Duration 5 Days 30 CPD hours This course is intended for Data Warehouse AdministratorDatabase Administrators Overview Use the Oracle Database tuning methodology appropriate to the available toolsUtilize database advisors to proactively tune an Oracle Database InstanceUse the tools based on the Automatic Workload Repository to tune the databaseDiagnose and tune common SQL related performance problemsDiagnose and tune common Instance related performance problemsUse Enterprise Manager performance-related pages to monitor an Oracle DatabaseGain an understanding of the Oracle Database Cloud Service In the Oracle Database 12c: Performance Management and Tuning course, learn about the performance analysis and tuning tasks expected of a DBA: proactive management through built-in performance analysis features and tools, diagnosis and tuning of the Oracle Database instance components, and diagnosis and tuning of SQL-related performance issues. In this course, you will be introduced to Oracle Database Cloud Service. Introduction Course Objectives Course Organization Course Agenda Topics Not Included in the Course Who Tunes? What Does the DBA Tune? How to Tune Tuning Methodology Basic Tuning Diagnostics Performance Tuning Diagnostics Performance Tuning Tools Tuning Objectives Top Timed Events DB Time CPU and Wait Time Tuning Dimensions Time Model Dynamic Performance Views Using Automatic Workload Repository Automatic Workload Repository Overview Automatic Workload Repository Data Enterprise Manager Cloud Control and AWR Snapshots Reports Compare Periods Defining the Scope of Performance Issues Defining the Problem Limiting the Scope Setting the Priority Top SQL Reports Common Tuning Problems Tuning During the Life Cycle ADDM Tuning Session Performance Versus Business Requirements Using Metrics and Alerts Metrics and Alerts Overview Limitation of Base Statistics Benefits of Metrics Viewing Metric History Information Viewing Histograms Server-Generated Alerts Setting Thresholds Metrics and Alerts Views Using Baselines Comparative Performance Analysis with AWR Baselines Automatic Workload Repository Baselines Moving Window Baseline Baselines in Performance Page Settings Baseline Templates AWR Baseslines Creating AWR Baselines Managing Baselines with PL/SQL Using AWR-Based Tools Automatic Maintenance Tasks ADDM Performance Monitoring Using Compare Periods ADDM Active Session History New or Enhanced Automatic Workload Repository Views Emergency Monitoring Real-time ADDM Real-Time Database Operation Monitoring Overview Use Cases Defining a Database Operation Scope of a Composite Database Operation Database Operation Concepts Identifying a Database Operation Enabling Monitoring of Database Operations Identifying, Starting, and Completing a Database Operation Monitoring Applications What is a Service? Service Attributes Service Types Creating Services Managing Services in a Single-Instance Environment Where are Services Used? Using Services with Client Applications Services and Pluggable Databases Identifying Problem SQL Statements SQL Statement Processing Phases Role of the Oracle Optimizer Identifying Bad SQL Top SQL Reports SQL Monitoring What is an Execution Plan? Methods for Viewing Execution Plans Uses of Execution Plans Influencing the Optimizer Functions of the Query Optimizer Selectivity Cardinality and Cost Changing Optimizer Behavior Optimizer Statistics Extended Statistics Controlling the Behavior of the Optimizer with Parameters Enabling Query Optimizer Features Reducing the Cost of SQL Operations Reducing the Cost Index Maintenance SQL Access Advisor Table Maintenance for Performance Table Reorganization Methods Space Management Extent Management Data Storage Using SQL Performance Analyzer Real Application Testing: Overview Real Application Testing: Use Cases SQL Performance Analyzer: Process Capturing the SQL Workload Creating a SQL Performance Analyzer Task SQL Performance Analyzer: Tasks Parameter Change SQL Performance Analyzer Task Page SQL Performance Management Maintaining SQL Performance Maintaining Optimizer Statistics Automated Maintenance Tasks Statistic Gathering Options Setting Statistic Preferences Restore Statistics Deferred Statistics Publishing Automatic SQL Tuning Using Database Replay Using Database Replay The Big Picture System Architecture Capture Considerations Replay Considerations: Preparation Replay Considerations Replay Options Replay Analysis Tuning the Shared Pool Shared Pool Architecture Shared Pool Operation The Library Cache Latch and Mutex Diagnostic Tools for Tuning the Shared Pool Avoiding Hard Parses Reducing the Cost of Soft Parses Sizing the Shared Pool Tuning the Buffer Cache Oracle Database Architecture: Buffer Cache Buffer Cache: Highlights Database Buffers Buffer Hash Table for Lookups Working Sets Buffer Cache Tuning Goals and Techniques Buffer Cache Performance Symptoms Buffer Cache Performance Solutions Tuning PGA and Temporary Space SQL Memory Usage Performance Impact Automatic PGA Memory SQL Memory Manager Configuring Automatic PGA Memory Setting PGA_AGGREGATE_TARGET Initially Limiting the size of the Program Global Area (PGA) SQL Memory Usage Automatic Memory Oracle Database Architecture Dynamic SGA Granule Memory Advisories Manually Adding Granules to Components Increasing the Size of an SGA Component Automatic Shared Memory Management: Overview SGA Sizing Parameters: Overview Performance Tuning Summary with Waits Commonly Observed Wait Events Additional Statistics Top 10 Mistakes Found in Customer Systems Symptoms Oracle Database Cloud Service: Overview Database as a Service Architecture, Features and Tooling Software Editions: Included Database Options and Management Packs Accessing the Oracle Database Cloud Service Console Automated Database Provisioning Managing the Compute Node Associated With a Database Deployment Managing Network Access to Database as a Service Scaling a Database Deployment Performance Management in the Database Cloud Environment Performance Monitoring and Tuning What Can be Tuned in a DBCS Environment?
BECOME A NUTRITIONAL CONSULTANT AND LEARN HOW TO STEER YOUR CLIENTS TOWARDS BETTER HEALTH A MESSAGE FROM THE AUTHOR This course is a must for anyone who is passionate about health & well-being and would like to fast-track to a practitioner role whereby you can confidently advise your clients on the best route to achieving good health in a world where ill-health is prevalent. The hope is expressed that this course will lead you feeling well informed, on a deeper naturopathic level, and provide you with a range of measures that you can apply to practice as you steer your clients towards better health. DR. LAWRENCE PLASKETT Course Duration 12 months Study Hours 300 hours Course Content 27 sections Course Fee £595 Course Overview The Plaskett Diploma in Nutritional Consultancy is especially useful for those whereby holistic health is a feature of your line of work and you would like to enhance the service that you provide, or for those that wish to set up an independent practice as a Nutritional Consultant. In Part One you will: Be introduced to the concept of naturopathy Gain a general understanding of the subject of health and nutrition Grasp the fundamentals of the cell's need for nutrients Appreciate the role of carbohydrates, fats, proteins, vitamins and minerals and understand the basics of how these nutrients work in the body Be aware of the enormous health benefits that can come from favourable dietary change Appreciate the merits of particular foods and nutrients Ultimately gain the knowledge that will lead towards a better standard of well-being now, and a prolonging of good health in the future In Part Two you will:Gain a deeper understanding of naturopathy and its principles which you can then apply to practise in nutritional therapies.Obtain the skills to understand the depth of disease in your patients to then find a route back from chronic disease and enable you to advise the best treatment plan.Develop an understanding of the role of the practitioner from the initial consultation, the taking of a case history, the interpretation and the subsequent advising of a treatment plan.Learn the ‘tools of the trade’ in using diets, supplements, herbs, phytonutrients in treatment, with flexibility and insight. BREAKDOWN OF THE COURSE SECTIONS PART ONE includes the following 12 sections: SECTION 1 THE PRINCIPLE BULK NUTRIENTS & ASSOCIATED FOODS In Section 1, we begin the study of nutrients and foods by looking at the main bulk nutrients that our diets contain: protein, carbohydrate and fat. Before one can consider individual vitamins and minerals, one has to know about the nutrients that make up most of our diets, namely the bulk nutrients. These are the suppliers of food energy, essential amino acids and fatty acids. You will need to understand these so as to manipulate them with skill. Areas Covered Proteins The carbohydrates Fibre Fats Classes of foods based upon composition SECTION 2 THE CELL & CELL ENERGY This section will illuminate the nature of the cell and explain how the energy of the cell is generated and what functions the cell must perform using that energy. It explains calories as units of energy measurement and the dynamic role of the enzymes in the cells. Areas Covered The cell Cell energy The energy content of food What else does the body have to do with its energy? How does the body release energy from food? Enzymes The overwhelming importance of cell energy The vitality of cells and tissues The key role of blood glucose What key factors are most likely to erode good vitality? Go-factors for enzymes Internal cell environment Enzyme poisons SECTION 3 THE ENVIRONMENT INSIDE THE CELL This section explains the importance of the controlled environment inside the cell. It particularly stresses how important it is to maintain the balance between sodium and potassium and between calcium and magnesium. Areas covered Out of balance intakes of sodium and potassium Calcium and magnesium balance Calcium mishandling SECTION 4 THE NEED FOR THE CELL TO SELF CLEANSE This section shows you how the cell needs to remain vital and active and to maintain the integrity of its energy systems and enzymes. It stresses the cell's need to excrete waste and toxic materials and to actively cleanse. This approach is both naturopathic and science-based. Areas covered Naturopathic elimination The concept of self-cleansing Naturopathy Vitality Chronic and acute Suppression SECTION 5 THE MICRO-MINERALS & THEIR CONTRIBUTION TO THE CELL This section emphasises and explains the importance of micro-minerals. It shows them in their role as enzyme activators and how they contribute in this way to cell energy and to maintaining the cell's integrity and function. It explains the key roles and characteristics of individual micro-minerals. Areas covered How metals act as enzyme activators Iron Zinc Manganese Copper Chromium Selenium Molybdenum General supplementation policy on trace metals Non-metallic micro-minerals Toxic metals Notes on metallic macro-minerals SECTION 6 THE VITAMINS This section covers the entire group of vitamins. It shows how they activate enzymes, contribute to cell energy and increase vitality. It explains their differing functions and characteristics. Areas covered Vitamins defined Intakes and rnis for vitamins How vitamins work The vitamins Non-vitamin nutrients How vitamins contribute to cell energy and increase the life force Food sources of the vitamins SECTION 7 BOWEL FLORA – HOW IT AIDS CLEANSING & MAINTENANCE OF A GOOD BODY ENVIRONMENT This section explains how the complex population of bacteria in the intestines contribute to maintaining vitality and health. In particular, it will become clear how these bacteria aid cleansing and the maintenance of a good environment within the body, which is so essential to good health. It includes how to nurture your own bowel flora organisms. Areas covered The bacteria of the large intestine (the bowel) The alternative view of desirable and undesirable bowel flora The benefits from an acidic lower bowel The effect of bowel flora upon cleansing Association of lactobacillus with milk Synthesis and absorption of b vitamins The reciprocal effects of bowel flora The bowel flora from infancy to adulthood Candida albicans How to maintain the bowel flora The use of bowel flora products SECTION 8 CHARACTERISTICS OF THE MAIN FOODS. SUPPRESSIVE VERSUS ELIMINATIVE FOODS This section identifies the 'suppressive' foods - those which block the body's elimination of toxins. It separates them from the 'eliminative' foods - those which enable or enhance the voiding of toxins. It gives the characteristics (in this respect) of the main food groups. It will tell you what problem foods to avoid and identify the acid-producing foods. Areas Covered Milk as a problem food Wheat and rye as problem foods Vegetables Relation of elimination to acidity The two-step process of elimination The neutral grains Salt Sugar SECTION 9 THE COMPOSITION OF FOODS This section provides a great deal of data on the composition of foods, their content and the main differences between them. This is a working mass of data to enable your own design of health-giving diets. Areas Covered Commentary on food tables The spread of bulk nutrients The spread of mineral nutrients SECTION 10 ALLERGIES, INTOLERANCE & SENSITIVITY. MICRO-MINERALS & THEIR CONTRIBUTION TO THE CELL This section is an introduction to allergies or intolerances - what they are; physical signs and symptoms, the most frequent; masked/hidden and/or addictive allergies; causes of allergy - food, chemical, emotional and mental; stages of allergy; different types of allergy - fixed, variable, cyclic; managing allergies and sensitivities - how to handle them; rotation diets (including the rotation chart); allergy testing and its limitations; food additives and chemicals; the role of nutrition in all this. Areas Covered Allergic reactions defined The nature of allergies and the effect they have Obvious reactions The four main classes of allergy The possible underlying causes of allergy Viewing allergy tests and their limitations What help is available to deal with allergies The key role of nutrition in the underlying case and treatment of allergy How allergies interfere with treatment The concept of neutralisation The allopathic or orthodox drug approach SECTION 11 DESIGNING DIETS This section provides clear guidance on designing maintenance nutritional diets that, compared to most ordinary diets, should improve health. Areas Covered Dietary paragraphs Using the dietary paragraphs to make up diets SECTION 12 THE USE OF SUPPLEMENTS This section explains and demystifies the subject of vitamin and mineral supplements and their use. It enables you to design simple maintenance and health-giving programmes of supplementation. Areas Covered General guidelines in the use of supplements Always attend to the diet first Preparing for mineral and vitamin supplementation Steps in supplement intake Simple and effective combinations The eliminative qualities of magnesium and calcium Less frequently used combinations Use of multiple formulations Adding in the trace elements as a further stimulant of toxin elimination & for correction of deficiencies On to the next stage – zinc and manganese Conditions where practitioners of nutritional medicine might use such formulae Vitamins a & d Vitamins c & e Choline & inositol Calcium pantothenate The role of the practitioner of nutritional medicine PART TWO includes the following 15 sections: SECTION 1 NATUROPATHY, ITS NATURE AND ITS HISTORY In this section we introduce the medical system known as “naturopathy”. We do so because this system provides the basis for understanding and using naturopathic nutritional therapies. Throughout this Course we shall refer to naturopathy and naturopathic principles and in learning and using these principles, you will hopefully discover a dynamic view of health and illness that will excite you and will inform and motivate your future practice. Areas Covered The Basic Principles of Naturopathy The Early Days: Hydrotherapy as the Core Therapy Progress of Naturopathy in the United States The Halycon Years of Naturopathy in Britain The Suppression of Naturopathy and its Rebirth The Details of Hydrotherapy Techniques The Range of Today’s Naturopathic Techniques Published Research into Naturopathy and General Acceptance Today’s Activities at Health Spas Naturopathy in Relation to Scientific Medicine Naturopathy in Relation to Biochemistry: the Principles of “General Chronicity” Naturopathy as the Philosophical Base for other Therapies SECTION 2 PHILOSOPHY OF NATUROPATHIC NUTRITIONAL THERAPEUTICS In order to begin to understand Nutritional Therapeutics, we have to understand the philosophy that is at its very basis. One will be departing quite fundamentally from conventionality and as the truth about natural medicine and natural nutrition unfolds in this Course, the student will, in all probability, come to realise that holism is a higher form of knowledge; one that transcends the materialistic and the mechanistic and will lead you on the first steps of this most exciting of all journeys. Areas Covered The status of knowledge about diet in relation to health The pressure of conventional opinion The limitations of the conventional approach What goes in must affect health in the long run The body's resistance to deterioration Profound effects from treatment The life force in relation to scientific concepts The nature of toxins Starting to look at the route for recovery Acute conditions, inflammation and hyperactivity Routes by which toxins enter the body Routes of exit of toxins Movement of toxins within the body: toxic locations Iridology Knife edge between healing and non-healing The effects to be expected from toxins residing in tissues SECTION 3 SYNTHESIS OF NATUROPATHY & SCIENCE What is to be presented in this Section is pertinent to the whole question of the initiation of chronic diseases. If we look in the pathology texts and consult the sections on individual types of chronic disease, we usually find an explanation of the cause (aetiology) on a superficial level. However, when we begin to probe into the cause of the causes, we soon hit an impenetrable wall of “not knowing”. It is in this Section that we aim to open the door to this question and therefore give a route back from chronic disease. Areas covered Introduction: a specialized meaning of “Chronicity” The Nature of Toxic Damage – Non-Specific Cell Toxicity The Nature of Membranes Mechanisms of Protein Synthesis and their Vulnerability to Toxins Damage to Mitochondria and the Endoplasmic Reticulum Relationship of General Cellular Damage to Cancer The Nucleus, DNA and their Vulnerability to Toxins DNA Repair Mechanisms The Nature of Toxic Damage – Specific Cell Toxicity Cell Damage and the “General Chronicity” Theory SECTION 4 THE PRACTITIONER’S ROLE In this Section we wish to paint a picture that fairly fully describes this role. It is important to build a set of views about your future role that is fully compatible and interwoven with the naturopathic philosophy and data given in the previous Sections of the Course. Areas covered Introduction to the Role of the practitioner The Wider Environment The Microcosm of the Consulting Room patient & treatment pimary components of the Practitioner’s role a working relationship & commitment to each patient physical examination communicating & recording the prescription providing nutritional products required for therapy communication with doctors spreading the word SECTION 5 UNDERSTANDING THE DEPTH OF DISEASE Here is where the clinical work begins. We begin by thinking about this one aspect – how sick is your patient? You need some idea as to how big the problem is that lies before you. Areas covered The Nature of Health and Disease and the Approach to Treatment Some of the Misconceptions Flexibility of Disease Definitions Arthritis as an Example Do You Need a Hospital Diagnosis When You Are Not Unwell? Homotoxicology and the Teachings of Reckeweg Reckeweg’s Six Levels of Deterioration Examples of Progressive Sequences of Medical Conditions The Miasmic Background: Important but Disputed territory The Three Basic Homeopathic Miasms The Tubercular Miasm The Carcinocin Miasm The Sub-divisions of the Tubercular Miasm Note on Iridology SECTION 6 THE CONCEPT OF ELIMINATORY PRESSURE & ITS MANAGEMENT Eliminatory pressure is the term we use to denote the combined effect of all the various naturopathic-type measures we apply to help the body biochemistry of a sick person to return to normal. According to the “Theory of General Chronicity”, the normality of the biochemistry of the body cells, and hence their degree of freedom from toxicity and damage, is our yardstick of general health and vitality. Areas covered The Nature of Eliminatory Pressure Differences of Response to Naturopathic Pressure The Interactions between Toxins and Toxic Damage Regulating Eliminative Pressure at Manageable Levels The Basics of Generating Eliminatory Pressure Fasting: Free Radicals and Antioxidants “Firing up” Eliminatory Pressure with Fruit The Stage I and Stage 2 Elimination Using Foods to Generate Controlled Levels of Eliminatory Pressure Using Supplements to Generate Controlled Levels of Eliminatory Pressure Contributions to Eliminatory Pressure from Herbs and Special Nutrients Levels of Eliminatory Pressure, Understanding and Managing Them The Effectiveness’, or Otherwise, of Eliminatory Reactions The Concept of the “Chronically Acute” The Approach to Overall Management of the Case SECTION 7 TAKING THE CASE HISTORY & UNDERSTANDING ORGANS AND ORGAN FUNCTIONS In this Section we concern ourselves with the actual technique for taking down the particulars of the case. Before we can carry out a full naturopathic diagnosis, we shall need to understand the principles of ‘Plotting the Course of Disease’. It is from this that we will gain a full appreciation of how the sick person came to be in their present condition and this will then lead us on to the question of what to do about it. Areas covered The More Basic Facts The Aims and Objectives in Taking the Case The Organ States Assessing the Naturopathic State of Organs Hierarchy of Organs Organ-Specific Diagnosis Individually Important Organs and Systems Blood Sugar in Relation to Vitality: Hypoglycaemia The Adrenal Glands how should we recognise adrenal exhaustion clinically? The Liver The Kidneys The Immune System Location of Immune System Components. Functions of Immune System Components. Nutritional Therapy Interpretation of Immune System Signs The Skin SECTION 8 INTERPRETATION OF CASE HISTORY AND UNDERSTANDING INDIVIDUAL REACTIVITY In this Section, we would like you to consider the inevitability of the rules that apply to progression along the pathway to chronic disease, and to the possibility of return from any position that is well down that path. From understanding the case, you will be able to determine what the treatment should be. Areas Covered The Naturopathic Laws and Observational Skills The Progression of Disease More about the Acute and the Chronic The Nutritional Therapist’s View of Disease The Allopathic View of Disease More about “Charting the Naturopathic Ebb and Flow” The Multifactorial Diagnosis See What’s Moving, What’s Changing Assessing Individual Reactivity Let the Case Taking Stage Foreshadow the Interpretation just a Little Note on The Chinese Medicine Connections SECTION 9 THE TOOLS OF THE TRADE & USING DIETS AS TREATMENT Using the information presented to you in Part One of the course, you will be able to use those same dietary paragraphs and move towards a very flexible prescribing of individually designed diets. You will make up a diet for each patient that will embody a carefully thought out modulation of the elimination/suppression aspect of our approach to health. Areas Covered What we have covered already Many people may seem not to need special diets Avoid becoming paranoid Choices in dietary design More about the food classes Facing realism in your range of non-therapeutic prescriptions Adaptation for vegetarians Elements of directional dietary prescribing The approach to actual therapeutic prescription SECTION 10 THE TOOLS OF THE TRADE & USING SUPPLEMENTS AS TREATMENT We provided advice in Part One of the Course on the use of supplements. We introduced the ratio between magnesium and calcium, the use of micro-minerals and the use of zinc and manganese to name but a few. Here we explain further the steps needed to apply these essential tools to ensure that your treatment advice is successful. Areas Covered The latest advice provided by the Introductory Nutritional Course supplementation Legal Restraint upon use of Supplements SECTION 11 THE TOOLS OF THE TRADE & USING HERBS AS TREATMENT In the course of our treatment we often need to deal with common herbs. This is to produce certain organ-specific or system-specific effects, not obtainable with other nutrients. The effect of this is not to make Herbalists of us, but to ensure that these remedies are very carefully selected for their compatibility with other nutrients. Areas Covered Aloe vera Bromelain St john’s wort Gingko biloba Silymarin SECTION 12 ACTIONS OF GROUPS OF PHYTONUTRIENTS This Section begins to delve into what lies behind the known fact that fruit and vegetable consumption inhibits many diseases. What are the substances within them that are responsible for such an important protection of the human body? Each of the main groups is examined with the main purpose being to familiarize the Student with these substances and to offer scientific evidence that some of these really do protect against disease. Areas Covered The Position of Phytonutrients Among Other Factors What are Phytonutrients? The Place of Phytonutrients among Secondary Plant Metabolites The Different Groups of Beneficial Phytonutrients Evidence for anti-disease activity SECTION 13 SPECIAL SUPPLEMENTS & THE COMBINED PRESCRIPTION When we write about “special supplements”, we mean to refer to those substances that are used as nutritional supplements and which do not fit into any of the previous categories mentioned. Here we teach the Student that they may in fact include many substances from many groups, leading to a diversified classification that each has their own special effects, conferring unique advantages upon the taker of them. Areas Covered Special Supplements & combined prescription Conducting the Consultation SECTION 14 STEERING A COURSE THROUGH TREATMENT – FLEXIBILITY AND INSIGHT Having not specifically addressed the question of what happens after the initial consultation, it is here that we bring together all the information that has been presented to you in the pages of this Nutritional Therapeutics Course, therefore, making this Section a recapitulation of things we have covered already, but brought together in a cohesive treatment of the subject. Areas Covered Progressing the Case Things to do at the First Consultation to help towards the Second The Second Consultation the meaning of different outcomes Constipation and Diarrhoea as incidents in Treatment. Titration of Bowel Flora The Nutritional Therapy Intensive Cleanse Diet Enemas Supplements Juices Duration Supplement Sequences in Treatment From Calcium Formulations to Calcium-Free Formulations Other Progressions Allergies, Intolerances and Hypersensitivities SECTION 15 SNAGS, CLEANSES AND CASE HISTORIES TESTIMONIALS Here's what students have to say about the course Kate Woolger, pilates instructor UK I chose the Plaskett College as I wanted something which was flexible and could be done in my own time. The content of the course really appealed. The study experience has been enjoyable - sometimes hard if a subject wasn’t so interesting. In regards to changes I have already implemented, I’m more thoughtful of thinking things through from the inception rather than just looking at the problem"
About this Virtual Instructor Led Certificate Training Course (VILT) Asset maintenance and equipment reliability teams play a significant role to ensure that there is no room for downtime and losses in production. They are often recognised for their contribution and ability to keep assets running productively in today's organisations. The Certificate in Asset Management Virtual Instructor Led Training (VILT) course will provide those involved in Asset Management with a full explanation of the key processes to manage assets across their lifecycle. This recognised VILT course has been designed to equip participants with practical skills to take back to work. This VILT course enables participants to ensure their organisation's assets are realising their full value in support of the organisation's objectives. Accredited by the Institute of Asset Management (IAM), this VILT course will prepare participants to sit for the IAM Asset Management Certificate qualification. The IAM exam is offered as an option for participants of this VILT course. Training Objectives By the end of this VILT course, participants will be able to: Understand the key principles, tools and terminology of Asset Management, and demonstrate how it will benefit your organisation Gain familiarity in the application of ISO 55000 in practice Access a range of models that will support the implementation of asset management in your organisation Assess your understanding of the current tools and concepts applied in Asset Management Capture new ideas and skills that will enhance performance and be better prepared for the Institute of Asset Management (IAM) Certificate Examination Target Audience This VILT course will benefit maintenance managers, operations managers, asset managers and reliability professionals, planners and functional specialists. It will also be useful for facilities engineers, supervisors/managers and structural engineers/supervisors/ and managers. IAM Qualifications Syllabi This document details the scope of the individual topics which comprise the examination modules, and how the exams are assessed. It is important that prospective candidates understand the scope of the modules to determine the preparation required. Download here IAM Qualifications Candidate Handbook This handbook provides more detailed information on registering as a candidate, learning resources, training courses, booking an exam, exam regulations and what happens after an exam - whether you are successful or unsuccessful. Download here Course Level Basic or Foundation Training Methods The VILT course will be delivered online in 5 half-day sessions comprising 4 hours per day, with 2 breaks of 15 minutes per day. Course Duration: 5 half-day sessions, 4 hours per session (20 hours in total) Other than world-class visuals and slides, this VILT course will include a high level of interaction between the facilitator and participants and group discussion among the participants themselves. There will be a number of exercises & quizzes to demonstrate key points and to give participants the chance to apply learning and appreciate key aspects of best practice. Participants will also have the chance to share examples from their own experience, discuss real problems they are facing and develop actions for improvement when they return to work. Examples of the exercises that are used in this VILT course are as follows: Exercises: Aligning Assets to Business Objectives, Planning for Contingencies, Understanding Function and Failure. Group exercises: Asset Management Decision Making, Incident Review & Operations Optimisation. The workshop content will be adjusted based on the discussions, interests and needs of the participants on the course. Trainer Your expert course leader is a is a highly experienced in maintenance and turnaround specialist. He is a Chartered Mechanical Engineer, having spent 19 years working for BP in engineering, maintenance and turnaround management roles. During this time, he worked on plants at all ages in the lifecycle, from construction, commissioning and operating new assets to maintaining aging assets and decommissioning. He has taken roles in Projects, Human Resources and Integrity Management which give real breadth to his approach. He also specialized in Continuous Improvement, gaining the award of International Petrochemical Coach of the year. He stays up to date with the latest industrial developments through his consulting support for major clients. He is also the Asset Management lead and a VILT specialist, having delivered over 70 days of VILT training in the last year. He has an engaging style and will bring his current industrial experience, proficiency of VILT techniques and diverse content, gathered from a comprehensive training portfolio, to deliver a distinctive training experience. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information about post training coaching support and fees applicable for this. Accreditions And Affliations
Duration 5 Days 30 CPD hours This course is intended for System administrators, system architects, and technology consultants In this course, students learn how to manage the SAP Solutions Manager Configuration suite and discover how it can be integrated into their day-to-day operations. Course Outline SAP Solution Manager Overview: available Scenarios, Enhancements, Work Center Technical Overview: Installation, Architecture, Sizing SAP Solution Manager Configuration: SOLMAN_SETUP, SMSY, LMDB, Landscape Verification (LV), System Landscape Directory (SLD), Solution Manager Diagnostics Managing Authorizations in SAP Solution Manager Maintenance Optimizer, Maintenance Certificates, System Recommendations, Issue and Task Management Early Watch Alert Reporting: ABAP & Java, EarlyWatch Alert for Solutions Managing Solutions: Work Mode Management and additional administrative Tasks Monitoring and Alerting Infrastructure (MAI), Solution Monitoring and System Monitoring Service Level Reporting, Technical Reporting, Management Reporting SAP Mobile Apps for SAP Solution Manager Job Management: Job Request Management, Job Documentation, Job Monitoring, Job Scheduling Management Health Checks and more Additional course details: Nexus Humans SM100 SAP Solution Manager Configuration for Operations training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SM100 SAP Solution Manager Configuration for Operations course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This course is designed for persons aspiring to the Microsoft 365 Administrator role and have completed at least one of the Microsoft 365 role-based administrator certification paths. This course covers the following key elements of Microsoft 365 administration: Microsoft 365 tenant management, Microsoft 365 identity synchronization, and Microsoft 365 security and compliance. In Microsoft 365 tenant management, you learn how to configure your Microsoft 365 tenant, including your organizational profile, tenant subscription options, component services, user accounts and licenses, security groups, and administrative roles. You then transition to configuring Microsoft 365, with a primary focus on configuring Office client connectivity. Finally, you explore how to manage user-driven client installations of Microsoft 365 Apps for enterprise deployments. The course then transitions to an in-depth examination of Microsoft 365 identity synchronization, with a focus on Microsoft Entra Connect and Connect Cloud Sync. You learn how to plan for and implement each of these directory synchronization options, how to manage synchronized identities, and how to implement password management in Microsoft 365 using multifactor authentication and self-service password management. In Microsoft 365 security management, you begin examining the common types of threat vectors and data breaches facing organizations today. You then learn how Microsoft 365?s security solutions address each of these threats. You are introduced to the Microsoft Secure Score, as well as to Microsoft Entra ID Protection. You then learn how to manage the Microsoft 365 security services, including Exchange Online Protection, Safe Attachments, and Safe Links. Finally, you are introduced to the various reports that monitor an organization?s security health. You then transition from security services to threat intelligence; specifically, using Microsoft 365 Defender, Microsoft Defender for Cloud Apps, and Microsoft Defender for Endpoint. Once you have this understanding of Microsoft 365?s security suite, you then examine the key components of Microsoft 365 compliance management. This begins with an overview of all key aspects of data governance, including data archiving and retention, Microsoft Purview message encryption, and data loss prevention (DLP). You then delve deeper into archiving and retention, paying particular attention to Microsoft Purview insider risk management, information barriers, and DLP policies. You then examine how to implement these compliance features by using data classification and sensitivity labels. Prerequisites Completed a role-based administrator course such as Messaging, Teamwork, Security, Compliance, or Collaboration. A proficient understanding of DNS and basic functional experience with Microsoft 365 services. A proficient understanding of general IT practices. A working knowledge of PowerShell. 1 - Configure your Microsoft 365 experience Explore your Microsoft 365 cloud environment Configure your Microsoft 365 organizational profile Manage your tenant subscriptions in Microsoft 365 Integrate Microsoft 365 with customer engagement apps Complete your tenant configuration in Microsoft 365 2 - Manage users, licenses, and mail contacts in Microsoft 365 Determine the user identity model for your organization Create user accounts in Microsoft 365 Manage user account settings in Microsoft 365 Manage user licenses in Microsoft 365 Recover deleted user accounts in Microsoft 365 Perform bulk user maintenance in Microsoft Entra ID Create and manage guest users Create and manage mail contacts 3 - Manage groups in Microsoft 365 Examine groups in Microsoft 365 Create and manage groups in Microsoft 365 Create dynamic groups using Azure rule builder Create a Microsoft 365 group naming policy Create groups in Exchange Online and SharePoint Online 4 - Add a custom domain in Microsoft 365 Plan a custom domain for your Microsoft 365 deployment Plan the DNS zones for a custom domain Plan the DNS record requirements for a custom domain Create a custom domain in Microsoft 365 5 - Configure client connectivity to Microsoft 365 Examine how automatic client configuration works Explore the DNS records required for client configuration Configure Outlook clients Troubleshoot client connectivity 6 - Configure administrative roles in Microsoft 365 Explore the Microsoft 365 permission model Explore the Microsoft 365 admin roles Assign admin roles to users in Microsoft 365 Delegate admin roles to partners Manage permissions using administrative units in Microsoft Entra ID Elevate privileges using Microsoft Entra Privileged Identity Management Examine best practices when configuring administrative roles 7 - Manage tenant health and services in Microsoft 365 Monitor the health of your Microsoft 365 services Monitor tenant health using Microsoft 365 Adoption Score Monitor tenant health using Microsoft 365 usage analytics Develop an incident response plan Request assistance from Microsoft 8 - Deploy Microsoft 365 Apps for enterprise Explore Microsoft 365 Apps for enterprise functionality Explore your app compatibility by using the Readiness Toolkit Complete a self-service installation of Microsoft 365 Apps for enterprise Deploy Microsoft 365 Apps for enterprise with Microsoft Configuration Manager Deploy Microsoft 365 Apps for enterprise from the cloud Deploy Microsoft 365 Apps for enterprise from a local source Manage updates to Microsoft 365 Apps for enterprise Explore the update channels for Microsoft 365 Apps for enterprise Manage your cloud apps using the Microsoft 365 Apps admin center 9 - Analyze your Microsoft 365 workplace data using Microsoft Viva Insights Examine the analytical features of Microsoft Viva Insights Explore Personal insights Explore Team insights Explore Organization insights Explore Advanced insights 10 - Explore identity synchronization Examine identity models for Microsoft 365 Examine authentication options for the hybrid identity model Explore directory synchronization 11 - Prepare for identity synchronization to Microsoft 365 Plan your Microsoft Entra deployment Prepare for directory synchronization Choose your directory synchronization tool Plan for directory synchronization using Microsoft Entra Connect Plan for directory synchronization using Microsoft Entra Connect cloud sync 12 - Implement directory synchronization tools Configure Microsoft Entra Connect prerequisites Configure Microsoft Entra Connect Monitor synchronization services using Microsoft Entra Connect Health Configure Microsoft Entra Connect cloud sync prerequisites Configure Microsoft Entra Connect cloud sync 13 - Manage synchronized identities Manage users with directory synchronization Manage groups with directory synchronization Use Microsoft Entra Connect Sync Security Groups to help maintain directory synchronization Configure object filters for directory synchronization Explore Microsoft Identity Manager Troubleshoot directory synchronization 14 - Manage secure user access in Microsoft 365 Manage user passwords Enable pass-through authentication Enable multifactor authentication Enable passwordless sign-in with Microsoft Authenticator Explore self-service password management Explore Windows Hello for Business Implement Microsoft Entra Smart Lockout Implement conditional access policies Explore Security Defaults in Microsoft Entra ID Investigate authentication issues using sign-in logs 15 - Examine threat vectors and data breaches Explore today's work and threat landscape Examine how phishing retrieves sensitive information Examine how spoofing deceives users and compromises data security Compare spam and malware Examine account breaches Examine elevation of privilege attacks Examine how data exfiltration moves data out of your tenant Examine how attackers delete data from your tenant Examine how data spillage exposes data outside your tenant Examine other types of attacks 16 - Explore the Zero Trust security model Examine the principles and components of the Zero Trust model Plan for a Zero Trust security model in your organization Examine Microsoft's strategy for Zero Trust networking Adopt a Zero Trust approach 17 - Explore security solutions in Microsoft 365 Defender Enhance your email security using Exchange Online Protection and Microsoft Defender for Office 365 Protect your organization's identities using Microsoft Defender for Identity Protect your enterprise network against advanced threats using Microsoft Defender for Endpoint Protect against cyber attacks using Microsoft 365 Threat Intelligence Provide insight into suspicious activity using Microsoft Cloud App Security Review the security reports in Microsoft 365 Defender 18 - Examine Microsoft Secure Score Explore Microsoft Secure Score Assess your security posture with Microsoft Secure Score Improve your secure score Track your Microsoft Secure Score history and meet your goals 19 - Examine Privileged Identity Management Explore Privileged Identity Management in Microsoft Entra ID Configure Privileged Identity Management Audit Privileged Identity Management Control privileged admin tasks using Privileged Access Management 20 - Examine Azure Identity Protection Explore Azure Identity Protection Enable the default protection policies in Azure Identity Protection Explore the vulnerabilities and risk events detected by Azure Identity Protection Plan your identity investigation 21 - Examine Exchange Online Protection Examine the anti-malware pipeline Detect messages with spam or malware using Zero-hour auto purge Explore anti-spoofing protection provided by Exchange Online Protection Explore other anti-spoofing protection Examine outbound spam filtering 22 - Examine Microsoft Defender for Office 365 Climb the security ladder from EOP to Microsoft Defender for Office 365 Expand EOP protections by using Safe Attachments and Safe Links Manage spoofed intelligence Configure outbound spam filtering policies Unblock users from sending email 23 - Manage Safe Attachments Protect users from malicious attachments by using Safe Attachments Create Safe Attachment policies using Microsoft Defender for Office 365 Create Safe Attachments policies using PowerShell Modify an existing Safe Attachments policy Create a transport rule to bypass a Safe Attachments policy Examine the end-user experience with Safe Attachments 24 - Manage Safe Links Protect users from malicious URLs by using Safe Links Create Safe Links policies using Microsoft 365 Defender Create Safe Links policies using PowerShell Modify an existing Safe Links policy Create a transport rule to bypass a Safe Links policy Examine the end-user experience with Safe Links 25 - Explore threat intelligence in Microsoft 365 Defender Explore Microsoft Intelligent Security Graph Explore alert policies in Microsoft 365 Run automated investigations and responses Explore threat hunting with Microsoft Threat Protection Explore advanced threat hunting in Microsoft 365 Defender Explore threat analytics in Microsoft 365 Identify threat issues using Microsoft Defender reports 26 - Implement app protection by using Microsoft Defender for Cloud Apps Explore Microsoft Defender Cloud Apps Deploy Microsoft Defender for Cloud Apps Configure file policies in Microsoft Defender for Cloud Apps Manage and respond to alerts in Microsoft Defender for Cloud Apps Configure Cloud Discovery in Microsoft Defender for Cloud Apps Troubleshoot Cloud Discovery in Microsoft Defender for Cloud Apps 27 - Implement endpoint protection by using Microsoft Defender for Endpoint Explore Microsoft Defender for Endpoint Configure Microsoft Defender for Endpoint in Microsoft Intune Onboard devices in Microsoft Defender for Endpoint Manage endpoint vulnerabilities with Microsoft Defender Vulnerability Management Manage device discovery and vulnerability assessment Reduce your threat and vulnerability exposure 28 - Implement threat protection by using Microsoft Defender for Office 365 Explore the Microsoft Defender for Office 365 protection stack Investigate security attacks by using Threat Explorer Identify cybersecurity issues by using Threat Trackers Prepare for attacks with Attack simulation training 29 - Examine data governance solutions in Microsoft Purview Explore data governance and compliance in Microsoft Purview Protect sensitive data with Microsoft Purview Information Protection Govern organizational data using Microsoft Purview Data Lifecycle Management Minimize internal risks with Microsoft Purview Insider Risk Management Explore Microsoft Purview eDiscovery solutions 30 - Explore archiving and records management in Microsoft 365 Explore archive mailboxes in Microsoft 365 Enable archive mailboxes in Microsoft 365 Explore Microsoft Purview Records Management Implement Microsoft Purview Records Management Restore deleted data in Exchange Online Restore deleted data in SharePoint Online 31 - Explore retention in Microsoft 365 Explore retention by using retention policies and retention labels Compare capabilities in retention policies and retention labels Define the scope of a retention policy Examine the principles of retention Implement retention using retention policies, retention labels, and eDiscovery holds Restrict retention changes by using Preservation Lock 32 - Explore Microsoft Purview Message Encryption Examine Microsoft Purview Message Encryption Configure Microsoft Purview Message Encryption Define mail flow rules to encrypt email messages Add organizational branding to encrypted email messages Explore Microsoft Purview Advanced Message Encryption 33 - Explore compliance in Microsoft 365 Plan for security and compliance in Microsoft 365 Plan your beginning compliance tasks in Microsoft Purview Manage your compliance requirements with Compliance Manager Examine the Compliance Manager dashboard Analyze the Microsoft Compliance score 34 - Implement Microsoft Purview Insider Risk Management Explore insider risk management Plan for insider risk management Explore insider risk management policies Create insider risk management policies Investigate insider risk management activities and alerts Explore insider risk management cases 35 - Implement Microsoft Purview Information Barriers Explore Microsoft Purview Information Barriers Configure information barriers in Microsoft Purview Examine information barriers in Microsoft Teams Examine information barriers in OneDrive Examine information barriers in SharePoint 36 - Explore Microsoft Purview Data Loss Prevention Examine Data Loss Prevention Explore Endpoint data loss prevention Examine DLP policies View DLP policy results Explore DLP reports 37 - Implement Microsoft Purview Data Loss Prevention Plan to implement Microsoft Purview Data Loss Protection Implement Microsoft Purview's default DLP policies Design a custom DLP policy Create a custom DLP policy from a template Configure email notifications for DLP policies Configure policy tips for DLP policies 38 - Implement data classification of sensitive information Explore data classification Implement data classification in Microsoft 365 Explore trainable classifiers Create and retrain a trainable classifier View sensitive data using Content explorer and Activity explorer Detect sensitive information documents using Document Fingerprinting 39 - Explore sensitivity labels Manage data protection using sensitivity labels Explore what sensitivity labels can do Determine a sensitivity label's scope Apply sensitivity labels automatically Explore sensitivity label policies 40 - Implement sensitivity labels Plan your deployment strategy for sensitivity labels Examine the requirements to create a sensitivity label Create sensitivity labels Publish sensitivity labels Remove and delete sensitivity labels Additional course details: Nexus Humans MS-102T00: Microsoft 365 Administrator training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the MS-102T00: Microsoft 365 Administrator course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4.5 Days 27 CPD hours This course shows you how to configure IBM Datacap and its components on a multi-system setup. You also learn about IBM Datacap Navigator configuration, system administration, and maintenance.
Duration 4 Days 24 CPD hours This course is intended for DevOps engineers Integration engineers Network and software architects Network engineers Software engineers System administrators Overview After completing this course, you should be able to: Describe network and IT convergence Describe Cisco NSO architecture Describe Linux Configure Cisco NSO Set up access control to Cisco NSO system Describe Cisco NSO Integration Options Explain version control systems and basic git concepts Describe the purpose of continuous integration and continuous delivery Implement Cisco NSO high availability Describe scalable system management Describe software development methodologies Describe service maintenance Perform NED upgrades Use Cisco NSO for managing services and their associated device configurations Describe Cisco NSO change management Explain service problem management Use Cisco NSO for service monitoring and compliance reporting Describe Cisco NSO inventory management Describe Cisco NSO use cases The Cisco Network Services Orchestrator (NSO) Administration and DevOps (NSO303) v4.0 course continues the learning journey of the NSO Essentials for Programmers and Network Architects (NSO201) v4.0 and NSO Advanced for Python Programmers (NSO300) v4.0 courses by introducing you to the system administration and DevOps focusing on NSO; the robust bridge linking network automation and orchestration tools, examining the development, operation, and administration task functions. You will learn how to set up, configure, deploy, and maintain a Cisco Network Services Orchestrator solution, and learn best practices for using DevOps. The examples shown in this course demonstrate real-world scenarios to prepare you for deployment and management of new or existing NSO instances. The course guides you through the setup of a production ready NSO instances using system installation with access control settings, the deployment of NSO in Docker containers, and introduces modern DevOps concepts and tools such as Git and Continuous Delivery/Continuous Deployment (CI/CD). You will learn how to migrate CDM devices, how to build NETCONF NEDs from the NSO CLI, how to handle NSO Alarms, and many more features that benefit you in your journey with Cisco NSO. Course Outline Introducing Network and IT Convergence Introducing Cisco NSO Architecture Introducing Linux Explaining Cisco NSO Setup Exploring Access Control Describing Integration Options Explaining Version Control System Describing Continuous Integration and Continuous Delivery Introducing Scalability and High Availability Describing Scalable System Management Describing Software Development Methodologies Introducing Service Maintenance Performing Network Element Driver (NED) Upgrades Introducing Configuration Management Describing Change Management Explaining Service Problem Management Explaining Service Monitoring and Compliance Reporting Introducing Inventory Management Describing Cisco NSO Use Cases
Duration 3 Days 18 CPD hours This course is intended for The target audience for this course includes: Software testers (both technical and user acceptance testers), Test analysts, Test engineers, Test consultants, Software developers, Managers including test managers, project managers, quality managers. Overview By the end of this course, an attendee should be able to: perform effective testing of software, be aware of techniques and standards, have an awareness of what testing tools can achieve, where to find more information about testing, and establish the basic steps of the testing process. This is an ISTQB certification in software testing for the US. In this course you will study all of the basic aspects of software testing and QA, including a comprehensive overview of tasks, methods, and techniques for effectively testing software. This course prepares you for the ISTQB Foundation Level exam. Passing the exam will grant you an ISTQB CTFL certification. Fundamentals of Testing What is Testing? Typical Objectives of Testing Testing and Debugging Why is Testing Necessary? Testing?s Contributions to Success Quality Assurance and Testing Errors, Defects, and Failures Defects, Root Causes and Effects Seven Testing Principles Test Process Test Process in Context Test Activities and Tasks Test Work Products Traceability between the Test Basis and Test Work Products The Psychology of Testing Human Psychology and Testing Tester?s and Developer?s Mindsets Testing Throughout the Software Development Lifecycle Software Development Lifecycle Models Software Development and Software Testing Software Development Lifecycle Models in Context Test Levels Component Testing Integration Testing System Testing Acceptance Testing Test Types Functional Testing Non-functional Testing White-box Testing Change-related Testing Test Types and Test Levels Maintenance Testing Triggers for Maintenance Impact Analysis for Maintenance Static Testing Static Testing Basics Work Products that Can Be Examined by Static Testing Benefits of Static Testing Differences between Static and Dynamic Testing Review Process Work Product Review Process Roles and responsibilities in a formal review Review Types Applying Review Techniques Success Factors for Reviews Test Techniques Categories of Test Techniques Choosing Test Techniques Categories of Test Techniques and Their Characteristics Black-box Test Techniques Equivalence Partitioning Boundary Value Analysis Decision Table Testing State Transition Testing Use Case Testing White-box Test Techniques Statement Testing and Coverage Decision Testing and Coverage The Value of Statement and Decision Testing Experience-based Test Techniques Error Guessing Exploratory Testing Checklist-based Testing Test Management Test Organization Independent Testing Tasks of a Test Manager and Tester Test Planning and Estimation Purpose and Content of a Test Plan Test Strategy and Test Approach Entry Criteria and Exit Criteria (Definition of Ready and Definition of Done) Test Execution Schedule Factors Influencing the Test Effort Test Estimation Techniques Test Monitoring and Control Metrics Used in Testing Purposes, Contents, and Audiences for Test Reports Configuration Management Risks and Testing Definition of Risk Product and Project Risks Risk-based Testing and Product Quality Defect Management Tool Support for Testing Test Tool Considerations Test Tool Classification Benefits and Risks of Test Automation Special Considerations for Test Execution and Test Management Tools Effective Use of Tools Main Principles for Tool Selection Pilot Projects for Introducing a Tool into an Organization Success Factors for Tools Additional course details: Nexus Humans ISTQB Software Testing Certification Training - Foundation Level (CTFL) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the ISTQB Software Testing Certification Training - Foundation Level (CTFL) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for Project team members In this course, students learn how to successfully set up functions and customizing settings for pricing in Sales and Distribution. Course Outline Condition technique for definition and maintenance of prices, surcharges and discounts Creating condition tables, access sequences, and condition types Using prices and other conditions in sales documents Promotions and sales deals Introduction to rebate processing
Duration 3 Days 18 CPD hours This course is intended for This course benefits individuals responsible for configuring and monitoring devices running the Junos OS. Overview After successfully completing this course, you should be able to: Describe the basic design architecture of the Junos OS. Identify and provide a brief overview of Junos devices. Navigate within the Junos CLI. Perform tasks within the CLI operational and configuration modes. Restore a Junos device to its factory-default state. Perform initial configuration tasks. Configure and monitor network interfaces. Describe user configuration and authentication options. Perform secondary configuration tasks for features and services such as system logging (syslog) and tracing, Network Time Protocol (NTP), configuration archival, and SNMP. Monitor basic operation for the Junos OS and devices. Identify and use network utilities. Upgrade the Junos OS. Perform file system maintenance and password recovery on a Junos device. Navigate within the Junos J-Web interface. Explain basic routing operations and concepts. View and describe routing and forwarding tables. Configure and monitor static routing. Configure and monitor OSPF. Describe the framework for routing policy and firewall filters. Explain the evaluation of routing policy and firewall filters. Identify instances where you might use routing policy. Write and apply a routing policy. Identify instances where you might use firewall filters. Write and apply a firewall filter. Describe the operation and configuration for unicast reverse path forwarding (RPF). This three-day course provides students with the foundational knowledge required to work with the Juniper Networks Junos operating system and to configure Junos devices. The course provides a brief overview of the Junos device families and discusses the key architectural components of the software. Key topics include user interface options with a heavy focus on the command-line interface (CLI), configuration tasks typically associated with the initial setup of devices, interface configuration basics with configuration examples, secondary system configuration, and the basics of operational monitoring and maintenance of Junos devices. The course then delves into foundational routing knowledge and configuration examples including general routing concepts, routing policy, and firewall filters. Course Outline COURSE INTRODUCTION Junos Operating System Fundamentals The Junos OS Traffic Processing Overview of Junos Devices User Interface Options: The Junos CLI User Interface Options The Junos CLI: CLI Basics The Junos CLI: Operational Mode The Junos CLI: Configuration Mode User Interface Options: The J-Web Interface User Interface Options The Junos CLI: CLI Basics The Junos CLI: Operational Mode The Junos CLI: Configuration Mode Initial Configuration Factory-Default Configuration Initial Configuration Interface Configuration Secondary System Configuration User Configuration and Authentication System Logging and Tracing Network Time Protocol Archiving Configurations SNMP Operational Monitoring and Maintenance Monitoring Platform and Interface Operation Network Utilities Maintaining the Junos OS Password Recovery System Clean-Up Interface Configuration Examples Review of the Interface Configuration Hierarchy Interface Configuration Examples Using Configuration Groups Routing Fundamentals Routing Concepts: Overview of Routing Routing Concepts: The Routing Table Routing Concepts: Routing Instances Static Routing Dynamic Routing Routing Policy Routing Policy Overview Case Study: Routing Policy Firewall Filters Firewall Filters Overview Case Study: Firewall Filters Unicast Reverse-Path-Forwarding Checks Class of Service CoS Overview Traffic Classification Traffic Queueing Traffic Scheduling Case Study: CoS JTAC Procedures Opening a Support Case Customer Support Tools Transferring Files to JTAC Juniper Security Concepts Security Challenges Juniper Networks? Security Focus A IPv6 Fundamentals IPv6 Addressing Protocols and Services Configuration Additional course details: Nexus Humans Juniper - Introduction to the Junos Operating System (IJOS) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Juniper - Introduction to the Junos Operating System (IJOS) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.