• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

3314 Management courses in Huntingdon delivered Live Online

Red Hat Linux Diagnostics and Troubleshooting with Exam (RH343)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The Red Hat Enterprise Linux Diagnostics and Troubleshooting course is aimed at senior system administrators who wish to learn more about troubleshooting. Overview As a result of attending this course, students should be able to analyze the operational state of computer systems and identify potential issues. When problems appear, students will be able to successfully resolve the issue, returning it to a secure and stable working condition. Students should be able to demonstrate the following skills: Diagnostic and analysis procedures Preventive maintenance planning and implementation System recovery using proven tools and techniques This course enriches your skills by providing the tools and techniques that you need to successfully diagnose, and fix, a variety of potential issues. You will work through hands-on problems in various subsystems to diagnose and fix common issues.You will learn develop the skills to apply the scientific method to a structured form of troubleshooting. You will then apply this approach in troubleshooting various types of problems, including boot issues, hardware issues, storage issues, RPM issues, network issues, third-party application issues, security issues, and kernel issues. At the end of the course, you will be empowered to complete various comprehensive review labs to test your skills.This course covers the same material as RH342, but includes the Red Hat Certified Specialist in Linux Diagnostics and Troubleshooting exam (EX342) Introduction to troubleshooting Describe a generalized strategy for troubleshooting. Take proactive steps to prevent small issues Prevent small issues from becoming large problems by employing proactive system administration techniques. Troubleshoot boot issues Identify and resolve issues that can affect a system's ability to boot. Identify hardware issues Identify hardware problems that can affect a system?s ability to operate. Troubleshoot storage issues Identify and fix issues related to storage. Troubleshoot RPM issues Identify and fix problems in, and using, the package management subsystem. Troubleshoot network issues Identify and resolve network connectivity issues. Troubleshoot application issues Debug application issues. Deal with security issues Identify and fix issues related to security subsystems. Troubleshoot kernel issues Identify kernel issues and assist Red Hat Support in resolving kernel issues. Red Hat Enterprise Linux Diagnostics and Troubleshooting comprehensive review Practice and demonstrate knowledge and skills learned in Red Hat Enterprise Linux Diagnostics and Troubleshooting. Additional course details: Nexus Humans Red Hat Linux Diagnostics and Troubleshooting with Exam (RH343) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Red Hat Linux Diagnostics and Troubleshooting with Exam (RH343) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Red Hat Linux Diagnostics and Troubleshooting with Exam (RH343)
Delivered OnlineFlexible Dates
Price on Enquiry

BA01 - Business Analysis Essentials

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Designed for individuals new to the business analyst role or those who supervise and/or work with business analysts. Overview Understand the role of the business analyst Discuss industry standards/resources for obtaining more information about business analysis Acquire a solid understanding of the various tasks/activities that comprises business analysis Recognize the pre and post project business analysis activities Learn how to plan, elicit, analyze, model, and test requirements This is an introductory course designed to provide students with a basic understanding of the benefits, functions and impact a business analyst has within an organization. The course discusses the business analysis process as it is applied throughout a project as well as the pre-project activities that comprise strategy analysis. Students learn how a business analyst supports the project throughout the solution development life cycle, from defining business needs and solution scope to validating that requirements have been met in the testing phase and ensuring the solution continues to provide value after implementation. Introduction to Business Analysis Business analysis defined The activities that comprise business analysis IIBA/PMI and the goals of a professional association IIBA?s BABOK© Guide and PMI?s Practice Guide in Business Analysis Exercise: Requirements challenges The IIBA? and the role of the Business Analyst Business analyst defined BA role vs. PM role Importance of communication/collaboration The deliverables produced as part of business analysis The BA career path Exercise: Review case Study Strategy Analysis and Change The definition of Strategy Analysis Components of Strategy Analysis Identifying stakeholders and business needs Exercises: Business Need development and RACI Stakeholder Identification Understanding and Defining Solution Scope Defining Solution Scope Project scope vs. product scope Defining a problem statement Techniques for defining scope Exercises: Conduct a brainwriting session and create a context diagram Optional exercise: Create a Use Case Diagram Understanding Requirements Define the term requirement Understand requirement types Present the requirements process Requirements vs. specifications and business rules Exercise: Identify Requirements Planning & Eliciting Requirements The Requirements Work Plan (RWP) Components of the RWP Identifying good questions for elicitation Active listening Categories and types of elicitation techniques Exercise: Planning for elicitation Analzying & Documenting Requirements Understanding requirements analysis The Business Requirements Document (BRD) The BRD vs. the functional requirements specification BRD components The purpose of packaging requirements Exercise: Analyzing Requirements Elicitation & Process Modeling Why models are created Objectives of modeling What is process management Understanding process modeling Modeling using BPMN AS-IS vs. TO-BE modeling BPMN subclasses BPMN simple structure Prototyping Business Process Modeling case study Exercises: Modeling and create a Prototype of your application Verifying & Validating Requirements The difference between validation and verification Characteristics of good requirements Risks associated with requirements Types of testing approaches Creating a test plan Requirements traceability matrix Verified and validated requirements Exercise: Testing Requirements Additional Resources Helpful links for obtaining additional business analysis information Additional course details: Nexus Humans BA01 - Business Analysis Essentials training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the BA01 - Business Analysis Essentials course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

BA01 - Business Analysis Essentials
Delivered OnlineFlexible Dates
Price on Enquiry

C)CSA: Cybersecurity Analyst Mile 2

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Security Professionals Incident Handling Professionals Anyone in a Security Operations Center Forensics Experts Cybersecurity Analysts Overview Our Certified Cyber Security Analyst course helps you prepare an organization to create a complete end to end solution for proactively monitoring, preventing, detecting, and mitigating threats as they arise in real time. Do not fool yourself, this course is far more advanced than you may expect. It is fast paced and thorough, so you can enjoy a well-rounded experience. Be ready to dig deep into the details of security analysis for today's needs. When we are done you will be able to setup and deploy state of the art open source and for purchase analysis tools, intrusion detection tools, syslog servers, SIEMs, along with integrating them for the entire company to find and an many cases prevent today's exploits. This course maps to the mile2 Certified Cyber Security Analyst Exam as well as the CompTIA CySA+CS0-001 certification exam. Our Certified Cyber Security Analyst course helps you prepare an organization to create a complete end to end solution for proactively monitoring, preventing, detecting, and mitigating threats as they arise in real time.Do not fool yourself, this course is far more advanced than you may expect. It is fast paced and thorough, so you can enjoy a well-rounded experience. Be ready to dig deep into the details of security analysis for today?s needs.When we are done you will be able to setup and deploy state of the art open source and for purchase analysis tools, intrusion detection tools, syslog servers, SIEMs, along with integrating them for the entire company to find and an many cases prevent today?s exploits.This course maps to the mile2 Certified Cyber Security Analyst Exam as well as the CompTIA CySA+CS0-001 certification exam. Blue Team?Principles Network Architecture?and how it lays the groundwork Defensive Network Security Data Locations?and how they tie together Security?Operations?Center The People, Processes, and Technology Triage and Analysis Digital Forensics Incident Handling Vulnerability Management Automation, Improvement, and Tuning Digital?Forensics Investigative Theory and?Processes Digital Acquisition Evidence Protocols Evidence Presentation Computer Forensics?Laboratory Protocols Processing Techniques Specialized?Artifacts Advanced Forensics for Today?s?Exploitations Malware Analysis Creating the Safe Environment Static Analysis Dynamic Analysis Behavior Based Analysis What is different about?Ransomware? Manual Code Reversing Traffic Analysis Manual Analysis Principles Automated?Analysis Principles Signatures?compared to?Behaviors Application Protocols Analysis Principles Networking Forensics Assessing the Current State of Defense with the?Organization Network Architecture and Monitoring Endpoint Architecture and Monitoring Automation, Improvement, and continuous?monitoring Leveraging SIEM for Advanced Analytics Architectural Benefits Profiling and?Baselining Advanced Analytics Defeating the Red Team with Purple Team tactics Penetration Testing?with full knowledge Reconnaissance Scanning Enumeration Exploitation Lateral Movement Additional course details: Nexus Humans C)CSA: Cybersecurity Analyst Mile 2 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the C)CSA: Cybersecurity Analyst Mile 2 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

C)CSA: Cybersecurity Analyst Mile 2
Delivered OnlineFlexible Dates
Price on Enquiry

Terraform 101

By Nexus Human

Duration 3 Days 18 CPD hours Overview VMware vSphere: What's New [V8] https://lms.nhcms.neYou will learn essential Terraform concepts including: Writing Terraform HCL code Deploying into common clouds such as AWS, Azure, Docker, Kubernetes, and VMWare Where Terraform fits in the Enterprise CI/CD model Differences between Terraform and Ansible As enterprises seek to deploy and maintain increasingly complex cloud infrastructure, there is a necessity to use ?Infrastructure as Code? (IaC) tools, like Terraform. An open-source, state management tool developed by HashiCorp, Terraform allows developers to use a common coding interface to work through their various clouds safely and efficiently. Attendees will leave being able to write and understand Terraform code (HCL), have a clear understanding of Terraform?s various components and supporting tools, as well as when to reach for Terraform over another IaC tool, such as Ansible. This class prepares you for Terraform Certifcation. Up and Running with Terraform Terraform Overview Defining ?declarative? How to think about Terraform (versus Ansible) Reviewing the Terraform Configuration Running the Terraform Configuration Provisioners Syntax Low Level? HCL syntax Style Conventions Comments Blocks Arguments JSON Configuration Syntax Resources Meta-Arguments depends_on count for_each provider lifecycle Data Sources Variables and Output Input Variables Output Values Local Values Functions String Collection Numeric Encoding Filesystem Date and Time Hash and Crypto IP Network Type Conversion Modules Module Blocks Module Sources Meta Arguments Terraform Templates templatefile Function Template Demonstration Introducing Data Sources Creating an External Data Source Building tftpl template files Expressions Types and Values Strings and Templates Reference to Values Operators Function Calls Conditionals For Expressions Splat Expressions Dynamic Blocks Type Constraints Version Constraints State Understanding the importants of states state storage and locking importing existing resources Remote State What to do when local state is lost CICD Piplines with Terraform Terraform and GitLab pipelines Terraform and Jenkins pipelines Enterprise Case Studies Terraform and Docker Terraform and Kubernetes Terraform and Amazon AWS Terraform and Azure Terraform and VMWare Understanding how to apply Terraform to your unique infrastructure Beyond Basics Intro to Go Programming Terraform Cloud Additional HashiCorp Offerings Backends Secrets Additional course details: Nexus Humans Terraform 101 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Terraform 101 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Terraform 101
Delivered OnlineFlexible Dates
Price on Enquiry

Ethereum Training - Blockchain Development Bootcamp

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Programmers Application DevelopersSystem Architects Network ArchitectsNetwork Security Architects IT Professionals w/programming experience Overview Those who attend the Ethereum Development course and pass the exam certification will have a demonstrated knowledge of:An excellent overall understanding of the Ethereum architecture and Solidity language.All functional components (including smart contracts) required to develop an Ethereum Blockchain.The understanding of how to instantiate an Ethereum application on the network.An in-depth understanding of how transactions are created and implemented on an Ethereum network. This 3 day instructor-led course is designed for programmers and developers who want to take a comprehensive deep dive in writing smart contracts and building applications that interact with them. This course provides detailed overviews of Ethereum, smart contracts, and the development language, Solidity. The student will be exposed to Ethereum?s adaptable feature set which allows the developer to design decentralized applications for countless applications. Students will also participate in hands-on programming lab sessions to learn, develop, and advance their skills in Ethereum development. The Ethereum Development Training Course is designed for those seeking an in-depth understanding and development experience of the Ethereum Blockchain platform. Students will participate in approximately 50% programming lab time providing practical experience, enhancing their knowledge and existing skill set. What is Blockchain and Smart Contracts? What is Blockchain and how does it work? Bitcoin vs Ethereum Smart Contract How you can use Smart Contracts? Advantages of Smart Contracts Solidity LAB TASK Types of Variables in Solidity Public and Private Code Public Variables and Functions Private Variables and Functions Internal Functions External Functions Smart Contract Constructors Constant Variables Setting Variables LAB CHALLENGE Smart Contracts With WEB3.JS LAB Installing & Running the Ethereum TestRPC Installing Web3.js Changing the Environment in Remix Creating the UI Using Web3.js to Connect & Interact with the Smart Contract SOLUTION LAB CHALLENGE Smart Contract Events With WEB3.JS AIM LAB The Current Contract Defining the Smart Contract Event Updating the UI LAB CHALLENGE Functions, Mappings and Structs THEORY Functions Mappings Structs LAB The Smart Contract Creating a Modifier Using the Modifier Web3 UI?s Modifier Handling LAB Creating a Struct Creating the Mapping Map Addition Get from the Mapping The Full Contract Count from Map LAB CHALLENGE Inheritance and Deployment THEORY Object-oriented programming Inheritance LAB Current Contract Creating a Base Contract Changing from Strings to bytes Continuing the Project Installing MetaMask Deploy Contract to the Ropsten Test Network LAB Update the HTML Form Update the JavaScript Using the App LAB CHALLENGE Embark Framework and It's Deployment Blockchain (Ethereum) Decentralized Storage (IPFS) Decentralized Communication Web Technologies LAB Installing Embark Framework Hello World with Embark Framework First Contract Deployment with Embark Framework Solidity Smart Contracts Testing THEORY What is Software Testing? LAB LAB CHALLENGE Contracts Management With Factories THEORY Factory LAB LAB CHALLENGE IPFS Files Hosting THEORY IPFS FILES HOSTING LAB 1. Get your hosting server 2. Install IPFS on the Server LAB CHALLENGE End to End Development of DAPP AIM LAB Setup the Project Program the Smart Contract Create the Front-end of the application Deploy the App with IPFS LAB CHALLENGE

Ethereum Training - Blockchain Development Bootcamp
Delivered OnlineFlexible Dates
Price on Enquiry

Certified Information Privacy Professional (CIPP/US)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Data Protection Officers Data Protection Managers Auditors Legal Compliance Officers Security Manager Information Managers Anyone involved with data protection processes and programs Overview It will show the world that students know privacy laws and regulations and how to apply them, and that students know how to secure your place in the information economy. When students earn a CIPP credential, it means they've gained a foundational understanding of broad global concepts of privacy and data protection law and practice, including: jurisdictional laws, regulations and enforcement models; essential privacy concepts and principals; legal requirements for handling and transferring data and more. The Certified Information Privacy Professional/United States (CIPP/US) program, developed by the International Association of Privacy Professionals (IAPP) - the world?s largest comprehensive global information privacy community and resource, was the first professional certification ever to be offered in information privacy. The CIPP/US credential demonstrates a strong foundation in U.S. privacy laws and regulations and understanding of the legal requirements for the responsible transfer of sensitive personal data to/from the U.S., the EU and other jurisdictions.This course will provide you with a foundational understanding of broad global concepts of privacy and data protection law and practice, including: jurisdictional laws, regulations and enforcement models; essential privacy concepts and principals; legal requirements for handling and transferring data and more. Introduction to privacy Modern history of privacy Introduction to personal information Overview of data protection roles Summary of modern privacy frameworks Structure of U.S. law Structure and sources of U.S. law and relevant terms Governmental bodies having privacy and information security authority General Data Protection Regulation overview (GDPR) High-level overview of the GDPR Significance of the GDPR to U.S. organizations Roles and responsibilities outlined in the law California Consumer Privacy Act of 2018 (CCPA) High-level overview of the newly passed California Consumer Privacy Act of 2018 Scope Consumer rights Business obligations Enforcement Enforcement of U.S. privacy and security laws Distinguishing between criminal and civil liability Comparing federal and state authority Theories of legal liability Enforcement powers and responsibilities of government bodies, such as the FTC and state attorneys general Information management from a U.S. perspective Developing a privacy program Role of privacy professionals and accountability Employee training User preferences Managing vendors Data classification Federal versus state authority Differences between federal and state authority Preemption Healthcare Privacy laws in healthcare Major components of HIPAA Development of HITECH Privacy protections mandated by other significant healthcare laws Financial privacy Goals of financial privacy laws Key concepts of FCRA, FACTA and GLBA Red Flags Rule, Dodd-Frank and consumer protection laws Education Privacy rights and protections under FERPA Recent amendments provided by PPRA and NCLBA Telecommunications and marketing Rules and regulations of telecommunications entities Laws that govern marketing Addressing privacy in the digital advertising Law enforcement and privacy Privacy laws on intercepting communication Telecommunications industry and law enforcement Laws ensuring rights to financial privacy National security and privacy Rules and regulations on intercepting communication Evolution of the law Collaboration of government agencies and private companies to improve cybersecurity Civil litigation and privacy Privacy issues related to litigation Electronic discovery, redaction and protective orders U.S. discovery rules versus foreign laws Legal overview of workplace privacy Federal and state laws regulating and protecting employee privacy Federal laws prohibiting discrimination Privacy before, during and after employment Lifecycle of employee privacy Background screening Employee monitoring Investigating misconduct and termination Antidiscrimination laws ?Bring your own device? policies State data security laws State laws impacting data security Social Security number use regulation Laws governing data destruction Data breach notification laws Scope of state data breach notification law Nine elements of state data breach notification laws Major differences in state laws

Certified Information Privacy Professional (CIPP/US)
Delivered OnlineFlexible Dates
Price on Enquiry

Business development for professional services (In-House)

By The In House Training Company

The market for professional services is becoming increasingly competitive, with some firms and individuals becoming very effective at winning new work, leaving others lagging way behind. Given the choice between spending time on client work and business development work, we all tend to choose that which we feel to be easier, more attractive and more aligned with our image of ourselves. We stay within our comfort zones, we focus on client work, and we only resort to business development work when we have to, which can also lead to 'feast or famine' syndrome. The programme will help participants: Understand the professional business development approach and the style that is appropriate for their business and their clients Follow a process to guide their conversations and business development meetings Prepare thoroughly for a business development meeting/contact with a client to ensure they use their time efficiently and maximise results Create a great first impression and professional opening to a conversation Ask open questions and listen effectively in order to spot opportunities, understand needs and progress the opportunity Identify and understand buying and decision-making processes and criteria Skilfully and confidently handle questions and objections Sell the benefits of their services and approach over those of their competitors Progress the sale by agreeing next steps and gaining commitment appropriately 1 Introduction Aims and objectives of the programme Personal introductions and objectives Workshop overview 2 An introduction to business development and selling for professionals What is selling? Who are you selling to? The buying experience What clients want The four-step business development process The business development cycle and pipeline management Upselling and cross-selling as well as winning new clients 3 Networking and generating leads What is networking? Networking objectives It's not what you know but who you know Asking for referrals and introductions Making appointments from networking activity 4 Opening the sales relationship/sales meeting What potential customers are thinking Judging first impressions Creating positive first impressions Building rapport and creating interest and impact Earning the right 5 Core communication skills for professional selling Overcoming barriers to listening The art of listening Questioning refresher Types of questions Questioning funnel 6 Understanding and identifying needs and opportunities Identifying the questions to ask to identify needs and opportunities Questions to move us through the buying and selling process Understanding their buying processes Asking questions that position you as a 'trusted adviser' The questions that give you a competitive advantage Knowing when you have asked enough questions 7 Introducing solutions Tailoring your 'pitch' to the client Speaking the client's language Using features and benefits Applying the benefit cycle 8 Handling objections and concerns Identifying the typical objections and concerns Understanding why clients raise objections and concerns Following a structure for handling objections Handling the price objection 9 Gaining commitment Knowing when to close The art of checking Recognising buying signals Small c and big C 10 Putting it all together Personal learning summary and action plans

Business development for professional services (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry

Accounting courses

By Osborne Training

Want a new direction for your career? Think Accountancy, according to statistics, the average salary for Accountants is £50,000, it is the sector where the employability rate is higher than any other sector. Whether you're a school leaver, already employed or simply looking for a career change a career in accountancy could be a real option for you. What is AAT? The AAT is an internationally recognised accounting qualification and over 100,000 people are currently benefiting from gaining an AAT qualification and full AAT membership. Gaining the qualification will help you support yourself throughout your accountancy career. AAT Accounting Courses Overview: First of all, the AAT qualification consists of four progressive qualification levels (1, 2, 3 & 4) which will cover the key areas of Financial Accounting, Management Accounting, Taxation, Audit and Report Writing. Although you can start from Level 1, you may start from Level 2 if you have basic math and numeracy skills. In order to complete the full AAT Accounting qualification and gain full membership of the AAT, you will need to complete Level 3 and Level 4. Level 2 is recommended as an entry-level if you have no experience or knowledge of accounting and bookkeeping. The AAT qualification for accounting is broken down into three levels: AAT Level 2 Foundation Certificate in Accounting (5 Papers/Subjects) AAT Level 3 Advanced Diploma in Accounting (6 Papers/Subjects) Finally AAT Level 4 Professional Diploma in Accounting (6 Papers/Subjects) Hence, the AAT Accounting Qualification gives you practical, internationally recognised finance and accountancy skills that can open doors for you in many industries across the world. Finally, AAT offers a range of benefits for student members (including study support, career advice to help find the perfect job and exclusive discounts), as well as a route to progress into chartered accountancy. Moreover, if you choose to further your studies with any of the leading chartered accountancy professional bodies like ACCA, CIMA, CIPFA etc. your AAT qualification could make you eligible for generous exemptions. A Certificate of Attendance. A newly qualified AAT member can expect to earn an average of £21,600. Moreover, the AAT member will have been earning throughout their training and will have avoided student debt. Accounting technicians work at all levels of finance and accounting, depending on the level of their career. Some accounting technicians work as accounts clerks, others go on to become managing directors or finance directors of well-known companies. Some go to work as a self-employed accountant as AAT allows the student to become Accredited.

Accounting courses
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Communication Manager Administration v12.5 (CMA)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for The primary audience for this course is as follows: Customers configuring and maintaining CUCM 8.x, 9.x, 10.x, 11.0, or 12.x. PBX System Administrators transitioning to CUCM administration IP networking professionals taking on responsibility for CUCM administration Workers being cross-trained for CUCM administration coverage The secondary audience for this course is as follows: Cisco Unified Communications system channel partners and resellers Overview Upon completing this course, the learner will be able to meet these overall objectives: Demonstrate an overall understanding of the Cisco Unified Communications Manager (CUCM) 12.x (or earlier version) system and its environment Configure CUCM to support IP Phones in multiple locations Configure CUCM to route calls to internal and PSTN destinations Configure User accounts and multi-level administration Understand User Web Page functionality Configure user features, including Hunt Groups, Call Pickup, and Call Park. Understand the capabilities of and demonstrate the Bulk Administration Tool Understand the SMART Licensing model for Cisco Unified Communications Understand and demonstrate the use of the Unified Reporting tool Understand and demonstrate the use of the Dialed Number Analyzer Communications Manager Administration for Version 12.5 (CMA v12.5) is an instructor-led course presented to system administrators and customers involved with the day-to-day operation of the Cisco Unified Communications Manager product. This course introduces you to the CUCM system, the necessary procedures for administering IP Phones and Users, understanding the Dial Plan and implementing Features. In addition to instructor-led lectures and discussions, you will configure CUCM and Cisco IP Phones in the lab, either in a live classroom or WebEx remote classroom environment. While the Cisco Unified Communications Manager software used in the class is version 12.5.1, the course material applies to versions 8.x, 9.x, 10.x, 11.x, or 12.x. The concepts and the lab tasks are the same for most of the Cisco Unified Communications Manager software versions CUCM System Basics Introduction to IP Telephony Traditional Voice vs. IP Telephony Clustering Overview Intra-Cluster Communications CUCM Redundancy Options Deployment Models Campus (Single Site) Deployment Centralized Call Processing Deployment Distributed Call Processing Deployment Clustering over the IP WAN Call Processing Deployment Hybrid Call Processing Deployment Basics of CUCM Configuration Administrative Interfaces Administration and Serviceability Unified Reporting and the Enterprise License Manager Disaster Recovery System and Unified OS Administration Navigation Bar Command Line Interface Server Redundancy: CM Groups CM Group Configuration Date/Time Group Regions and Codecs Locations Device Pool Configuration Service Parameters Configuration Enterprise Parameters Configuration Supporting Phones and Users Configuring CUCM to Support Phones Cisco Unified IP Phone Model Ranges Specialized Cisco IP 89xx and 99xx phones Cisco Jabber Client Phone Button Templates Softkey Template Cisco IP Phone Registration Device Defaults Phone Configuration Manual Phone Configuration Auto-Registration Self-Provisioning Using the Bulk Administration Tool (BAT) Deploying new phones and users Overview of the Auto-Register Phone Tool Configuring CUCM to Support Users Understanding CUCM Users Manual User Creation User Import with BAT Importing Users with LDAP Sync LDAP Authentication Understanding User Administration Configuring User Administration Working with Access Control Groups Assigning End Users to Access Control Groups User Web Pages Understanding the Dial Plan Dial Plan Overview Introduction to the Dial Plan Understanding Dial Plan Components Route Lists, Route Groups and Devices Call Routing Understanding Digit Analysis Basics of Dial Plan Configuration Basics of the Dial Plan Dial Plan Configuration Translation Patterns Route Plan Report Advanced Dial Plan Configuration Understanding Digit Manipulation External Phone Number Masks Transformation Masks Discard Digits Instructions: PreDot Class of Control Overview of Class of Control Partitions and Calling Search Space Traditional vs. Line/Device Approach Configuring Partitions and CSSs Time of Day Routing PLAR Application Forced Authorization Codes CUCM Features Media Resources Overview of Media Resources Conference Bridge Music on Hold Transcoder Annunciator Overview of Media Resource Management Configuring Media Resources User Features Configuring Call Coverage in Cisco Unified Communications Manager Call Coverage in Cisco Unified Communications Manager Hunt Group Overview Hunt Group Configuration Final Forwarding Shared Lines Call Pickup Directed and Group Call Pickup Call Park Lab Outline Configuring the System to Support Cisco IP Phones Creating and Associating Users Configuring Basic Dial Plan Elements Configuring Complex Dial Plan Elements Implementing Class of Control Configuring Media Resources Configuring Hunt Groups and Call Coverage Configuring Call Pickup and Call Park

Cisco Communication Manager Administration v12.5 (CMA)
Delivered OnlineFlexible Dates
Price on Enquiry

Big Data Architecture Workshop

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Senior Executives CIOs and CTOs Business Intelligence Executives Marketing Executives Data & Business Analytics Specialists Innovation Specialists & Entrepreneurs Academics, and other people interested in Big Data Overview More specifically, BDAW addresses advanced big data architecture topics, including, data formats, transformation, real-time, batch and machine learning processing, scalability, fault tolerance, security and privacy, minimizing the risk of an unsound architecture and technology selection. Big Data Architecture Workshop (BDAW) is a learning event that addresses advanced big data architecture topics. BDAW brings together technical contributors into a group setting to design and architect solutions to a challenging business problem. The workshop addresses big data architecture problems in general, and then applies them to the design of a challenging system. Throughout the highly interactive workshop, students apply concepts to real-world examples resulting in detailed synergistic discussions. The workshop is conducive for students to learn techniques for architecting big data systems, not only from Cloudera?s experience but also from the experiences of fellow students. Workshop Application Use Cases Oz Metropolitan Architectural questions Team activity: Analyze Metroz Application Use Cases Application Vertical Slice Definition Minimizing risk of an unsound architecture Selecting a vertical slice Team activity: Identify an initial vertical slice for Metroz Application Processing Real time, near real time processing Batch processing Data access patterns Delivery and processing guarantees Machine Learning pipelines Team activity: identify delivery and processing patterns in Metroz, characterize response time requirements, identify Machine Learning pipelines Application Data Three V?s of Big Data Data Lifecycle Data Formats Transforming Data Team activity: Metroz Data Requirements Scalable Applications Scale up, scale out, scale to X Determining if an application will scale Poll: scalable airport terminal designs Hadoop and Spark Scalability Team activity: Scaling Metroz Fault Tolerant Distributed Systems Principles Transparency Hardware vs. Software redundancy Tolerating disasters Stateless functional fault tolerance Stateful fault tolerance Replication and group consistency Fault tolerance in Spark and Map Reduce Application tolerance for failures Team activity: Identify Metroz component failures and requirements Security and Privacy Principles Privacy Threats Technologies Team activity: identify threats and security mechanisms in Metroz Deployment Cluster sizing and evolution On-premise vs. Cloud Edge computing Team activity: select deployment for Metroz Technology Selection HDFS HBase Kudu Relational Database Management Systems Map Reduce Spark, including streaming, SparkSQL and SparkML Hive Impala Cloudera Search Data Sets and Formats Team activity: technologies relevant to Metroz Software Architecture Architecture artifacts One platform or multiple, lambda architecture Team activity: produce high level architecture, selected technologies, revisit vertical slice Vertical Slice demonstration Additional course details: Nexus Humans Big Data Architecture Workshop training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Big Data Architecture Workshop course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Big Data Architecture Workshop
Delivered OnlineFlexible Dates
Price on Enquiry