• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

3380 Management courses in Matlock delivered Live Online

EXIN Cloud Computing Foundation

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Diese Zertifizierung richtet sich an Experten aus Geschäftsbetrieben aller Branchen, die mit der Cloud-Technologie arbeiten oder an dieser Technologie und ihrem Nutzen für Unternehmen interessiert sind: Alle Mitarbeiter von internen oder externen Service Providern, Ihre Kunden Manager, Auditoren Overview Die Zertifizierung EXIN Cloud Computing Foundation validiert das Wissen von Kandidaten in folgenden Bereichen: Cloud - Prinzipien Implementierung von Management des Cloud Computing Nutzung von Cloud Computing Sicherheit, Identität und Privatsphäre im Cloud Computing Bewertung des Cloud Computing Unter Cloud Computing versteht man die Implementierung und Nutzung der Cloud - Technologie um IT - Services bereitzustellen, die an einem andren Standort gehostet werden. Cloud-Prinzipien Das Cloud - Konzept Entwicklung des Cloud Computing Cloud - Architektur Vorteile und Beschr„nkungen des Cloud Computing Implementierung und Management des Cloud Computing Aufbau lokaler Cloud - Umgebungen Management - Prinzipien fr Cloud - Services Nutzung von Cloud Computing Zugriff auf die Cloud Untersttzung von Business - Prozessen durch Cloud Computing Cloud - Nutzung durch Service Provider Sicherheit, Identit„t und Privatsph„re im Cloud Computing Sicherheit im Cloud Computing Identit„ts- und Privatsph„renmanagement Bewertung des Cloud Computing Business Cas fr das Cloud Computing Bewertung von Cloud - Implementierungen

EXIN Cloud Computing Foundation
Delivered OnlineFlexible Dates
Price on Enquiry

Salesforce Build System Architect Expertise (ARC902)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This class is designed for enterprise architects, solution architects, and business analysts working to earn their Salesforce System Architect credential, for consultants or technical experts working to earn their individual Architect Designer credential, and for Salesforce Developers and Administrators looking to expand their overall capabilities with the Salesforce Platform. Overview Recommend appropriate integration patterns (Remote Process Invocation - Request and Reply, Remote Process Invocation - Fire and Forget, Batch Data Synchronization, Remote Call-In, and UI Update Based on Data Changes) to address integration requirements. Recommend appropriate integration capabilities (SOAP, REST, bulk, streaming, canvas, Workflow outbound, Apex, and Salesforce Connect) to address integration requirements. Recommend the appropriate SSO Flow or OAuth flow to address identity and access management requirements. Dive into the two cornerstone domains of being a System Architect: Integration Architecture, and Identity and Access Management. In this 4-day workshop, our Architect experts will present you with a case study scenario that will be broken down and digested through iterative exploration. Learn how to design and build secure, scalable, and high-performing integration and identity solutions through a combination of lecture, demos, hands-on exercises, and workshop presentations and discussions. Integration Capabilities Create, Retrieve, Update, or Delete Records with SOAP API Integrate with Salesforce Using REST API Insert, Update, Upsert, or Delete Large Volumes of Data with BULK API Push Relevant Data to Users in Real Time with Streaming API Send Information to a Designated Endpoint with Outbound Message Integrate Your Apex with an External Service Using Callouts Integrate Data from an External Data Source Using Salesforce Connect Synchronize Data with Heroku Connect Connect Business Processes in Salesforce with Platform Events Publish Change Events with Change Data Capture Integration Patterns Invoke Remote Call-In Patterns Invoke Request and Reply Patterns Invoke Fire and Forget Patterns Synchronize Batch Data Update UI Based on Data Changes Visualize Data Identity Management Review SSO Fundamentals Review Identity Management Review Identity Management Concepts Understand Salesforce as an Identity Provider Accept Third-Party Identity in Salesforce Understand Social Sign-On and Open ID Connect Enable Users to Authenticate with SSO Flows Initiate Flows with IDP Initiate Flows with SP Troubleshoot Identity Issues Authentication Grant Client Application Access with OAuth Flow Generate Access Tokens with Username Password Flow Initiate Web Server Flow Grant Application Access with User Agent Flow Connect to Salesforce Using JWT Flow

Salesforce Build System Architect Expertise (ARC902)
Delivered OnlineFlexible Dates
Price on Enquiry

Free Webinar | Introduction to Build To Rent (BTR)

4.3(5)

By Bayfield Training

Build- to- rent involves the construction of purpose- built residential buildings with the intention of renting out the units for the long term, rather than selling the individually. On this webinar, we will introduce the concept of Build-to-rent (BtR) and explore the key features, including design considerations, financial models and management strategies. We will also discuss the benefits of BTR investors, tenants, and communities as well as potential challenges and risk associated with this type of investment.

Free Webinar | Introduction to Build To Rent (BTR)
Delivered OnlineFlexible Dates
FREE

EXIN Information Security Foundation based on ISO/IEC 27001 - Professional

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Security professionals. This module is intended for everyone who is involved in the implementation, evaluation and reporting of an information security program, such as an Information Security Manager (ISM), Information Security Officer (ISO) or a Line Manager, Process Manager or Project Manager with security responsibilities. Basic knowledge of Information Security is recommended, for instance through the EXIN Information Security Foundation based on ISO/IEC 27001 certification. Overview The module Information Security Management Professional based on ISO/IEC 27001 (ISMP.EN) tests understanding of the organizational and managerial aspects of information security.The subjects of this module are: Information security perspectives: business, customer, service provider/supplier Risk Management: analysis, controls, remaining risks Information security controls: organizational, technical, physical. Information security is the preservation of confidentiality, integrity and availability of information (ISO/IEC 27000 definition). Information security is gaining importance in the Information Technology (IT) world. Globalization of the economy is leading to an ever-increasing exchange of information between organizations (their staff, customers and suppliers) and an explosion in the use of networked computers and computing devices. The core activities of many companies completely rely on IT. Enterprise resource planning (ERP) management systems, the control systems that govern how a building runs or a manufacturing machine functions, day-to-day communications - everything - runs on computers. The vast majority of information - the most valuable commodity in the world - passes through IT. Information is crucial for the continuity and proper functioning of both individual organizations and the economies they fuel; this information must be protected against access by unauthorized people, protected against accidental or malicious modification or destruction and must be available when it is needed. Companies and individual users of technology are also beginning to understand how important security is and are beginning to make choices based on the security of the technology or service. Information Security Perspectives The candidate understands the business interest of information security The canidate understands the customer perspective on governance The candidate understands the supplierïs responsibilities in security assurance Risk Mangement The candidate understands the principles of risk management The candidate knows how to control risks The candidate knows how to deal with remaining risks Information Security Controls The candidate has knowledge of organizational controls The candidate has knowledge of technical controls The candidate has knowledge of physical, employment-related and continuity controls

EXIN Information Security Foundation based on ISO/IEC 27001 - Professional
Delivered OnlineFlexible Dates
Price on Enquiry

IATP - Non-Licensable Work With Asbestos Including NNLW

By Airborne Environmental Consultants Ltd

This course provides the delegate with the theoretical and practical skills to undertake non-licensed works with ACM's. Persons requiring this type of training would include trade operatives undertaking tasks with ACM's as defined in HSG210 and in accordance with CAR 2012 Reg 3(2). In addition to the Asbestos Awareness, those employees whose work will knowingly disturb ACMs, and which is defined as non-licensable work or NNLW, should receive additional task-specific information, instruction and training.

IATP - Non-Licensable Work With Asbestos Including NNLW
Delivered in Manchester + 1 more or OnlineFlexible Dates
£175

Cisco Video Infrastructure Implementation v1.0 (VII)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Channel Field Engineers Employees Overview After taking this course, you should be able to: Define Cisco Business TelePresence Solutions components and architectures Implement Cisco TelePresence Video Communication Server (Expressway) for basic and advanced video networks Implement Cisco TelePresence Management Suite (TMS) Configure Cisco Meeting Server Features Define integration of Cisco Collaboration Premise Solutions with Cisco Cloud, including Cisco Spark, Cisco Spark Hybrid, and WebEx Cisco Video Infrastructure Implementation (VII) v1.0 will provide you with the necessary knowledge and skills to implement a complete Cisco TelePresence solution, including TelePresence endpoints, integration of premise with cloud solutions, meeting solutions, and management software. It describes Cisco business TelePresence solutions and enables students to implement and troubleshoot basic and advanced TelePresence network solutions. Module 1: Advanced Cisco Expressway Features Lesson 1: Introducing Cisco Video Network Solutions Lesson 2: Exploring Cisco Expressway Basic Setup Lesson 3: Explaining Regular Expressions in a Cisco Expressway Environment Lesson 4: Deploying Components of Cisco Expressway Security Lesson 5: Exploring the Fundamentals of Subzones on a Cisco Expressway Lesson 6: Administering Call Control on a Cisco Expressway Lesson 7: Implementing Subzone Bandwidth Management on a Cisco Expressway Lesson 8: Implementing Zones on a Cisco Expressway Lesson 9: Exploring Clustering on the Cisco Expressway Lesson 10: Applying Troubleshooting on the Cisco Expressway Module 2: Advanced Cisco Meeting Server Features Lesson 1: Introducing the Cisco Meeting Server Lesson 2: Exploring Cisco Meeting Server API Configuration Lesson 3: Exploring Cisco Meeting Server Resilient and Scalable Deployments Lesson 4: Exploring Additional Features with Cisco Meeting Server Module 3: Cisco Collaboration Meetin gRoom Solutions wiht Cisco TelePresence Server Lesson 1: Introducing Cisco Collaboration Meeting Room Cloud, Premises, and Hybrid Products Lesson 2: Deploying the Cisco TelePresence Server and Cisco TelePresence Conductor Lesson 3: Applying Troubleshooting to Cisco CMR Premises Solutions Module 4: Cisco TelePresence Management Suite Solution Lesson 1: Explaining Cisco TMS Installation Lesson 2: Describing Cisco TMS Operation Lesson 3: Explaining Cisco TMS Conference Scheduling and Management Lesson 4: Configuring Permissions on Cisco TMS for Administration Lesson 5: Applying Troubleshooting to Cisco TMS Module 5: Cisco Cloud Solutions?WebEx and Spark Lesson 1: Introducing Cisco WebEx and Cisco Spark Cloud Solutions Lesson 2: Exploring Cisco Spark Administration Configuration Lesson 3: Deploying Cisco Spark Hybrid Services Lesson 4: Exploring Cisco Spark APIs and BOTs Configuration Module 6: Cisco TelePresence Content Server (Optional Module) Lesson 1: Examining Cisco TCS Operation and Configuration

Cisco Video Infrastructure Implementation v1.0 (VII)
Delivered OnlineFlexible Dates
Price on Enquiry

Unlock Your Public Speaking Confidence

By Samina Arshad

Welcome to Embrace Public Speaking with Confidence Group Coaching event! Are you tired of feeling nervous and anxious when speaking in public? Join us on Thu Sep 26 2024 at 9.30 AM at The Warehouse - Birmingham Friends of the Earth environmental community hub to conquer your fears and become a confident speaker. This in-person event will explore practical techniques and strategies to help you communicate effectively and confidently in front of any audience. Enhance your leadership skills with this group coaching session to become more aware of your Public Speaking style, and preferences, thus, becoming amicable with expressing your voice effectively for impact at various levels. This may be publically with stakeholders, at a system, or partner level and with your customers, families or service users (outwardly) and within your team and organisation (inwardly). Don't miss this opportunity to boost your public speaking skills and unleash your full potential. See you there! Why not visit the Enigma company website for more information about us: www.enigmaccs.co.uk

Unlock Your Public Speaking Confidence
Delivered OnlineFlexible Dates
£97 to £150

Cisco Implementing Automation for Cisco Security Solutions v1.0 (SAUI)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Channel and Customer Engineers Network Engineer System Engineer Wireless Engineer Consulting Systems Engineer Technical Solutions Architect Network Admisnistrator Wireless Design Engineer Network Manager Channel SEs Sales Engineer Channel AMs Account Manager Overview Upon completing this course, students will be able to meet these objectives: Understand the overall architecture of the Cisco security solutions and how APIs help enable security Understand how to use Cisco Firepower APIs Understand how pxGrid APIs function and their benefits Understand what capabilities the Cisco Stealthwatch APIs offer and construct API requests to them for configuration changes and auditing purposes Understand the features and benefits of using Cisco Stealthwatch Cloud APIs Learn how to use the Cisco Umbrella Investigate API Understand the Functionality provided by Cisco AMP and its APIs Learn how to use Cisco Threat Grid APIs to analyze, search, and dispose of threats This course demonstrates the tools and the benefits of leveraging programmability and automation in Cisco Security Solutions, including Cisco Firepower Management Center, Cisco Firepower Threat Defense, Cisco ISE, Cisco pxGrid, Cisco Stealthwatch Enterprise, Cisco Stealthwatch Cloud, Cisco Umbrella, Cisco AMP, Cisco Threat grid, and Cisco Security Management Appliances. Students will learn how to use the API for each Cisco security solution and specific applications of when the API benefits IT security content. Introducing Cisco Security APIs Role of APIs in Cisco Security Solutions Cisco Firepower, Cisco ISE, Cisco pxGrid, and Cisco Stealthwatch APIs Use cases and security workflow Consuming Cisco Advanced Malware Protection APIs Cisco AMP overview Cisco AMP endpoint API Cisco AMP use cases and workflows Discovery 1: Query Cisco AMP endpoint APIs for verifying compliance Using Cisco ISE Introducing Cisco Identity services engine Cisco ISE use cases Cisco ISE APIs Using Cisco pxGrid APIs Cisco pxGrid overview WebSockets and STOMP messaging protocol Discovery 2: Use the REST API and Cisco pxGrid with Cisco Identity services engine Using Cisco Threat Grid APIs Cisco threat grid overview Cisco threat grid API Cisco threat grid use cases and workflows Discovery 3: Construct a Python script using the Cisco threat grid API Investigating Cisco Umbrella Security Data Programmatically Cisco Umbrella investigate API overview Cisco Umbrella investigate API: Details Discovery 4: Query security data with the Cisco Umbrella investigate API Exploring Cisco Umbrella Reporting and Enforcement APIs Cisco Umbrella reporting and enforcement APIs: Overview Cisco Umbrella reporting and enforcement APIs: Deep dive Discovery 5: Generate reports using the Cisco Umbrella reporting API Automating Security with Cisco Firepower APIs Review basic constructs of Firewall policy management Design policies for automation Cisco FMC APIs in depth Discovery 6: Explore the Cisco Firepower management center API Cisco FTD automation with ansible Discovery 7: Use ansible to automate Cisco Firepower threat defense configuration Cisco FDM API in depth Discovery 8: Automate Firewall policies using the Cisco Firepower device manager API Operationalizing Cisco Stealthwatch and Its API Capabilities Cisco Stealthwatch overview Cisco Stealthwatch APIs: Details Discovery 9: Automate alarm policies and create reports using the Cisco Stealthwatch APIs Using Cisco Stealthwatch Cloud APIs Cisco Stealthwatch Cloud overview Cisco Stealthwatch Cloud APIs: Deep dive Discovery 10: Construct a report using Cisco stealthwatch Cloud APIs Describing Cisco Security Management Appliance APIs Cisco SMA APIs overview Cisco SMA API Discovery 11: Construct reports using Cisco SMA APIs

Cisco Implementing Automation for Cisco Security Solutions v1.0 (SAUI)
Delivered OnlineFlexible Dates
Price on Enquiry

WA599G IBM WebSphere Application Server V9 Administration in a Federated Environment

By Nexus Human

Duration 1.5 Days 9 CPD hours This course is intended for This course is designed for WebSphere administrators who have experience with stand-alone application server environments, and want to learn about creating and managing a federated environment. Overview After completing this course, you should be able to: Describe the architectural concepts that are related to WebSphere Application Server Network Deployment Create a deployment manager instance Federate an application server to a cell Add a stand-alone application server to a WebSphere Application Server cell Cluster an application server within a WebSphere Application Server cell Configure WebSphere Application Server SSL security settings Deploy applications in clustered environments Describe the features of Intelligent Management This course teaches you the skills that are needed to administer IBM WebSphere Application Server V9 in a federated environment.This release of IBM WebSphere Application Server provides enhanced support for standards (notably Java 7 EE), emerging technology, and a choice of development frameworks.In this course, you learn how to configure and maintain IBM WebSphere Application Server V9 Network Deployment. You learn how to deploy and create a deployment manager and federate a cell. In addition, you learn how to create a cluster within the federated cell.Throughout the course, hands-on exercises and demonstrations reinforce lecture content. You gain practicalexperience with WebSphere Application Server V9 by completing tasks such as creating a deployment manager, federating a stand-alone application server, creating a custom profile, and clustering an existing application server. Course Introduction WebSphere Application Server architecture: Federated Federating a cell Exercise: Configuring the lab workstation Exercise: Creating a federated cell Workload management Exercise: Clustering and workload management WebSphere security: SSL Exercise: Configuring SSL for WebSphere Overview of Intelligent Management Course summary

WA599G IBM WebSphere Application Server V9 Administration in a Federated Environment
Delivered OnlineFlexible Dates
Price on Enquiry

Meditation for Healing Relationships

By Boundless Meditation

Meditation, mindfulness and emotional mastery for Healing Relationships

Meditation for Healing Relationships
Delivered OnlineFlexible Dates
£135