Duration 5 Days 30 CPD hours This course is intended for The audience for this course includes enterprise-level messaging administrators on Exchange Server. IT generalists and helpdesk professionals who want to learn about Exchange Server may also take this course. Students taking this course are expected to have at least two years of experience working in the IT field-typically in the areas of Windows Server administration, network administration, helpdesk, or system administration. They are also expected to have some experience with Exchange Server concepts but previous experience managing Exchange Server is not a requirement. Overview After completing this course, students will be able to: Deploy Exchange Server. Plan and configure storage for Exchange Server. Create and manage various recipient objects in Exchange Server. Perform recipient management and Exchange server management tasks by using Exchange Server cmdlets. Deploy Client Access services in Exchange Server. Manage high availability in Exchange Server. Implement disaster recovery for Exchange Server. Configure and manage message transport in Exchange Server. Configure message security in Exchange Server. Monitor and troubleshoot Exchange Server. Configure Exchange Server role-based access control permissions and configure audit logging for both administrators and users. Implement and manage integration with Exchange Online. This course teaches IT professionals how to administer and support Exchange Server. The course covers how install and configure Exchange Server. It also covers how to manage mail recipients and public folders, including how to perform bulk operations by using Exchange Management Shell. In addition, the course covers how to manage client connectivity, message transport and hygiene, and highly available Exchange Server deployments. It also covers how to implement disaster recovery solutions. Finally, the course covers how to maintain and monitor an Exchange Server deployment and how to administer Exchange Online in a Office 365 deployment. Deploying Microsoft Exchange Server 2016 Overview of Exchange Server Exchange Server architecture Requirements for Exchange Server Deploying Exchange Server Exchange Server Exchange Server Management Tools Lab : Deploying Exchange Server Managing Exchange Server 2016 storage Exchange Server mailbox databases Exchange Server storage Configuring Exchange Server mailbox databases and storage Lab : Configuring Exchange Server storage Managing recipient objects Managing user mailboxes Managing other types of mailboxes Managing other recipients objects Configuring policies and address lists Lab : Managing recipient objects Lab : Configuring address lists and policies Managing recipients and Exchange servers by using Exchange Server cmdlets Overview of the Exchange Management Shell Managing Exchange Servers by using Exchange Management Shell cmdlets Managing Exchange servers by using scripts Lab : Managing Exchange Server and recipient objects by using Exchange Management Shell Implementing client connectivity Configuring client access services Managing client access services Client connectivity in Exchange Server Configuring Outlook on the web Configuring mobile messaging Lab : Configuring client access services Lab : Deploying and configuring client access services on Exchange Server Managing high availability in Exchange Server High availability on Exchange Server Configuring highly available mailbox databases Configuring high availability of Client Access services Lab : Implementing DAGs Lab : Implementing and testing high availability Implementing disaster recovery for Exchange Server Implementing Exchange Server backup Implementing Exchange Server recovery Lab : Backing up Exchange Server data Lab : Restoring Exchange Server data Configuring and managing message transport Overview of message transport Configuring message transport Managing transport rules Lab : Configuring and managing message transport Configuring message security Deploying and managing an Edge Transport server for message security Implementing an antivirus solution for Exchange Server Implementing an antispam solution for Exchange Server Lab : Configuring message security in Exchange Server Monitoring and troubleshooting Exchange Server Monitoring Exchange Server Troubleshooting Exchange Server Lab : Monitoring and troubleshooting Exchange Server Securing and maintaining Exchange Server Securing Exchange Server by using RBAC Configuring audit logging in Exchange Server Maintaining Exchange Server Lab : Securing and maintaining Exchange Server Implementing and managing Exchange Online deployments Overview of Exchange Online and Office 365 Managing Exchange Online Implementing the migration to Exchange Online Managing a hybrid environment Lab : Managing Exchange Online Additional course details: Nexus Humans 20345-1 Administering Microsoft Exchange Server 2016/2019 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the 20345-1 Administering Microsoft Exchange Server 2016/2019 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Register on the Ethereum Blockchain DApp using Solidity today and build the experience, skills and knowledge you need to enhance your professional development and work towards your dream job. Study this course through online learning and take the first steps towards a long-term career. The course consists of a number of easy to digest, in-depth modules, designed to provide you with a detailed, expert level of knowledge. Learn through a mixture of instructional video lessons and online study materials. Receive online tutor support as you study the course, to ensure you are supported every step of the way. Get an e-certificate as proof of your course completion. The Ethereum Blockchain DApp using Solidity is incredibly great value and allows you to study at your own pace. Access the course modules from any internet-enabled device, including computers, tablet, and smartphones. The course is designed to increase your employability and equip you with everything you need to be a success. Enrol on the now and start learning instantly! What You Get With The Ethereum Blockchain DApp using Solidity Receive a e-certificate upon successful completion of the course Get taught by experienced, professional instructors Study at a time and pace that suits your learning style Get instant feedback on assessments 24/7 help and advice via email or live chat Get full tutor support on weekdays (Monday to Friday) Course Design The course is delivered through our online learning platform, accessible through any internet-connected device. There are no formal deadlines or teaching schedules, meaning you are free to study the course at your own pace. You are taught through a combination of Video lessons Online study materials Certification Upon successful completion of the course, you will be able to obtain your course completion e-certificate free of cost. Print copy by post is also available at an additional cost of £9.99 and PDF Certificate at £4.99. Who Is This Course For: The course is ideal for those who already work in this sector or are an aspiring professional. This course is designed to enhance your expertise and boost your CV. Learn key skills and gain a professional qualification to prove your newly-acquired knowledge. Requirements: The online training is open to all students and has no formal entry requirements. To study the Ethereum Blockchain DApp using Solidity, all your need is a passion for learning, a good understanding of English, numeracy, and IT skills. You must also be over the age of 16. Course Content Section 01: What is Blockchain? Introduction to Building an Ethereum Blockchain App 00:02:00 The Beginning of Blockchain 00:05:00 Currency and Cryptocurrency 00:05:00 Why Use the Blockchain? 00:06:00 Blockchain Data and Blocks 00:06:00 Blockchain Immutability 00:03:00 Blockchain Consensus 00:02:00 Building the Blockchain Story 00:03:00 Hashes 00:06:00 What is a Chain of Blocks? 00:04:00 Finding the Nonce 00:05:00 Blockchain Mining 00:03:00 Arriving at Consensus 00:05:00 Public vs. Private Blockchains 00:03:00 Distributed Processing and Blockchain Solutions 00:06:00 Section 02: What is Ethereum? Introduction to Ethereum 00:03:00 Ethereum in Financial Services 00:07:00 Ethereum in Digital Identity Management 00:05:00 Ethereum in Industry Applications 00:06:00 Ethereum in Government 00:03:00 Ethereum Smart Contracts 00:03:00 Ether and the Initial Coin Offering (ICO) 00:06:00 Decentralized Autonomous Organization (DAO) 00:03:00 The Ethereum Ecosystem 00:06:00 Building Blockchain Apps 00:05:00 Section 03: The Ethereum Ecosystem & the Development Lifecycle Parts of the Ethereum Blockchain 00:11:00 Smart Contracts 00:05:00 Smart Contract Languages 00:04:00 What are Virtual Machines? 00:06:00 The Ethereum Virtual Machine (EVM) 00:03:00 Fueling Your Code with Gas 00:05:00 Tools for Ethereum SDLC 00:03:00 Blockchain Client 00:03:00 Writing and Testing Your Code, Part 1 00:05:00 Writing and Testing Your Code, Part 2 00:07:00 Section 04: Ethereum Development Tools Your Ethereum Development Toolbox 00:04:00 Installing Geth Lab (CLI Blockchain Client) 00:04:00 Installing Ganache Lab (Test Blockchain) 00:06:00 Installing Truffle Lab (Development Environment and Testing Framework) 00:06:00 Installing Microsoft Visual Studio Code Lab (IDE) 00:05:00 Section 05: Your Ethereum Wallet What is an Ethereum Wallet? 00:02:00 Types of Ethereum Wallets 00:06:00 Web and Desktop Wallets 00:07:00 Mobile, Hardware, and Paper Wallets 00:09:00 Installing MetaMask 00:05:00 Section 06: Building Your First Ethereum App Preparing Your First Truffle Project 00:07:00 Writing a Simple Smart Contract 00:11:00 Compiling Your Simple Smart Contract 00:10:00 Deploying Code and Invoking Functions 00:09:00 Section 07: Learning about Smart Contracts Smart Contracts Review 00:03:00 What is Supply Chain? 00:07:00 Supply Chain Challenges and Blockchain Solutions 00:07:00 Blockchain Solution Examples 00:04:00 Ethereum Tokens 00:06:00 Your Supply Chain Project 00:08:00 Exploring Solidity 00:11:00 Defining Types of Data 00:05:00 Data Types Lab 00:09:00 Solidity Data Modifiers, Part 1 00:04:00 Solidity Data Modifiers, Part 2 00:06:00 Revisiting Gas 00:06:00 Controlling Flow 00:12:00 Handling Errors 00:05:00 Section 08: Your Supply Chain Smart Contract dApp Designing Your Supply Chain App 00:04:00 What are dApps? 00:06:00 Token Smart Contract Details 00:08:00 Supply Chain Smart Contract Details 00:06:00 Smart Contract Road Map 00:02:00 Token Smart Contract Data Lab, Part 1 00:07:00 Token Smart Contract Data Lab, Part 2 00:09:00 Supply Chain Smart Contract Data Lab, Part 1 00:05:00 Supply Chain Smart Contract Data Lab, Part 2 00:03:00 Token Smart Contract Functions Lab, Part 1 00:05:00 Token Smart Contract Functions Lab, Part 2 00:04:00 Supply Chain Smart Contract Functions Lab, Part 1 00:10:00 Supply Chain Smart Contract Functions Lab, Part 2 00:09:00 Using Events 00:07:00 Implementing Events 00:05:00 More on Ownership 00:08:00 Designing for Security 00:09:00 Implementing Minimal Functionality 00:06:00 Section 09: Testing Ethereum Apps Blockchain dApp Testing 00:10:00 Deploying Your dApp to a Test Blockchain Lab 00:08:00 Writing Tests for Ethereum dApps 00:06:00 Command-Line Testing Lab, Part 1 00:04:00 Command-Line Testing Lab, Part 2 00:11:00 Command-Line Testing Lab, Part 3 00:03:00 JavaScript Testing 00:08:00 Logging and Handling Errors 00:07:00 Logging Activity in Smart Contracts 00:05:00 Fixing Bugs in a dApp 00:05:00 Section 10: Deploying and Maintaining Ethereum Apps Test Blockchains 00:08:00 The Live Blockchain (Mainnet) 00:05:00 Connecting to Multiple Blockchains and Infura Lab 00:05:00 Configuring Truffle and Infura Lab 00:06:00 Funding Your Account Lab 00:04:00 Deploying to the Live Blockchain 00:08:00 Section 11: Integrating Non-Blockchain Apps with Ethereum Blockchain and Database Storage 00:11:00 Execution and Flow in dApps and Traditional Applications 00:05:00 Blockchain Incorporation Design Goals 00:06:00 Integration Considerations for Incorporating Blockchain 00:06:00 Interface Considerations for Incorporating Blockchain 00:04:00 Resources Resources - Ethereum Blockchain DApp Using Solidity 00:00:00
Join the comprehensive Security Guard, CCTV, and Door Supervision course to gain essential skills and knowledge for a successful career in the security industry. Learn security risk analysis, crisis response, CCTV monitoring, and conflict management to ensure safety and compliance. Suitable for aspiring security professionals and those seeking advanced training.
Description A private cloud involves a distinct and secure cloud-based environment where only the specified client can operate the system. With the knowledge of Private Cloud, you can able to work efficiently to deploy, use, and manage VMs, applications, and other IT resources on hardware to your organization. If you want to gain mastery over cloud computing, the course is for you. The course is divided into two parts that deals with the two certifications of MCSE: Exam 70-246 and Exam 70- 247. In the Exam 70-246, you will know the basics of the cloud, cloud services, monitoring and automating responses while in the Exam 70-247 part, you will learn how to work with the cloud. In short, at first, you will learn the basic cloud concept, then you will know how to use the cloud system. Assessment: At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not. Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. Certification: After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. Who is this Course for? Private Cloud with System Center 2012 R2 - Complete Video Training is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. Requirements Our Private Cloud with System Center 2012 R2 - Complete Video Training is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. System Center 2012 What is System Center 2012 FREE 00:30:00 Introducing the Cloud Discussion of Cloud Computing 00:19:00 Important Requirements 00:07:00 Working with System Center and the Infrastructure 00:05:00 Maintaining the Cloud Health 00:05:00 How Components are Integrated 00:06:00 Are You in Compliance 00:05:00 Working with the Business Cloud Examining SC 2012 VMM 00:17:00 Working with VMs with the VMM 00:11:00 Creating Clouds for Business 00:16:00 Cloud Services Looking at Service Templates and VMM Profiles 00:22:00 Web Deploy Packages 00:08:00 Server App V Introduction 00:05:00 The Data of the N Tier Application 00:05:00 What's New with VMM R2 00:07:00 Monitoring Overview of Operations Manager 00:20:00 Customize the Monitoring Operations 00:09:00 Monitoring Application Performance 00:14:00 Advanced Monitoring 00:04:00 Using Operations Manager for Applications 00:04:00 Using Operations Manager for the Network 00:11:00 Using Operations Manager for Distributed Applications 00:07:00 What's New in Operations Manager 2012 R2 00:09:00 Automating Responses Looking at Orchestrator 2012 00:08:00 Putting Orchestrator, Operations Manager, and Service Manager Together 00:15:00 What's New with Orchestrator 2012 R2 00:04:00 Managing Problems in the Private Cloud What is Problem Management 00:07:00 Using Custom Rules 00:08:00 Service Management in the Private Cloud Service Manager Introduction 00:10:00 Security Settings 00:09:00 Work Items 00:08:00 Incident Queues and Service Offerings 00:03:00 What's New with Service Manager 2012 R2 00:01:00 Cloud Protection, Recovery, and Compliance Protecting and Recovering Data for the Private Cloud 00:29:00 Overview of the Process Pack for IT GRC 00:14:00 Installing the Process Pack for IT GRC 00:06:00 Implementing an IT GRC Control Management Program 00:06:00 How to Maintain Compliance Through VMM Security Baselines with System Center 00:06:00 What's New with DPM 2012 R2 Advisor 00:03:00 SLAs, Dashboards and Widgets Configuring and Deploying Widgets and Dashboards 00:12:00 Real-Time State Using Visio 00:10:00 System Center Analytics 00:12:00 Service Level Tracking 00:05:00 Viewing SSRS and Excel to View Data 00:04:00 PerformancePoint 00:04:00 Cleaning Up System Center Databases Service Manager Groom Settings 00:08:00 View and Purge Orchestrator Runbook Logs 00:08:00 Understanding the Private Cloud Understanding the Private Cloud FREE 00:09:00 Preparing to Deploy the Cloud 00:06:00 Components of the Private Cloud 00:13:00 System Center 2012 Components 00:13:00 Using Hyper-V with VMM 00:07:00 Using VMM to Deploy the Cloud VMM Architecture 00:16:00 Install and_or Upgrade VMM 00:08:00 Host Groups 00:13:00 Understanding Security 00:06:00 Whats New with VMM R2 00:10:00 Working With the Private Cloud Infrastructure PXE and Update Servers 00:08:00 Bare Metal Hyper-V Host Servers 00:06:00 Configuring the Update Server Role 00:08:00 The Update Baseline 00:10:00 Virtual Applications Dynamic Application Deployment 00:10:00 Server Application Virtualization Overview 00:16:00 Configuring Server App-V Components 00:05:00 Sequencing and Deploying Virtual Apps 00:08:00 Components of the Private Cloud SQL Server Profiles 00:08:00 OS Profiles 00:05:00 Application Profiles 00:04:00 Hardware Profiles 00:07:00 VM Templates 00:05:00 Self-Service User Role 00:10:00 A First Business Unit Cloud What is Private Cloud Computing 00:08:00 Installing and Configuring App Controller 00:05:00 Creating and Managing Services and Service Templates 00:11:00 Changes with App Controller 2012 R2 00:01:00 Private Cloud Infrastructure Operations Manager Components 00:25:00 Upgrading 00:10:00 Notifications 00:07:00 Management Packs 00:15:00 Putting It All Together 00:06:00 What's New in Operations Manager 2012 R2 00:09:00 Monitoring the Private Cloud Using SharePoint 00:04:00 Templates for Monitoring 00:23:00 Watching a Distributed App 00:07:00 Service Management for the Cloud What is Service Manager 00:15:00 Understanding Work Items 00:19:00 Connectors 00:08:00 Notifications 00:03:00 Private Cloud Service Catalog Private Cloud Service Catalog 00:10:00 Service Level Management 00:03:00 Automation in the Private Cloud Planning DPM Deployment 00:11:00 DPM Technologies 00:07:00 Upgrading DPM 00:03:00 Configuring DPM for the Private Cloud 00:13:00 Configuring Application Protection for the Private Cloud 00:11:00 What's New with DPM 2012 R2 00:03:00 Security for the Cloud Orchestrator Architecture 00:08:00 Deployment and Configuration of Orchestrator 00:07:00 Using Runbooks 00:07:00 Using Integration Packs 00:17:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00
Duration 4.875 Days 29.25 CPD hours This course is intended for VMware vSphere: Install, Configure, Manage features intensive hands-on training that focuses on installing, configuring, and managing VMware vSphere. This course prepares you to administer a vSphere infrastructure for an organization of any size and forms the foundation for most otherVMware technologies in the software-defined data center. Overview Describe the software-defined data center (SDDC) Explain the vSphere components and their function in the infrastructure Describe the benefits and capabilities of VMware Skyline Install and configure ESXi hosts Deploy and configure VMware vCenter Server Appliance⢠Use VMware vSphere Client⢠to manage the vCenter Server inventory and the vCenter Server configuration Manage, monitor, back up, and protect vCenter Server Appliance Create virtual networks with vSphere standard switches Describe the storage technologies supported by vSphere Configure virtual storage using iSCSI and NFS storage Create and manage VMware vSphere VMFS datastores Use the vSphere Client to create virtual machines, templates, clones, and snapshots Create a content library and deploy virtual machines from templates in the library Manage virtual machine resource use Migrate virtual machines with VMware vSphere vMotion and VMware vSphere Storage vMotion Create and manage a vSphere cluster that is enabled with VMware vSphere High Availability and VMware vSphere Distributed Resource Scheduler ⢠Discuss solutions for managing the vSphere life cycle Use VMware vSphere Lifecycle Manager⢠to perform upgrades to ESXi hosts and virtual machines This is an official VMware IT Academy course with official courseware and labs. Course introduction Introductions and course logistics Course objectives Introduction to vSphere and the Software-Defined Data Center Explain basic virtualization concepts Describe how vSphere fits into the software-defined data center and the cloud infrastructure Explain how vSphere interacts with CPUs, memory, networks, and storage Recognize the user interfaces for accessing the vCenter Server system and ESXi hosts Describe the ESXi host architecture Navigate the Direct Console User Interface (DCUI) to configure an ESXi host Recognize ESXi host user account best practices Install an ESXi host Use VMware Host Client? to configure ESXi host settings Describe how to proactively manage your vSphere environment using VMware Skyline Virtual Machines Create and provision a virtual machine Explain the importance of VMware Tools? Install VMware Tools Identify the files that make up a VM Recognize the components of a VM Recognize virtual devices supported by a VM Describe the benefits and use cases for containers Identify the parts of a container system vCenter Server Describe the vCenter Server architecture Discuss how ESXi hosts communicate with vCenter Server Deploy and configure vCenter Server Appliance Use vSphere Client to manage the vCenter Server inventory Add data center, organizational objects, and hosts to vCenter Server Use roles and permissions to enable users to access objects in the vCenter Server inventory Back up vCenter Server Appliance Monitor vCenter Server tasks, events, and appliance health Use VMware vCenter Server© High Availability to protect a vCenter Server Appliance Configuring and Managing Virtual Networks Create and manage standard switches Describe the virtual switch connection types Configure virtual switch security, traffic-shaping, and load-balancing policies Compare vSphere distributed switches and standard switches Configuring and Managing Virtual Storage Identify storage protocols and storage device types Discuss ESXi hosts using iSCSI, NFS, and Fibre Channel storage Create and manage VMFS and NFS datastores Explain how multipathing works with iSCSI, NFS, and Fibre Channel storage Recognize the components of a VMware vSAN? configuration Virtual Machine Management Use templates and cloning to deploy new virtual machines Modify and manage virtual machines Create a content library and deploy virtual machines from templates in the library Use customization specification files to customize a new virtual machine Perform vSphere vMotion and vSphere Storage vMotion migrations Describe the Enhanced vMotion Compatibility feature Create and manage virtual machine snapshots Examine the features and functions of VMware vSphere© Replication? Describe the benefits of VMware vSphere© Storage APIs ? Data Protection Resource Management and Monitoring Discuss CPU and memory concepts in a virtualized environment Describe what overcommitment of a resource means Describe methods for optimizing CPU and memory usage Use various tools to monitor resource use Create and use alarms to report certain conditions or events vSphere Clusters Describe the functions of a vSphere DRS cluster Create a vSphere DRS cluster Monitor a vSphere cluster configuration Describe options for making a vSphere environment highly available Explain the vSphere HA architecture Configure and manage a vSphere HA cluster Examine the features and functions of VMware vSphere© Fault Tolerance Describe the function of the vSphere© Cluster Service vSphere Lifecycle Management Recognize the importance of vCenter Server Update Planner Describe how VMware vSphere© Lifecycle Manager? works Describe how to update ESXi hosts using baselines Validate ESXi host compliance using a cluster image Describe how to upgrade VMware Tools and VM hardware Describe VMware vSphere© Lifecycle Manager? and VMware vSAN? integration
Duration 1 Days 6 CPD hours This course is intended for This course is designed for a non-technical audience and doesn't require any prior coding or technical experience. The handson exercises will be done using pre-built OpenAI tools and interfaces that are user-friendly and easy to use. Overview Working in an interactive learning environment, led by our engaging expert, you will: Get comfortable with the basics of prompt engineering and discover how it can make a difference in various business tasks, such as enhancing customer support, creating content, and fine-tuning sales pitches. Develop the knack for crafting, refining, and perfecting prompts suited to specific business situations by understanding context, user intent, and what makes a prompt great. Learn how to smoothly incorporate prompt engineering solutions into your existing business workflows, including pinpointing the right processes, integrating with your current software, and keeping data privacy and security in check. Become proficient in advanced techniques and best practices in prompt engineering, like making use of APIs, customizing language models, and collaborating with your teammates across different departments. Keep up with the latest developments in prompt engineering and be ready to adapt to changing business needs and trends, ensuring that you stay relevant and continue to grow in the dynamic business world. Prompt engineering is the process of designing and refining input prompts to get desired output from advanced language models, such as OpenAI Codex or GPT-4. It involves creating effective questions or statements that guide the AI model to generate useful responses for a specific task or purpose, like enhancing customer support, generating content, and fine-tuning sales pitches, making it an essential skill set for a wide range of business applications. Quick Start to Prompt Engineering for Everyday Business Users is a one-day, workshop style hands-on course that where you'll learn how to create effective prompts, integrate prompt engineering solutions into existing workflows, and uncover advanced techniques and best practices. Guided by our engaging, expert instructor, you?ll experiment with innovative tools and develop practical skills that can be immediately applied to a variety of projects. Whether you're aiming to enhance customer interactions, simplify content creation, or refine internal communication, this immersive learning experience will equip you with the knowledge to make a meaningful impact on your organization. Introduction to Prompt Engineering Understand the fundamentals of prompt engineering and its applications in the business world. What is prompt engineering? Importance of prompt engineering in business Key concepts and terminology Examples of prompt engineering in business scenarios Overview of popular prompt engineering tools (e.g., OpenAI Codex, GPT-4) Activity: Hands-on exploration of prompt engineering tools: Participants will engage in a fun scavenger hunt activity, where they will experiment with different prompt engineering tools to answer a set of questions. Developing Effective Prompts Learn how to create and refine prompts for a variety of business applications. Anatomy of a good prompt Understanding context and user intent Techniques for prompt iteration and optimization Generating specific and creative responses Handling sensitive information and biases Activity: Prompt development workshop: Participants will practice developing and refining prompts in a collaborative, game-like environment, where they will compete to create the most effective prompts for given business scenarios. Integrating Prompt Engineering into Business Processes Discover how to incorporate prompt engineering solutions into existing workflows. Identifying business processes that can benefit from prompt engineering Integrating prompt engineering with existing software and tools Evaluating the success and impact of prompt engineering solutions Ensuring data privacy and security Scaling prompt engineering solutions across an organization Activity: Business process integration simulation: Participants will work in teams to create a plan for integrating a prompt engineering solution into a simulated business process, with a focus on creativity and practicality. Advanced Techniques and Best Practices Gain insights into advanced techniques and best practices for prompt engineering in a business context. Leveraging APIs for prompt engineering Customizing and fine-tuning language models Adapting to changing business requirements and trends Collaborating with cross-functional teams Staying up-to-date with prompt engineering advancements Activity: Advanced prompt engineering challenge: Participants will take part in a friendly competition, using advanced techniques to solve complex business-related prompt engineering challenges. Additional course details: Nexus Humans QuickStart to Prompt Engineering for Everyday Business Users (TTAI2009) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the QuickStart to Prompt Engineering for Everyday Business Users (TTAI2009) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Explore the world of Remote Sensing Technology with our comprehensive course on applications and analysis. Gain insights into the electromagnetic spectrum, platforms, and sensors, and master image interpretation and data analysis techniques. Discover real-world applications in the UK and unlock future trends shaping this dynamic field. Elevate your skills in environmental monitoring, GIS, and cutting-edge technology. Join us on a journey through the skies and harness the power of Remote Sensing for diverse scientific and industrial applications. Enroll now for a transformative learning experience!
Explore our Resuscitation Course: Basic Life Support Skills, a comprehensive training program for healthcare professionals and first responders. Gain hands-on experience in CPR, defibrillation, ACLS, and more. Enhance your emergency response capabilities and contribute to the chain of survival. Enroll now for essential life-saving skills and join a community dedicated to preparedness and effective healthcare interventions.
Duration 5 Days 30 CPD hours Overview By the end of the course, you should be able to meet the following objectives: List the operational challenges for rolling out and operating telco services including 5G. Identify the role of VMware Telco Cloud products in supporting telco services. Discuss the role of VMware technologies such as vSphere, NSX, and Tanzu etc. in implementing telco services. Outline the role of native tools and other VMware monitoring tools such as vRealize Operations and vRealize Log Insight in maintaining network services. Choose the VMware Telco Cloud products that meet your application requirements. Deploy a solution architecture that meet VMware best practices for delivering services using VMware Telco Cloud products. Implement and maintain VMware Telco Cloud products in a secure manner. Identify the tools and remediation pathways for maintaining the availability and performance of your applications and infrastructure using VMware Telco Cloud and vRealize Suite products. Follow specific steps to resolve application performance and availability problems Scale your VMware Telco Cloud products to meet operational requirements in line with VMware best practices. Optimize the operation of VMware Telco Cloud products to ensure SLAs are met. This five-day, hands-on training course provides the knowledge to operate and scale VMware Telco Cloud version 2.x products in a Telco cloud provider environment. In this course, you are exposed to the entire VMware Telco Cloud portfolio, and the tools and methodologies available to ensure they operate effectively. In addition, you are presented with various scenarios where you will be guided through the process of identifying, analyzing, and formulating solutions to performance and other problems. Course Introduction Introductions and course logistics Course objectives Overview of Network Transformation Reviews the technologies that enable modern networks Lists the components of modern service provider networks Outlines characteristics of modern service provider networks in meeting customer application needs Service Delivery with VMware Telco Cloud Outlines the components of the VMware Telco Cloud portfolio Reviews the role each VMware Telco Cloud product plays in delivering telco services Specifies the dependencies each product has on underlying technologies Supporting VMware Telco Cloud Service Delivery Reviews the products that implements the virtualization, management, platform, and orchestration layers Outlines the role played by other VMware products such as NSX in delivering cloud services Outline opensource integration options with VMware Telco Cloud products Securing VMware Telco Cloud Reviews security threats that affect telco services Identifies the critical telco assets that are prone to attack Outlines best practice for securing VMware Telco Cloud products and underlying technology Provides overview of appropriate security controls for VMware Telco Cloud products Assessing Service Provision Reviews tools and methodologies used to gather requirements Outlines how to assess cloud-native capabilities Documenting findings Identifying security vulnerabilities with Helm. Reviews VMware?s Customer Engagement process Capturing infrastructure requirements from TCA Designing a VMware Telco Cloud Solution Selecting appropriate deployment topology Pros and cons of design choices How a design choice might be affected by other factors such as NSX and TKG deployment, or data center architecture Outlines typical scenarios where specific products align with identified requirements Documenting a design Designing for availability Ensuring a design aligns with best practice Specifying monitoring options Implementing VMware Telco Cloud Products Review deployment options for VMware products Integrating new products with existing ones Outline post-installation tasks Adding the new products as data sources in monitoring tools such as vRealize Operations and vRealize Operations Network Insight Ensuring products meet security requirements Configuring monitoring software Outlines the xNF onboarding process in TCA Maintaining Telco Services Outlines typical administrative tasks in ensuring services are maintained Use of native and other VMware performance monitoring tools Reviewing performance data Role of SLAs in service maintenance Reviews scenarios where known behaviors indicate problems Troubleshooting Deployed Telco Services Reviews the troubleshooting tools available Using tools to gather useful data Outlines how event correlation can be used to isolate problems Using a methodology to determine the root cause of a problem Steps to identify and resolve a problem Reviews scenarios where known problems are isolated and resolution steps identified Scaling VMware Telco Cloud Products Assessing if operations are impacted by lack of resources now or will be in the future Reviews performance optimization options Identifies implications for other products if you scale VMware Telco Cloud products Reviews VMware sizing guidelines Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Telco Cloud: Day 2 Operate and Scale [V2.x] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Telco Cloud: Day 2 Operate and Scale [V2.x] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for vSphere administrators, architects, system engineers, and systems integrators who are responsible for the deployment or management of Site Recovery Manager Overview By the end of the course, you should be able to meet the following objectives: Summarize the components of Site Recovery Manager architecture Deploy and configure the Site Recovery Manager appliance Describe the principal disaster recovery topologies that are used with Site Recovery Manager Configure inventory and resource mappings Describe the storage replication options that are used with Site Recovery Manager Configure Site Recovery Manager to leverage array-based replication Describe VMware vSphere Replication⢠functionality Describe the vSphere Replication architecture Deploy and configure vSphere Replication for use with Site Recovery Manager Build Site Recovery Manager array-based protection groups, protection groups based on vSphere Replication, and Virtual Volumes protection groups. Build, edit, execute, test, and remove a recovery plan Perform a planned migration This two-day, hands-on training course gives experienced VMware vSphere© administrators the knowledge to install, configure, and manage VMware Site Recovery Manager? 8.6. This course also shows you how to write and test disaster recovery plans that use Site Recovery Manager. Course Introduction Introductions and course logistics Course objectives Site Recovery Manager Architecture Describe Site Recovery Manager architecture Identify disaster recovery options with Site Recovery Manager Evaluate how Site Recovery Manager integrates with VMware products Describe Site Recovery Manager licensing options List the disaster recovery topologies supported by Site Recovery Manager Describe how VMware Site Recovery for VMware Cloud on AWS integrates with Site Recovery Manager Deploying and Configuring Site Recovery Manager Identify the vSphere and vCenter Server requirements for deploying Site Recovery Manager Define Site Recovery Manager virtual appliance system requirements Deploy the Site Recovery Manager appliance Navigate the Site Recovery Manager configuration UI Describe the process for registering Site Recovery Manager with vCenter Server Describe how to start and stop services in Site Recovery Manager Identify ways to perform updates to the Site Recovery Manager appliance Describe the options for accessing the Site Recovery Manager Describe the process for configuring site pairing Describe how to import and export Site Recovery Manager configuration Navigate the Site Recovery Manager configuration UI Describe the process for registering Site Recovery Manager with vCenter Server Describe how to start and stop services in Site Recovery Manager Identify ways to perform updates to the Site Recovery Manager appliance Describe the options for accessing the Site Recovery Manager Describe the process for configuring site pairing Describe how to import and export Site Recovery Manager configuration Configuring Inventory Mappings Explain the importance of inventory mappings Identify configuration options for inventory mappings Describe the importance of placeholder virtual machines and datastores Describe the importance of the vSphere inventory changes for Site Recovery Manager operation Using Array-Based Replication Describe array-based replication Describe Storage Replication Adapters and explain their role for the array-based replication Describe the concept and configuration of array pairs Describe datastore groups and the relationship between devices and datastore groups Describe the role of consistency groups Identify the advantages of array-based replication vSphere Replication Describe Site Recovery Manager with vSphere Replication Architecture Discuss the role of vSphere Replication components Discuss use cases for vSphere Replication Discuss system requirements and operational limits of vSphere Replication Determine how to calculate bandwidth requirements for vSphere Replication Identify the advantages of vSphere Replication Deploy a vSphere Replication appliance Configure a vSphere Replication appliance and register it with vCenter Server Pair vSphere Replication appliances Deploy an additional vSphere Replication server Register a vSphere Replication server with a vSphere Replication management server Replicating VMs Using vSphere Replication Describe the replication process used by vSphere Replication List vSphere Replication replica states Describe vSphere Replication of encrypted virtual machines Describe vSphere native key provider Describe how to configure vSphere Replication Discuss vSphere Replication RPO settings Describe MPIT instances Describe additional vSphere Replication settings Describe how to disable vSphere Replication Protection Groups Define protection group functionality Examine the differences between array-based protection groups, protection groups based on vSphere Replication, and Virtual Volumes protection groups Create a protection group View a placeholder virtual machine in the inventory Configure protection for virtual machines and edit protection groups Recovery Plans Discuss recovery plan concepts Discuss network planning Discuss the organization of storage for recovery plans Describe customization options in recovery planning Describe priority groups and VM dependencies Describe how to implement a recovery plan Configure VM recovery plan properties Describe the customization of recovery plans Configure additional steps in the recovery plan Delete a recovery plan Executing Recovery Plans Discuss use cases for Site Recovery Manager Describe planned migration Identify Site Recovery Manager workflows Examine Site Recovery Manager integration with various vSphere technologies Describe how to conduct a recovery plan test Perform a recovery plan test Identify the effect on the storage layer during the test recovery steps Review the recovery plan test steps Describe how to cancel a recovery plan test and clean up after recovery plan test cancelation Explain a recovery plan execution in planned migration or disaster recovery mode Identify the recovery steps for each execution type Describe a forced recovery Explain the importance of reprotection processes and states Examine failback steps Describe how to reprotect a data center Monitoring and Troubleshooting Identify Site Recovery Manager alarm options Generate Site Recovery Manager recovery plan history reports Configure Site Recovery Manager advanced settings Identify Site Recovery Manager logs Describe the vRealize Operations management pack for Site Recovery Manager