Duration 3 Days 18 CPD hours This course is intended for This course benefits individuals responsible for configuring and monitoring devices running the Junos OS. Overview Describe the value of MPLS VPNs. Describe the differences between provider-provisioned VPNs and customer-provisioned VPNs. Describe the differences between Layer 2 VPNs and Layer 3 VPNs. List the provider-provisioned MPLS VPN features supported by the JUNOS software. Describe the roles of a CE device, PE router, and P router in a BGP Layer 3 VPN. Describe the format of the BGP routing information, including VPN-IPv4 addresses and route distinguishers. Describe the propagation of VPN routing information within an AS. List the BGP design constraints to enable Layer 3 VPNs within a provider network. Explain the operation of the Layer 3 VPN data plane within a provider network. Create a routing instance, assign interfaces to a routing instance, create routes in a routing instance, and import/export routes from a routing instance using route distinguishers/route targets. Describe the purpose of BGP extended communities, configure extended BGP extended communities, and use BGP extended communities. List the steps necessary for proper operation of a PE-CE dynamic routing protocol. List the troubleshooting and monitoring techniques for routing instances. Explain the difference between the bgp.l3vpn table and the inet.0 table of a routing instance. Monitor the operation of a CE-PE dynamic routing protocol. Explain the operation of a PE mulit-access interface in a Layer 3 VPN and list commands to modify that behavior. Describe ways to support communication between sites attached to a common PE router. Provision and troubleshoot hub-and-spoke Layer 3 VPNs, Describe the flow of control traffic and data traffic in a hub-and-spoke Layer 3 VPN. Describe QoS mechanisms available in L3VPNs. Configure L3VPN over GRE tunnels. Describe the RFC 4364 VPN options. Describe the carrier-of-carriers model. Configure the carrier-of-carriers and ''Option C'' configuration. Describe the flow of control and data traffic in a draft-rosen multicast VPN. Describe the configuration steps for establishing a draft-rosen multicast VPN. Monitor and verify the operation of draft-rosen multicast VPNs. Describe the flow of control traffic and data traffic in a next-generation multicast VPN. Describe the configuration steps for establishing a next-generation multicast VPN. Describe the configuration steps for establishing a next-generation multicast VPN. Monitor and verify the operation of next-generation multicast VPNs. This three-day course is designed to provide students with MPLS-based Layer 3 virtual private network (VPN) knowledge and configuration examples. Chapter 1: Course Introduction Course Introduction Chapter 2: MPLS VPNs MPLS VPNs Provider-Provisioned VPNs Chapter 3: Layer 3 VPNs Layer 3 VPN Terminology VPN-IPv4 Address Structure Operational Characteristics Chapter 4: Basic Layer 3 VPN Configuration Preliminary Steps PE Router Configuration Lab: Layer 3 VPN with Static and BGP Routing Chapter 5: Layer 3 VPN Scaling and Internet Access Scaling Layer 3 VPNs Public Internet Access Options Lab: LDP over RSVP Tunnels and Public Internet Access Chapter 6: Layer 3 VPNs ? Advanced Topics Exchanging Routes between Routing Instances Hub-and-Spoke Topologies Layer 3 VPN CoS Options Layer 3 VPN and GRE Tunneling Integration Layer 3 VPN and IPSec Integration Layer 3 VPN Egress Protection BGP prefix-independent convergence (PIC) edge for MPLS VPNs VRF Localization Provider Edge Link Protection Support for configuring more than 3 million L3VPN Labels Lab: GRE Tunneling Chapter 7: Interprovider Backbones for Layer 3 VPNs Hierarchical VPN Models Carrier-of-Carriers Model Option C Configuration Lab: Carrier of Carrier Layer 3 VPNs Chapter 8: Troubleshooting Layer 3 VPNs Working with Multiple Layers Troubleshooting Commands on a PE Device Multiaccess Interfaces in Layer 3 VPNs PE and CE-based Traceroutes Layer 3 VPN Monitoring Commands Lab: Troubleshooting Layer 3 VPNs Chapter 9: Draft Rosen Multicast VPNs Multicast Overview Draft Rosen MVPN Overvie Draft Rosen MVPN Operation Configuration Monitoring Chapter 10: Next Generation Multicast VPNs Multicast VPN Overview Next-Generation MVPN Operation Configuration Monitoring Internet Multicast Ingress Replication Internet Multicast Signaling and Data Plane Configuring MVPN Internet Multicast Monitoring MVPN Internet Multicast Lab: MVPN Internet Multicast
ð Unlock a Career in Mental Health Advocacy with the Mental Health & Care Law Diploma! ð§ ï¸ Are you passionate about making a difference in the lives of individuals facing mental health challenges? Gain comprehensive insights into the legal landscape surrounding mental health with our cutting-edge course - the 'Mental Health & Care Law Diploma.' This meticulously designed program covers essential modules to empower you with the knowledge and skills needed to navigate the complex intersection of mental health and the law. ð Module 1: Introduction to Mental Health Law Dive into the foundations of mental health law, understanding its evolution, key principles, and the critical role it plays in safeguarding the rights of individuals. Lay the groundwork for a comprehensive understanding of mental health legislation. ð Module 2: Mental Health and the Law Explore the intricate relationship between mental health and legal frameworks. Delve into landmark cases, current statutes, and the legal precedents that shape mental health policies. Develop a nuanced perspective on the legal challenges faced by individuals dealing with mental health issues. ï¸ Module 3: Legal and Ethical Issues in Mental Health Treatment Navigate the ethical complexities involved in mental health treatment. Understand the legal obligations of mental health professionals, confidentiality concerns, and the delicate balance between patient autonomy and public safety. Equip yourself with the tools to address ethical dilemmas in real-world scenarios. ð¥ Module 4: The Mental Health Care System Get an in-depth understanding of the mental health care system, examining its structure, challenges, and opportunities. Explore the integration of legal frameworks within mental health institutions and how they impact the delivery of care. Gain insights into policy implications and potential areas for reform. ð Module 5: Rights of Mental Health Patients Empower yourself with a comprehensive knowledge of the rights of mental health patients. From informed consent to advocacy, explore the legal safeguards in place to protect the dignity and autonomy of individuals receiving mental health treatment. Learn how to champion the rights of vulnerable populations within the legal framework. ð Why Choose Our Diploma Program? Expert-Led Curriculum: Learn from industry experts and legal professionals at the forefront of mental health advocacy. Practical Insights: Gain real-world insights through case studies, simulations, and practical applications of mental health law. Flexible Learning: Access course materials at your own pace, enabling you to balance your studies with other commitments. Networking Opportunities: Connect with a community of like-minded individuals and professionals dedicated to mental health advocacy. Embark on a transformative journey towards becoming a knowledgeable and compassionate advocate for mental health rights. Enroll in the 'Mental Health & Care Law Diploma' today and make a meaningful impact in the lives of those who need it the most. Course Curriculum Module 1_ Introduction to Mental Health Law Introduction to Mental Health Law 00:00 Module 2_ Mental Health and the Law Mental Health and the Law 00:00 Module 3_ Legal and Ethical Issues in Mental Health Treatment Legal and Ethical Issues in Mental Health Treatment 00:00 Module 4_ The Mental Health Care System The Mental Health Care System 00:00 Module 5_ Rights of Mental Health Patients Rights of Mental Health Patients 00:00
Master the art of fraud management with our comprehensive course on Detection & Prevention Strategies. From understanding the intricacies of different fraud types to implementing cutting-edge prevention techniques, this program equips professionals with the skills needed to safeguard organizations. Explore fraud detection methods, learn to unveil fraudulent evidence, and gain insights into effective incident response and investigation. Take proactive steps towards fraud mitigation and compliance. Elevate your expertise to protect businesses from evolving threats. Enroll now for a strategic approach to managing fraud effectively.
Intelligent Yoga Teacher Training (IYTT) is unique amongst teacher training courses. We offer an incisive, thoughtful and intelligent approach to yoga teacher training, driven by the most current scientific developments in anatomy and movement research. Delivered by an elite group of senior yoga teachers at the top of their field, IYTT offers a spacious, immersive modular structure which provides time and space for profound learning, integration and growth. Each of the teaching team draws on decades of practical experience of yoga, including particularly the work of Vanda Scaravelli and somatic, embodied practices.
Dive into the comprehensive world of Entity Framework Core with this detailed course, designed to equip you with the skills to efficiently use EF Core in .NET applications.
Learn how to use OneNote to create, organize and populate electronic notebooks. Course overview Duration: 4 hours OneNote is a digital notebook and can be a great way to easily take notes. Whether for meetings, on training courses or to help with to do lists. It works very much like it’s paper copy equivalent but, of course, with lots of enhanced features. Its integration with Outlook and the other office applications means you can easily take notes and link them to documents meeting details and then email them out. You can even add audio and video notes as reminders. Objectives By the end of the course you will be able to: Create and manage notebooks Add contents Tag and prioritise content Create notes from other applications Create To Do Lists and integrate into Outlook Content Using OneNote Creating notebooks Creating sections and pages Formatting pages Using page templates Creating page templates Reordering sections and pages Deleting sections and pages Creating OneNote content Adding text Bullet lists Adding tables Adding images Adding drawings Adding links Adding audio and video notes Tagging Tagging Creating custom tags Creating to-do lists Searching and filtering for tags Notes Creating quick notes Filtering them in OneNote notebooks Linked notes Outlook integration Linking to tasks in Outlook Flagging notes for follow up Inserting Outlook meeting content Taking minutes Emailing OneNote pages Send emails to OneNote
In today's digital era, mastering Social Media Marketing is essential. Our Social Media Marketing course provides you with knowledge on sales psychology and business branding to influence potential customers and shape your brand identity. With the integration of search engine optimization and social media marketing, your brand visibility online will escalate. Learn to utilize social media marketing across platforms like Facebook, YouTube, Instagram, Twitter, Pinterest, LinkedIn, and Quora. Empower yourself with the right social media marketing strategies to drive customer engagement. With the mastery of social media marketing, transform from being a business owner to a brand owner. Elevate your brand, reach your target audience, and increase sales through the power of social media marketing. Course Curriculum Advance Diploma in Social Media Marketing Module 01: Social Media Marketing Module 02: Sales Psychology Module 03: Business Branding Module 04: Search Engine Optimization Module 05: Facebook Marketing Module 06: YouTube Marketing Module 07: Instagram Marketing Module 08: Twitter Marketing Module 09: Pinterest Marketing Module 10: LinkedIn Marketing Module 11: Quora Marketing Step up your skills with our Social Media Marketing Advance Diploma. This Social Media Marketing course deepens your understanding of social media marketing, empowering you to leverage different platforms. From boosting sales via effective social media marketing strategies to refining your brand identity, every aspect is covered. This Social Media Marketing course explores various platforms, including Facebook, YouTube, Instagram, and LinkedIn, enhancing your multi-platform social media marketing skills. Dive into the realm of social media marketing and transform your business into a potent brand with our Social Media Marketing Advance Diploma. CPD 15 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Is This Social Media Marketing Advance Diploma Course the Right Option for You? This Master Social Media Marketing course is open to everybody. You can access the course materials from any location in the world and there are no requirements for enrolment. After completing Social Media Marketing Advance Diploma course later, you can enrol in these courses: Professional Diploma in Social Media Level 4 Diploma in Digital Marketing (HL) COB Certified Digital Marketing Manager Professional Diploma in Digital Marketing Requirements Without any formal requirements, you can delightfully enrol in this Social Media Marketing course. Just get a device with internet connectivity and you are ready to start your learning journey. Thus, complete this Social Media Marketing course at your own pace. Career path Career opportunities for this Social Media Marketing in Care course include: Social Media Manager Brand Manager Social Media Content Creator Social Media Specialist SEO Manager Social Media Executive Social Media Officer Combined Salary Range: £22k - £175k per annum. Certificates CPD Quality Standard Certificate Digital certificate - Included Hardcopy Certificate (FREE UK Delivery) Hard copy certificate - £9.99
Duration 5 Days 30 CPD hours This course is intended for Workspace ONE UEM and Workspace ONE Access operators and administrators, account managers, solutions architects, solutions engineers, sales engineers, and consultants Overview By the end of the course, you should be able to meet the following objectives: Explain and apply the fundamental techniques for launching and maintaining an intelligence-driven, multiplatform endpoint management solution with Workspace ONE UEM Outline the components of Workspace ONE UEM Explain the general features and functionality enabled with Workspace ONE UEM Summarize the basic Workspace ONE administrative functions Explain and deploy common Workspace ONE integrations Securely deploy configurations to Workspace ONE UEM managed devices Onboard device endpoints into Workspace ONE UEM Summarize the alternative management methodologies for rugged devices Discuss strategies to maintain environment and device fleet health Configure and deploy applications to Workspace ONE UEM managed devices Analyze a Workspace ONE UEM deployment Enable email access on devices Integrate Workspace ONE UEM with content repositories and corporate file shares Explain the general features and functionalities that Workspace ONE Access enables Demonstrate how to integrate Workspace ONE UEM with Workspace ONE Access Summarize and implement Workspace ONE productivity services into the digital workspace environment Explain the methods of enabling mobile single sign-on for mobile endpoints managed in the digital workspace Configure Workspace ONE Access to support SAML 2.0 for federated authentication across the workforce In this five-day course, you learn how to apply the fundamental techniques for launching and maintaining an intelligence-driven, multiplatform, endpoint management solution with VMware Workspace ONE© UEM. Through a combination of hands-on labs, simulations, and interactive lectures, you will configure and manage the endpoint life cycle. After the course, you will have the foundational knowledge for effectively implementing Workspace ONE UEM.Also, you learn how to apply the fundamental techniques for integrating VMware Workspace ONE© Access? with Workspace ONE UEM to securely distribute business-critical applications from any device and to configure access management controls. Through a combination of hands-on labs, simulations, and interactive lectures, you configure Workspace ONE Access and Workspace ONE UEM system and productivity integrations.You will leave with a foundational understanding of how Workspace ONE uses various authentication methods and protocols to determine user access permissions and enable single sign-on. Overall, the course lays out the foundational principles of identity and access management.Please note - This course is a combination of the VMware Workspace ONE: Skills for UEM and the VMware Workspace ONE: Integrations course. Course Introduction Introductions and course logistics Course objectives Platform Architecture Summarize the features and functionality of Workspace ONE UEM Outline the benefits of leveraging Workspace ONE UEM Recognize the core and productivity components that make up the Workspace ONE UEM platform Summarize high availability and disaster recovery for the Workspace ONE solution Administration Navigate and customize the Workspace ONE UEM console Summarize the hierarchical management structure Explain the features and functions of Workspace ONE Hub Services Outline account options and permissions Enterprise Integrations Outline the process of integrating with directory services Explain certificate authentication and practical implementation with Workspace ONE Explain the benefits of integrating an email SMTP service into the Workspace ONE UEM console Describe VMware Dynamic Environment Manager and its architecture Onboarding Outline the prerequisite configurations in the Workspace ONE UEM environment for onboarding devices for management Outline the steps for setting up autodiscovery in the Workspace ONE UEM console Enroll an endpoint through the VMware Workspace ONE© Intelligent Hub app Summarize the platform onboarding options Managing Endpoints Explain the differences between device and user profiles Describe policy management options for Windows and macOS Describe the functions and benefits of using compliance policies Explain the use case for Freestyle Orchestrator Describe the capabilities that sensors and scripts enable. Alternative Management Methods Describe the function and benefits of device staging Configure product provisioning in the Workspace ONE UEM console Understand the benefits of deploying a VMware Workspace ONE© Launcher? configuration to Android devices List the system and device requirements for Linux device management in Workspace ONE UEM Applications Describe the features, benefits, and capabilities of application management in Workspace ONE UEM Understand and configure deployment settings for public, internal, and paid applications in the Workspace ONE UEM console Describe the benefits of using Apple Business Manager content integration Describe the benefits of using server-to-client software distribution List the functions and benefits of VMware Workspace ONE© SDK Device Email List the email clients supported by Workspace ONE UEM Configure an Exchange Active Sync profile in the Workspace ONE UEM console Configure VMware Workspace ONE© Boxer settings Summarize the available email infrastructure integration models and describe their workflows Configure email compliance policies and notifications services Content Sharing Describe the benefits of using Content Gateway Describe the Content Gateway workflows Describe the benefits of integrating content repositories with Workspace ONE UEM Configure a repository in the Workspace ONE UEM console Maintenance Manage endpoints from the Device List view and the Details view. Analyze endpoint deployment and compliance data from the Workspace ONE UEM Monitor page. Workspace ONE Access Summarize the benefits of Workspace ONE Access Outline the core features and functions enabled by Workspace ONE Access Navigate the Workspace ONE Access console Explain the functions of directory integration with Workspace ONE Access Explain the various types of authentication protocols enabled by Workspace ONE Access Integrating Workspace ONE UEM and Workspace ONE Access Explain the rationale for integrating Workspace ONE UEM and Workspace ONE Access Outline the process of connecting Workspace ONE UEM and Workspace ONE Access Examine the workflow of integrations Summarize the key features of an integrated solution Productivity Integrations Identify the functions enabled by VMware Unified Access Gateway? Outline the purpose of the VMware AirWatch© Secure Email Gateway? edge service Explain the features enabled by the VMware Workspace ONE© Tunnel? edge service Summarize the capabilities enabled by the Content Gateway edge service SAML 2.0 Authentication Outline the authentication methods supported by Workspace ONE Access Summarize the main properties of the SAML protocol Summarize the SAML authentication workflow Explain the application SSO authentication workflow with SAML Mobile Single Sign-On Describe the concept of mobile SSO Outline the mobile SSO workflows Intelligence and Automation Summarize the features of Workspace ONE© Intelligence? Outline the benefits of using Workspace ONE Intelligence Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Workspace ONE: Deploy and Manage [V22.x] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Workspace ONE: Deploy and Manage [V22.x] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for Workspace ONE UEM and Workspace ONE Access operators and administrators, account managers, solutions architects, solutions engineers, sales engineers, and consultants Overview By the end of the course, you should be able to meet the following objectives: Explain the general features and functionality that Workspace ONE Access enables Demonstrate how to integrate Workspace ONE UEM with Workspace ONE Access Summarize and implement Workspace ONE productivity services into the digital workspace environment Explain the methods of enabling mobile single sign-on for mobile endpoints managed in the digital workspace Configure Workspace ONE Access to support SAML 2.0 for federated authentication across the workforce In this two-day course, you learn how to apply the fundamental techniques for integrating VMware Workspace ONE© Access? with VMware Workspace ONE© UEM to securely distribute business-critical applications from any device and configure access management controls. Through a combination of hands-on labs, simulations, and interactive lectures, you configure system and productivity integrations for Workspace ONE Access and Workspace ONE UEM. The course provides the principles of identity and access management. You will leave with a foundational understanding of how Workspace ONE uses various authentication methods and protocols to determine user access permissions and enable single sign-on. Course Introduction Introductions and course logistics Course objectives Workspace ONE Access Summarize the benefits of Workspace ONE Access Outline the core features and functions enabled by Workspace ONE Access Navigate the Workspace ONE Access console Explain the functions of directory integration with Workspace ONE Access Explain the various types of authentication protocols enabled by Workspace ONE Access Integrating Workspace ONE UEM and Workspace ONE Access Explain the rationale for integrating Workspace ONE UEM and Workspace ONE Access Outline the process of connecting Workspace ONE UEM and Workspace ONE Access Examine the workflow of integrations Summarize the key features of an integrated solution Productivity Integrations Identify the functions enabled by VMware Unified Access Gateway? Outline the purpose of the VMware AirWatch© Secure Email Gateway? edge service Explain the features enabled by the VMware Workspace ONE© Tunnel? edge service Summarize the capabilities enabled by the Content Gateway edge service SAML 2.0 Authentication Outline authentication methods supported by Workspace ONE Access Summarize the main properties of the SAML protocol Summarize the SAML authentication workflow Explain the application single sign-on authentication workflow with SAML Mobile Single Sign-On Describe the concept of mobile single sign-on Outline mobile single sign-on workflows Intelligence and Automation Summarize the features of Workspace ONE© Intelligence? Outline the benefits of using Workspace ONE Intelligence
Course Title: Protection and Control of High-Voltage Power Circuits Overview: In the dynamic landscape of power systems, ensuring the reliable and efficient operation of high-voltage power circuits is paramount. The 'Protection and Control of High-Voltage Power Circuits' course is meticulously designed to equip professionals with the knowledge and skills needed to safeguard power infrastructure while maintaining optimal performance. Key Features: Comprehensive Curriculum: Our course covers a wide spectrum of topics, including protective relays, circuit breakers, communication protocols, and advanced control strategies. Participants will gain an in-depth understanding of the intricacies involved in high-voltage power circuit protection. Expert-Led Instruction: Learn from industry experts with extensive experience in power systems and circuit protection. Our instructors bring real-world insights, case studies, and practical knowledge to the classroom, ensuring a valuable and applicable learning experience. Hands-On Simulations: Dive into realistic simulations and practical exercises that replicate high-voltage power circuit scenarios. Participants will develop the skills needed to troubleshoot, analyze, and implement effective protection and control measures in a controlled environment. Cutting-Edge Technology: Stay ahead in the field with a focus on the latest advancements in protection and control technologies. Explore the integration of smart grids, digital relays, and adaptive protection schemes, preparing yourself for the future of high-voltage power systems. Networking Opportunities: Connect with fellow professionals, industry experts, and potential collaborators. Our course provides a platform for networking, allowing participants to share experiences, exchange ideas, and build a valuable professional network. Benefits: Enhance your understanding of high-voltage power circuits. Acquire practical skills for efficient circuit protection and control. Stay updated on the latest technologies and industry best practices. Boost career prospects with a specialized skill set. Network with professionals in the power systems domain. Delivery Format: Choose between in-person classes or online sessions to suit your schedule and learning preferences. The course is structured to accommodate both working professionals and those seeking to enter the field. Invest in your professional development and join us in mastering the intricacies of 'Protection and Control of High-Voltage Power Circuits.' Secure the reliability of power systems, advance your career, and contribute to the evolution of the energy industry. Enroll today for a transformative learning experience! Course Curriculum Introduction To Protection And Control Of High Voltage Power Circuits Course Introduction To Protection And Control Of High Voltage Power Circuits Course 00:00 Overview Of Stations Overview Of Stations 00:00 Relaying In General Relaying In General 00:00 Instrument Transformers Instrument Transformers 00:00 Transformer Configurations Connections Cooling Transformer Configurations Connections Cooling 00:00 Surge Protective Equipment Surge Protective Equipment 00:00 High Voltage Circuit Breakers High Voltage Circuit Breakers 00:00 Breaker Control Auto Reclosing Breaker Control Auto Reclosing 00:00 Instantaneous Timed Over Current Protection Instantaneous Timed Over Current Protection 00:00 Differential Protection Differential Protection 00:00 Impedance Relaying Impedance Relaying 00:00