• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

25814 Management courses in Huntingdon delivered Online

Cisco Implementing Cisco Tetration Analytics v1.0 (DCITET)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Network Security Operations Workload Application Administrators Security Operations Field Engineers Network Engineers Systems Engineers Technical Solutions Architects Cisco Integrators and Partners Overview After taking this course, you should be able to: Define the Cisco telemetry and analytics approach. Explore common scenarios that Cisco Tetration Analytics can solve. Describe how the Cisco Tetration Analytics platform collects telemetry and other context information. Discuss how relative agents are installed and configured. Explore the operational aspects of the Cisco Tetration Analytics platform. Describe the Cisco Tetration Analytics support for application visibility or application insight based on the Application Dependency Mapping (ADM) feature. List the concepts of the intent-based declarative network management automation model. Describe the Cisco Tetration policy enforcement pipeline, components, functions, and implementation of application policy. Describe how to use Cisco Tetration Analytics for workload protection in order to provide a secure infrastructure for business-critical applications and data. Describe Cisco Tetration Analytics platform use cases in the modern heterogeneous, multicloud data center. List the options for the Cisco Tetration Analytics platform enhancements. Explain how to perform the Cisco Tetration Analytics administration. This course teaches how to deploy, use, and operate Cisco© Tetration Analytics? platform for comprehensive workload-protection and application and network insights across a multicloud infrastructure. You will learn how the Cisco Tetration Analytics platform uses streaming telemetry, behavioral analysis, unsupervised machine learning, analytical intelligence, and big data analytics to deliver pervasive visibility, automated intent-based policy, workload protection, and performance management. Exploring Cisco Tetration Data Center Challenges Define and Position Cisco Tetration Cisco Tetration Features Cisco Tetration Architecture Cisco Tetration Deployment Models Cisco Tetration GUI Overview Implementing and Operating Cisco Tetration Explore Data Collection Install the Software Agent Install the Hardware Agent Import Context Data Describe Cisco Tetration Operational Concepts Examining Cisco Tetration ADM and Application Insight Describe Cisco Tetration Application Insight Perform ADM Interpret ADM Results Application Visibility Examining Cisco Tetration Intent-Based Networking Describe Intent-Based Policy Examine Policy Features Implement Policies Enforcing Tetration Policy Pipeline and Compliance Examine Policy Enforcement Implement Application Policy Examine Policy Compliance Verification and Simulation Examining Tetration Security Use Cases Examine Workload Security Attack Prevention Attack Detection Attack Remediation Examining IT Operations Use Cases Key Features and IT Operations Use Cases Performing Operations in Neighborhood App-based Use Cases Examining Platform Enhancement Use Cases Integrations and Advanced Features Third-party Integration Examples Explore Data Platform Capabilities Exploring Cisco Tetration Analytics Administration Examine User Authentication and Authorization Examine Cluster Management Configure Alerts and Syslog Additional course details: Nexus Humans Cisco Implementing Cisco Tetration Analytics v1.0 (DCITET) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Implementing Cisco Tetration Analytics v1.0 (DCITET) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Implementing Cisco Tetration Analytics v1.0 (DCITET)
Delivered OnlineFlexible Dates
Price on Enquiry

Architecting with Google Compute Engine

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Cloud Solutions Architects, DevOps Engineers. Individuals using Google Cloud Platform to create new solutions or to integrate existing systems, application environments, and infrastructure with a focus on Google Compute Engine. Overview Configure VPC networks and virtual machines Administer Identity and Access Management for resources Implement data storage services in GCP Manage and examine billing of GCP resources Monitor resources using Stackdriver services Connect your infrastructure to GCP Configure load balancers and autoscaling for VM instances Automate the deployment of GCP infrastructure services Leverage managed services in GCP This class introduces participants to the comprehensive and flexible infrastructure and platform services provided by Google Cloud Platform, with a focus on Compute Engine. Through a combination of presentations, demos, and hands-on labs, participants explore and deploy solution elements, including infrastructure components such as networks, systems, and application services. This course also covers deploying practical solutions including securely interconnecting networks, customer-supplied encryption keys, security and access management, quotas and billing, and resource monitoring. Introduction to Google Cloud Platform List the different ways of interacting with GCP Use the GCP Console and Cloud Shell Create Cloud Storage buckets Use the GCP Marketplace to deploy solutions Virtual Networks List the VPC objects in GCP Differentiate between the different types of VPC networks Implement VPC networks and firewall rules Design a maintenance server Virtual Machines Recall the CPU and memory options for virtual machines Describe the disk options for virtual machines Explain VM pricing and discounts Use Compute Engine to create and customize VM instances Cloud IAM Describe the Cloud IAM resource hierarchy Explain the different types of IAM roles Recall the different types of IAM members Implement access control for resources using Cloud IAM Storage and Database Services Differentiate between Cloud Storage, Cloud SQL, Cloud Spanner, Cloud Firestore and Cloud Bigtable Choose a data storage service based on your requirements Implement data storage services Resource Management Describe the cloud resource manager hierarchy Recognize how quotas protect GCP customers Use labels to organize resources Explain the behavior of budget alerts in GCP Examine billing data with BigQuery Resource Monitoring Describe the Stackdriver services for monitoring, logging, error reporting, tracing, and debugging Create charts, alerts, and uptime checks for resources with Stackdriver Monitoring Use Stackdriver Debugger to identify and fix errors Interconnecting Networks Recall the GCP interconnect and peering services available to connect your infrastructure to GCP Determine which GCP interconnect or peering service to use in specific circumstances Create and configure VPN gateways Recall when to use Shared VPC and when to use VPC Network Peering Load Balancing and Autoscaling Recall the various load balancing services Determine which GCP load balancer to use in specific circumstances Describe autoscaling behavior Configure load balancers and autoscaling Infrastructure Automation Automate the deployment of GCP services using Deployment Manager or Terraform Outline the GCP Marketplace Managed Services Describe the managed services for data processing in GCP Additional course details: Nexus Humans Architecting with Google Compute Engine training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Architecting with Google Compute Engine course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Architecting with Google Compute Engine
Delivered OnlineFlexible Dates
Price on Enquiry

55242 Microsoft Dynamics 365 Customization and Configuration

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is intended for Information workers, IT Professionals and Developers. Students should have an existing working knowledge of either Microsoft Dynamics 365 or Microsoft Dynamics CRM. Overview Understand the features and tools that exist in Microsoft Dynamics 365 for Customizers Be aware of integrating complimenting Microsoft products such as SharePoint, Skpe for Business and Exchange Undertake and carry out the initial setup and configuration required in a Microsoft Dynamics 365 deployment Design and configure a comprehensive Security model using the inbuilt tools in Microsoft Dynamics 365 Customize the Dynamics 365 schema by creating custom Entities, Fields and Relationships Design custom Information Forms, Quick View Forms, Quick Create Forms and System Views Create System Charts, Dashboards and Interactive Experience Dashboards Create and manage Business Rules using the Business Rule Designer Plan, design and implement best practice Workflow, Business Process Flows and Custom Actions Be able to apply best practice methodology using Unmanaged and Managed Solutions to deploy Microsoft Dynamics 365 customizations and patches This course provides students with a detailed hands-on experience of setting up, customizing, configuring and maintaining the CRM components of Microsoft Dynamics 365. Attendees of this course will gain an in-depth understanding of the Dynamics 365 security model, learn how to customize the Dynamics 365 framework, create and maintain powerful workflows and business process flows and use solutions to package and deploy customizations across multiple Dynamics 365 environments. The course applies to both Business and Enterprise Editions of Dynamics 365 as well as Online and On-premise deployments. Introduction Getting familiar with the versions of Microsoft Dynamics CRM\365 Get acquainted with the Dynamics 365 framework Review the Dynamics 365 interfaces, devices and apps Understand the tools for Dynamics 365 customizers A brief overview of Solutions Understand the differences between Dynamics 365 organisations and environments Review further reading and resources Set up the lab environment - Acme Enterprises Event Management Solution Initial Setup and Configuration An introduction to Dynamics 365 online setup An introduction to Dynamics 365 on premise setup Review the System Settings area Understand how to configure Auto Save Settings Understand how to configure Format Settings Understand how to configure Email Settings Understand how to configure Skype Integration Understand how to configure SharePoint Integration Security Design and configure Business Units Configure Security Roles Manage Users and Teams Implement Access Teams Configure Hierarchy Security Creating and Managing Entities Introduction to the Dynamics 365 schema Review the different Entity Types Create new Custom Entities Managing Entity Ownership Managing Entity Properties Custom Entity Security Review Entities and Solutions Customizing Fields Introduction to Field Customization Understand the different Field Types Review Field Formats Create a new Field Review Fields and Solutions Implement a Calculated Field Configure Field Level Security Customizing Relationships and Mappings Introduction to Relationships Review the different Relationship Types Create a Relationship Review Relationships and Solutions Understand Relationship Behavior Implement a Hierarchy Relationship Configure Field Mappings Customizing Forms, Views and Visualizations The process to create a new Form Review the different Form types Using the Form Designer Customizing the Main, Quick View and Quick Create Forms Configure Form Security Review the different View types Customizing System Views Customizing System Charts and Dashboards Workflows, Business Process Flows and Custom Actions Introduction to Processes Workflow Business Process Flows Custom Actions Solution Management An introduction to Solution Management How to add and administer components in a Solution The differences between unmanaged and managed Solutions How to export and import a Solution How to set Managed Properties for a Solution What happens when you delete a Solution How to Clone a Solution Patch How to Clone a Solution

55242 Microsoft Dynamics 365 Customization and Configuration
Delivered OnlineFlexible Dates
Price on Enquiry

Working in Confined Spaces-IIRSM, CPD & IOSH Approved

By BAB Business Group

At the end of this course you’ll be able to demonstrate your understanding of the control measures to be followed when working in, or near to, confined spaces as detailed in a safe working procedure This course will cover the legislation associates with working in confined spaces. What counts as a confined space, the potential hazards, safe operating procedures, emergency procedures and rescue. Important note: This is an awareness course only, designed for people who need to be aware of the hazards and risks of confined space working but are not required to enter a confined space. If you are required to perform any work activity in, or in the proximity of, a confined space then you will also need to have an 'approved' standard of practical training at the 'appropriate' level.

Working in Confined Spaces-IIRSM, CPD & IOSH Approved
Delivered Online On Demand
£30

Personal Protective Equipment-CPD, IIRSM & IOSH Approved

By BAB Business Group

In the UK there are approximately 144 fatalities in the workplace and around 621,000 non-fatal injuries every year. Personal Protective Equipment (PPE) plays a vital role in managing Health & Safety risks. However, historical data shows many workers suffering injury were not wearing this clothing. This course will show how wearing PPE plays a crucial role in preventing and reducing fatalities, injuries and diseases that would otherwise occur in the workplace. It includes details of a wide range of PPE options, examines the legislation and regulations that govern the responsibilities of employers, employees and suppliers, and provides a real-life case study showing the law in action. The course will also cover risk assessment and the role it plays in the selection and use of PPE along with discussing other hazard control measures that can be implemented. Finally, the course will move on to how to use, fit and wear PPE and understand its physical and theoretical limitation

Personal Protective Equipment-CPD, IIRSM & IOSH Approved
Delivered Online On Demand
£30

Introduction to Personal Safety for Lone Workers IIRSM & IOSH Approved

By BAB Business Group

Every day, thousands of people are exposed to situations where they are left alone in work premises, when visiting members of the public during their working day, or working from home. There are many risks associated with working in isolation, without the support of colleagues. These risks can include accidents and violence. This course acts as an introduction to personal safety for lone workers and applies to those that work alone within business premises, mobile workers and homeworkers. It covers the legal responsibilities of both employers and employees, some of the common security precautions that can be implemented, practical steps you can take to avoid conflict in lone worker situations and other elements that can contribute to lone worker safe

Introduction to Personal Safety for Lone Workers
IIRSM & IOSH Approved
Delivered Online On Demand
£30

Electrical Safety IIRSM & IOSH Approved

By BAB Business Group

Electricity is the lifeblood of modern society, it enhances our quality of life and we are becoming increasingly reliant on it to power tools and devices we use for work and entertainment. However, although electricity has many benefits it can also be a hidden killer as it can’t be seen, felt, smelled or heard until someone comes into contact with it. This course will start by covering the many benefits electricity brings to society, as well as its key components voltage, current and resistance. It will explain the two main types of electricity, cover UK accident and death statistics, and describe a simple way of remembering the electrical hazards. It then goes on to provide basic instructions about how you could safely help someone you suspect has received an electric shock. Towards the end of the course it includes an overview of the main standards, guidance and legislation that control the use of electricity in the workplace, and finish off by looking at simple maintenance plans and portable appliance testing including who within an organisation would be best to carry out the various checks.

Electrical Safety
IIRSM & IOSH Approved
Delivered Online On Demand
£30

Basic Fire Safety Awareness IFE, CPD, IIRSM, Gatehouse Awards, Institute of Hospitality & IOSH Approved

By BAB Business Group

Current legislation, The Regulatory Reform (Fire Safety) Order 2005, applies to all workplaces regardless of the number of employees and requires employers to provide adequate training in fire awareness for all members of their staff. Our online fire safety training courses are aimed at all employees to assist them in identifying and reducing the risk that fire presents in the workplace. This course will provide candidates with a general understanding of basic fire awareness including what should be done in the event of a fire, how to prevent a fire occurring and a basic introduction of the protocol of extinguishing a fire. It is a cost effective way for employers to fulfil their legal obligation to provide their employees with the necessary understanding of fire awareness.

Basic Fire Safety Awareness
IFE, CPD, IIRSM, Gatehouse Awards, Institute of Hospitality & IOSH Approved
Delivered Online On Demand
£30

Level 1 Food Safety – Catering CPD, IIRSM, Gatehouse Awards, Institute of Hospitality & IOSH Approved

By BAB Business Group

Training your employees with our online system will go a long way to give them greater awareness of the dangers that poor food safety standards pose, as well as covering how food safety risks actually arise and how to control and prevent them.

Level 1 Food Safety – Catering
CPD, IIRSM, Gatehouse Awards, Institute of Hospitality & IOSH Approved
Delivered Online On Demand
£30

Manual Handling-IIRSM, CPD & IOSH Approved

By BAB Business Group

Manual handling, or to be accurate, incorrect manual handling, is one of the most common causes of injury at work. To try and combat manual handling problems, the Manual Handling Operations Regulations were introduced. The Regulations lay out duties for both employees and employers. They give a general requirement that employees must be trained to manually handle correctly including the use of any equipment their employer provides to handle loads safely. This course outlines exactly what constitutes manual handling and covers the regulations and legislation that apply to manual handling tasks. It then goes on to cover safe handling techniques and how to develop good habits in relation to manual handling. It finishes off by introducing some practical solutions and the use of mechanical aids. Please note that this is an awareness course only, if your duties include manual handling you will also need further practical training, you can get in touch with us to arrange this. Training your employees with our online system will go a long way to giving them greater awareness of the dangers that poor manual handling poses, as well as covering safe handling techniques, practical solutions to manual handling issues and the use of mechanical aids.

Manual Handling-IIRSM, CPD & IOSH Approved
Delivered Online On Demand
£30