Windows server 2019 administration course description This five-day instructor-led course is designed primarily for IT professionals who have some experience with Windows Server. It is designed for professionals who will be responsible for managing identity, networking, storage and compute by using Windows Server 2019, and who need to understand the scenarios, requirements, and options that are available and applicable to Windows Server 2019. The course teaches IT professionals the fundamental administration skills required to deploy and support Windows Server 2019 in most organizations. What will you learn Administrate Windows Server 2019. Configure file servers and storage. Manage Hyper-V virtualization and containers. Implement HA and disaster recovery solutions. Implement service monitoring and performance monitoring, and apply troubleshooting. Perform upgrades and migration related to AD DS, and storage. Windows server 2019 administration course details Who will benefit: Technical staff working with Windows server 2019. Prerequisites: TCP/IP foundation for engineers. Some Windows experience. Duration 5 days Windows server 2019 administration course contents Windows server administration overview Windows server administration principles and tools, Introducing Windows Server 2019, Windows Server Core Overview. Lab: Deploying and configuring Server Core, Implementing and using remote server administration. Identity Services in Windows server AD DS, Windows Server domain controllers, Azure AD, Group Policy, Active Directory Certificate Services. Lab: Deploying a new domain controller on Server Core, Configuring Group Policy, Deploying and using certificate services. Network Infrastructure services in Windows server DHCP, DNS services, IPAM. Lab: Deploying and configuring DHCP, Deploying and configuring DNS. File Servers and Storage management Volumes and file systems, sharing in Windows Server, Storage Spaces in Windows Server, Data Deduplication, Iscsi, Distributed File System. Lab: Implementing Data Deduplication, Configuring iSCSI storage, Configuring redundant storage spaces, Implementing Storage Spaces Direct. Hyper-V virtualization and containers Hyper-V in Windows Server, Configuring VMs, Securing virtualization in Windows Server, Containers in Windows Server, Overview of Kubernetes. Lab: Creating and configuring VMs, Installing and configuring containers. High Availability in Windows Server Planning for failover clustering implementation, Creating and configuring failover cluster, stretch clusters, High availability and disaster recovery solutions with Hyper-V VMs. Lab: Configuring iSCSI storage, Configuring a failover cluster, Deploying and configuring a highly available file server, Validating the highly available file server deployment. Disaster recovery in Windows Server Hyper-V Replica, Backup and restore infrastructure in Windows Server. Lab: Implementing Hyper-V Replica, Implementing backup and restore with Windows Server Backup. Windows Server security Credentials and privileged access protection, Hardening Windows Server, Just Enough Administration in Windows Server, Securing and analyzing SMB traffic, Windows Server update management. Lab: Configuring Windows Defender Credential Guard, Locating problematic accounts, Implementing LAPS. Remote Desktop Services in Windows Server Remote Desktop Services, session-based desktop deployment, personal and pooled virtual desktops. Lab: Implementing RDS, Configuring RemoteApp collection settings, Configuring a virtual desktop template. Remote access and web services in Windows Server Overview of RAS in Windows Server, Implementing VPNs, Implementing NPS, Implementing Always On VPN, Implementing Web Server in Windows Server. Lab: Implementing Web Application Proxy, Implementing VPN in Windows Server, Deploying and Configuring Web Server. Monitoring, performance, and troubleshooting Windows Server monitoring tools, Performance Monitor, Monitoring event logs for troubleshooting. Lab: Establishing a performance baseline, Identifying the source of a performance problem, Viewing and configuring centralized event logs, Identifying the source of a performance problem, Describe monitoring tools and performance monitoring in Windows Server, Describe event logging and perform event logging monitoring for troubleshooting purposes. Upgrade and migration in Windows Server AD DS migration, Storage Migration Service, Windows Server migration tools. Lab: Selecting a process to migrate server workloads, Planning how to migrate files by using Storage Migration Service.
Perl training course description A hands on introduction to programming in Perl. What will you learn Write Perl programs. Use Perl modules. Debug Perl programs. Examine existing code and determine its function. Perl training course details Who will benefit: Anyone wishing to learn Perl. Prerequisites: None although experience in another high level language would be useful. Duration 5 days Perl training course contents Introduction to Perl What is Perl? When to use Perl, downloading Perl, installing Perl, documentation, perldoc, running Perl, the Perl environment. Perl under UNIX, Perl under Windows. "Hello world". Variables Scalars, data types, $_, strings and numbers, assignment, constants, strict, scope, STDIN. Operators Number operators, string operators, precedence and associativity, converting numbers and strings, shortcut operators. Flow control Blocks, if, else, elseif, unless, foreach, while, for do, until. Regular expressions What are regular expressions? Pattern matching, Perl as a filter, file editing. Strings Comparing strings, concatenating, substrings, chomp, chop, formatting, string manipulation. Subroutines Comparing strings, concatenating, substrings, chomp, chop, formatting, string manipulation. Arrays and hashes Working with arrays, element access, push(), pop(), shift(), unshift(), <STDIN> as an array, associative arrays, hashes of arrays, hash references, arrays of hashes, hashes of hashes. Files Simple file handling, open, close, <FILEHANDLE>, <>, file tests, directory access, directory handles, database access, packing and packing binary data. I/O STDIN, STDOUT and STDERR, Command line arguments,@ARGV. Perl debugging The built in debugger, running the debugger, debugger commands, graphical debuggers. Script syntax errors, single stepping, breakpoints, watches. Packages and modules CPAN, Finding modules, installing modules, using modules, scope. Report formatting Formats, defining a format, invoking a format, field holders. Process management System interaction, system(), exec(), signals. Security issues.
Leading SAFe®: In-House Training During this course, attendees gain the knowledge necessary to lead a Lean-Agile enterprise by using the Scaled Agile Framework® (SAFe®) and its underlying principles derived from Lean, systems thinking, Agile development, product development flow, and DevOps. Participants in the class gain insights into mastering business agility to thrive in competitive markets. They discuss how to establish team and technical agility and organize and re-organize around the flow of value. Attendees also learn and practice the skills to support and execute PI Planning events and coordinate multiple Agile Release Trains (ARTs). Class participants will explore the importance of adopting a customer-centric mindset and Design-Thinking approach to Agile Product Delivery. Learners will also understand how to implement a Lean Portfolio Management function within their enterprise. What you will Learn After attending this class, attendees should be able to: Lead the transformation to business agility with SAFe® Become a Lean-Agile leader Understand customer needs Design Thinking Enable Agile Product delivery Implement Lean Portfolio Management Thrive in the digital age with business agility Become a Lean-Agile leader Establish Team and Technical Agility Build solutions with Agile Product Delivery Explore Lean Portfolio Management Lead the change Become a Certified SAFe® Agilist
Gain expertise in biohazard safety with our "Biohazard Safety: Managing Blood and Body Fluid Spillages Instructor Training" course. Ideal for healthcare professionals, lab staff, and emergency responders.
Gain the knowledge and skills to safely insert and manage peripheral IV cannulas with our training course for healthcare professionals. Ideal for nurses, medical personnel, and other practitioners.
Managing Stress and Building Resilience: In-House Training Stress has an impact on all of us at some point in our professional lives. Learning how to manage stress and build resilience will result in higher professional productivity, better health, and more sustainable living habits. It will also help us create a physical - and emotional - work-life balance. In this one-day workshop, you will learn practical solutions to sustain behavior change that can positively impact your life on both a professional and personal level. When you are able to reduce the level of negative stress that affects you, your performance improves, along with your health and happiness. The objective of this course is therefore not only to create awareness around emotional well-being in a work context, but also to help participants create a better overall balance between the investment they make in their personal and professional lives. This course covers how our perceptions affect our beliefs and how our beliefs affect our actions. You will learn a host of stress-reduction techniques, while exploring your own stress triggers and responses. Highly interactive, the sessions cover a blend of theory, discussions, and exercises. You will explore concepts with fellow participants within a safe environment where skills and habits can be developed, sharpened, and improved. What You Will Learn At the end of this program, you will be able to: Identify what stress feels like and what the typical symptoms and reactions are to stress Analyze your own responses to stressful events and the consequences of those reactions Organize your work structure to reduce stress and build resilience Recognize activities that drain you and those that give you energy Generate relief from stressful events Cultivate a mindset of resilience Better manage your time, work commitments, and personal boundaries in order to be most effective at your job Getting Started What is stress? Beliefs and thinking errors Work-life balance Drainers and energizers Stress reduction techniques Time management Summary and Next Steps
Conflict Resolution Skills: In-House Training Many organizations have assumed that workplace conflict is always destructive. So, they have often believed that conflict is best dealt with by managers or even via policies and procedures. After all, conflict creates workplace stress and leads to many performance problems, generating very real organizational costs! However, savvy organizations have embraced the fact that when conflict is understood and harnessed, it can be leveraged to add value to teams and even enhance performance. With the right knowledge, skills, training, and practice, conflict can be productive and make organizations better! In this highly interactive course, learners will discover the connection between individual conflict response and team-empowering conflict resolution skills. Participants will explore conflict's visceral dynamics and the nuanced behaviors we individually engage in to communicate and respond to conflict. Learners will apply techniques for transforming unproductive conflict responses into productive ones. Additionally, learners will use a systematic method that prepares them to objectively dissect real-world conflict, while practicing many strategies for resolving it. They will also develop proactive conflict approach plans, which they can transfer back to their own workplaces. What you will Learn At the end of this program, you will be able to: Recognize the organizational costs of conflict Explain our physical and mental responses to conflict Communicate proactively and effectively with different types of people during conflict Replace unproductive conflict responses with productive ones Use the Conflict Resolution Diagram (CRD) process and conflict resolution approaches Relate team stages of development to shifts in conflict Develop a proactive conflict approach for your organization Create a conflict resolution plan for a real-world scenario Getting Started Introductions and social agreements Course goal and objectives Opening activities Conflict Facilitation Readiness Conflict responses and perceptions Conflict basics Conflict and organizations Dynamics of conflict Conflict Styles and Communication A look at the color energies model Conflict through the color energies and DiSC® lens Communication with opposite color energies Individual Response to Conflict The anatomy of conflict Recognizing unproductive conflict responses 4 steps to productive conflict Choosing productive conflict responses Team Performance and Conflict High-performing team relationships Conflict and project team performance Conflict Resolution Diagram (CRD) and process Conflict Facilitation - Preparation Recognizing context and stakeholder needs Using team conflict resolution approaches Preparing for Crucial Conversations® Conflict Facilitation - Clarity Exposing assumptions and biases Defining the conflict and using the CRD Conflict Facilitation - Action Proactive conflict management Conflict facilitation practice Summary and Next Steps Review Personal action plans
Network forensics training course description This course studies network forensics-monitoring and analysis of network traffic for information gathering, intrusion detection and legal evidence. We focus on the technical aspects of network forensics rather than other skills such as incident response procedures etc.. Hands on sessions follow all the major sections. What will you learn Recognise network forensic data sources. Perform network forensics using: Wireshark NetFlow Log analysis Describe issues such as encryption. Network forensics training course details Who will benefit: Technical network and/or security staff. Prerequisites: TCP/IP foundation for engineers. Duration 3 days Network forensics training course contents What is network forensics? What it is, host vs network forensics, purposes, legal implications, network devices, network data sources, investigation tools. Hands on whois, DNS queries. Host side network forensics Services, connections tools. Hands on Windows services, Linux daemons, netstat, ifoconfig/ipconfig, ps and Process explorer, ntop, arp, resource monitor. Packet capture and analysis Network forensics with Wireshark, Taps, NetworkMiner. Hands on Performing Network Traffic Analysis using NetworkMiner and Wireshark. Attacks DOS attacks, SYN floods, vulnerability exploits, ARP and DNS poisoning, application attacks, DNS ANY requests, buffer overflow attacks, SQL injection attack, attack evasion with fragmentation. Hands on Detecting scans, using nmap, identifying attack tools. Calculating location Timezones, whois, traceroute, geolocation. Wifi positioning. Hands on Wireshark with GeoIP lookup. Data collection NetFlow, sflow, logging, splunk, splunk patterns, GRR. HTTP proxies. Hands on NetFlow configuration, NetFlow analysis. The role of IDS, firewalls and logs Host based vs network based, IDS detection styles, IDS architectures, alerting. Snort. syslog-ng. Microsoft log parser. Hands on syslog, Windows Event viewer. Correlation Time synchronisation, capture times, log aggregation and management, timelines. Hands on Wireshark conversations. Other considerations Tunnelling, encryption, cloud computing, TOR. Hands on TLS handshake in Wireshark.
Overview For internal employees who want to understand and expand their roles related to financial reporting, as well as those who simply need a refresher on financial accounting, this course is the ideal way to get up to speed. By exploring concepts that go beyond basic accounting, this course will enable participants to approach financial auditing with renewed confidence. The programme will walk participants through an analysis of an organization's financial statements using case study exercises, where participants will calculate key ratios and analyze trends over time. Engaging in discussions on both historic and current fraud cases, participants will learn how to recognize âred flagsâ in financial statement reporting.
Concise Cisco switches course description A hands on course covering the product specifics of Cisco switches. Installation, configuration, maintenance and troubleshooting are all covered in a practical oriented way. VLANs often take up a large part of the course. The course covers all interfaces but concentrates on using the command line interface. Delegates are, however, free to use the web based interface in all exercises. What will you learn Install Cisco switches. Use the command line interface and the web based interface to manage Cisco switches. Configure and troubleshoot Cisco switches. Perform software upgrades and maintain configurations using TFTP. Concise Cisco switches course details Who will benefit: Anyone working with Cisco switches. Particularly aimed at engineers and technicians supporting Cisco switches. Prerequisites: None. Duration 2 days Concise Cisco switches course content Ethernet review Single segment Ethernet, CSMA/CD, Broadcast domains, collision domains. Hubs, Extending the LAN. Hands on Hub based Ethernet. Cisco switches What are switches, frame forwarding and filtering, the forwarding database. Hands on Switched based Ethernet. Configuring Cisco switches Accessing the switch, installing the switch, The CLI, connecting PCs using the switch. Hands on Configuring Cisco switches. The command line interface User and privilege modes, online help, show, basic troubleshooting. The configuration editor, Global, major and sub commands, enable, secret and other passwords. Hands on Simple troubleshooting using the CLI. Port configuration Speed, duplex, security, trunking. Hands on Port trunking. Spanning Tree Protocol Spanning Tree, Loops, effect, root bridges, bridge port states, STP reconfiguration. RSTP and variants. Hands on STP. VLANS What are VLANs, configuring VLANs, access ports and trunks, 802.1Q, inter VLAN routing. Hands on Access ports, trunks, layer 3 switching. Housekeeping Configuration management, software management, password recovery. Hands on TFTP. Managing interconnection devices SNMP, RMON, RMON II. Troubleshooting LEDs, CDP, logging, Layer 1, layer 2, layer 3. Hands on Fixing things.