the web services arena Understand the requirements and best practices for program management as specified in the STIGS Understand the processes and measures associated with the Secure Software Development (SSD) Understand the basics of security testing and planning The Information Assurance (STIG) Overview is a comprehensive two-day course that delves into the realm of Information Assurance, empowering you to enhance your cybersecurity skills, understand the essentials of STIGs, and discover cutting-edge web application security practices. This immersive experience is tailored for IT professionals, developers, project teams, technical leads, project managers, testing/QA personnel, and other key stakeholders who seek to expand their knowledge and expertise in the evolving cybersecurity landscape. The course focuses on the intricacies of best practices for design, implementation, and deployment, inspired by the diverse and powerful STIGs, ultimately helping participants become more proficient in application security.The first half of the course covers the foundations of DISA's Security Technical Implementation Guides (STIGs) and learn the ethical approach to bug hunting, while exploring the language of cybersecurity and dissecting real-life case studies. Our expert instrtors will guide you through the importance of respecting privacy, working with bug bounty programs, and avoiding common mistakes in the field.The next half delves into the core principles of information security and application protection, as you learn how to identify and mitigate authentication failures, SQL injections, and cryptographic vulnerabilities. You?ll gain experience with STIG walkthroughs and discover the crucial steps for securing web applications.Throughout the course, you'll also explore the fundamentals of application security and development, including checklists, common practices, and secure development lifecycle (SDL) processes. You?ll learn from recent incidents and acquire actionable strategies to strengthen your project teams and IT organizations. You'll also have the opportunity to explore asset analysis and design review methodologies to ensure your organization is prepared to face future cybersecurity challenges. DISA's Security Technical Implementation Guides (STIGs) The motivations behind STIGs Requirements that the various software development roles must meet Implementing STIG requirements and guidelines Why Hunt Bugs? The Language of CyberSecurity The Changing Cybersecurity Landscape AppSec Dissection of SolarWinds The Human Perimeter Interpreting the 2021 Verizon Data Breach Investigation Report First Axiom in Web Application Security Analysis First Axiom in Addressing ALL Security Concerns Lab: Case Study in Failure Safe and Appropriate Bug Hunting/Hacking Working Ethically Respecting Privacy Bug/Defect Notification Bug Bounty Programs Bug Hunting Mistakes to Avoid Principles of Information Security Secuity Is a Lifecycle Issue Minimize Attack Surface Area Layers of Defense: Tenacious D Compartmentalize Consider All Application States Do NOT Trust the Untrusted Identification and Authentication Failures Applicable STIGs Quality and Protection of Authentication Data Proper hashing of passwords Handling Passwords on Server Side Session Management HttpOnly and Security Headers Lab: STIG Walk-Throughs Injection Applicable STIGs Injection Flaws SQL Injection Attacks Evolve Drill Down on Stored Procedures Other Forms of Server-Side Injection Minimizing Injection Flaws Client-side Injection: XSS Persistent, Reflective, and DOM-Based XSS Best Practices for Untrusted Data Lab: STIG Walk-Throughs Applications: What Next? Common Vulnerabilities and Exposures CWE/SANS Top 25 Most Dangerous SW Errors Strength Training: Project Teams/Developers Strength Training: IT Organizations Cryptographic Failures Applicable STIGs Identifying Protection Needs Evolving Privacy Considerations Options for Protecting Data Transport/Message Level Security Weak Cryptographic Processing Keys and Key Management Threats of Quantum Computing Steal Now, Crack Later Threat Lab: STIG Walk-Throughs Application Security and Development Checklists Checklist Overview, Conventions, and Best Practices Leveraging Common AppSec Practices and Control Actionable Application Security Additional Tools for the Toolbox Strength Training: Project Teams/Developers Strength Training: IT Organizations Lab: Recent Incidents SDL Overview Attack Phases: Offensive Actions and Defensive Controls Secure Software Development Processes Shifting Left Actionable Items Moving Forward Lab: Design Study Review Asset Analysis Asset Analysis Process Types of Application-Related Assets Adding Risk Escalators Discovery and Recon Design Review Asset Inventory and Design Assets, Dataflows, and Trust Boundaries Risk Escalators in Designs Risk Mitigation Options

Information Assurance (STIG) Overview (TT8800)
Delivered OnlineFlexible Dates
Price on Enquiry

AM120 - Asset Manager 9.x Software - Essentials

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Customers: Administrators, developers, web developers, and managers who are managing the Asset Manager 9.x product- Channel Partners and HP C&I Personnel: Consultants, system architects, integrators, and planners who help customers with Asset Manager 9.x implementations- HP Engineers: HP personnel who provide pre-sales and post-sales support for Asset Manager 9.x Overview At the end of the course, you should be able to:? Describe an evolutionary approach to assetmanagement? Explain the capabilities provided by AssetManager's core modules? Use the clients to navigate within Asset Manager'score tables? Create a database? Create and manage portfolio items? Reconcile software installations with softwarelicenses? Write scripts to extend Asset Manager'sfunctionality? Create queries and views to filter data? Configure Asset Manager security and controldatabase access? Import and export data using Asset Manager? Schedule automatic processes This five-day instructor-led training course is designed to provide the essential skills and knowledge needed to configure, deploy, and use Asset Manager 9.40 to successfully implement an asset management solution. This five-day instructor-led training course is designed to provide the essential skills and knowledge needed to configure, deploy, and use Asset Manager 9.40 to successfully implement an asset management solution. Additional course details: Nexus Humans AM120 - Asset Manager 9.x Software - Essentials training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AM120 - Asset Manager 9.x Software - Essentials course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

AM120 - Asset Manager 9.x Software - Essentials
Delivered OnlineFlexible Dates
Price on Enquiry

VMware vSphere: Troubleshooting [v7.0]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for System administrators System integrators Overview By the end of the course, you should be able to meet the following objectives: Introduce troubleshooting principles and procedures Practice Linux commands that aid in the troubleshooting process Use command-line interfaces, log files, and the vSphere Client to diagnose and resolve problems in the vSphere environment Explain the purpose of key vSphere log files Identify networking problems based on reported symptoms, validate and troubleshoot the reported problem, identify the root cause and implement the appropriate resolution Analyze storage failure scenarios using a logical troubleshooting methodology, identify the root cause, and apply the appropriate resolution to resolve the problem Troubleshoot vSphere cluster failure scenarios and analyze possible causes Diagnose common VMware vSphere High Availability problems and provide solutions Identify and validate VMware ESXi™ host and VMware vCenter Server problems, analyze failure scenarios, and select the correct resolution Troubleshoot virtual machine problems, including migration problems, snapshot problems, and connection problems Troubleshoot performance problems with vSphere components This five-day, hands-on training course provides you with the advanced knowledge, skills, and abilities to achieve competence in troubleshooting the VMware vSphere© 7.x environment. This workshop increases your skill and competence in using the command-line interface, VMware vSphere© Client?, log files, and other tools to analyze and solve problems Course Introduction Introductions and course logistics Course objectives Introduction to Troubleshooting Define the scope of troubleshooting Use a structured approach to solve configuration and operational problems Apply a troubleshooting methodology to logically diagnose faults and improve troubleshooting efficiency Troubleshooting Tools Use command-line tools (such as Linux commands, vSphere CLI, ESXCLI) to identify and troubleshoot vSphere problems Identify important vSphere log files and interpret the log file contents Troubleshooting Virtual Networking Analyze and resolve standard switch and distributed switch problems Analyze virtual machine connectivity problems and fix them Examine common management network connectivity problems and restore configurations Troubleshooting Storage Troubleshoot and resolve storage (iSCSI, NFS, and VMware vSphere© VMFS) connectivity and configuration problems Analyze and resolve common VM snapshot problems Identify multipathing-related problems, including common causes of permanent device loss (PDL) and all paths down (APD) events and resolve these problems Troubleshooting vSphere Clusters Identify and recover from problems related to vSphere HA Analyze and resolve VMware vSphere© vMotion© configuration and operational problems Analyze and resolve common VMware vSphere© Distributed Resource Scheduler? problems Troubleshooting Virtual Machines Identify possible causes and resolve virtual machine power-on problems Troubleshoot virtual machine connection state problems Resolve problems seen during VMware Tools? installations Troubleshooting vCenter Server and ESXi Analyze and fix problems with vCenter Server services Analyze and fix vCenter Server database problems Examine ESXi host and vCenter Server failure scenarios and resolve the problems

VMware vSphere: Troubleshooting [v7.0]
Delivered OnlineFlexible Dates
Price on Enquiry