• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1632 Manager courses in Congleton delivered Live Online

Learning & Development Level 3

By Rachel Hood

Identifying learning and training needs, designing and sourcing training and learning solutions, delivering and evaluating training.

Learning & Development Level 3
Delivered OnlineFlexible Dates
Price on Enquiry

Architecting with Google Cloud: Design and Process

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Cloud Solutions Architects, Site Reliability Engineers, Systems Operations professionals, DevOps Engineers, IT managers. Individuals using Google Cloud Platform to create new solutions or to integrate existing systems, application environments, and infrastructure with the Google Cloud Platform. Overview Apply a tool set of questions, techniques and design considerations Define application requirements and express them objectively as KPIs, SLO's and SLI's Decompose application requirements to find the right microservice boundaries Leverage Google Cloud developer tools to set up modern, automated deployment pipelines Choose the appropriate Google Cloud Storage services based on application requirements Architect cloud and hybrid networks Implement reliable, scalable, resilient applications balancing key performance metrics with cost Choose the right Google Cloud deployment services for your applications Secure cloud applications, data and infrastructure Monitor service level objectives and costs using Stackdriver tools This course features a combination of lectures, design activities, and hands-on labs to show you how to use proven design patterns on Google Cloud to build highly reliable and efficient solutions and operate deployments that are highly available and cost-effective. This course was created for those who have already completed the Architecting with Google Compute Engine or Architecting with Google Kubernetes Engine course. Defining the Service Describe users in terms of roles and personas. Write qualitative requirements with user stories. Write quantitative requirements using key performance indicators (KPIs). Evaluate KPIs using SLOs and SLIs. Determine the quality of application requirements using SMART criteria. Microservice Design and Architecture Decompose monolithic applications into microservices. Recognize appropriate microservice boundaries. Architect stateful and stateless services to optimize scalability and reliability. Implement services using 12-factor best practices. Build loosely coupled services by implementing a well-designed REST architecture. Design consistent, standard RESTful service APIs. DevOps Automation Automate service deployment using CI/CD pipelines. Leverage Cloud Source Repositories for source and version control. Automate builds with Cloud Build and build triggers. Manage container images with Google Container Registry. Create infrastructure with code using Deployment Manager and Terraform. Choosing Storage Solutions Choose the appropriate Google Cloud data storage service based on use case, durability, availability, scalability and cost. Store binary data with Cloud Storage. Store relational data using Cloud SQL and Spanner. Store NoSQL data using Firestore and Cloud Bigtable. Cache data for fast access using Memorystore. Build a data warehouse using BigQuery. Google Cloud and Hybrid Network Architecture Design VPC networks to optimize for cost, security, and performance. Configure global and regional load balancers to provide access to services. Leverage Cloud CDN to provide lower latency and decrease network egress. Evaluate network architecture using the Cloud Network Intelligence Center. Connect networks using peering and VPNs. Create hybrid networks between Google Cloud and on-premises data centers using Cloud Interconnect. Deploying Applications to Google Cloud Choose the appropriate Google Cloud deployment service for your applications. Configure scalable, resilient infrastructure using Instance Templates and Groups. Orchestrate microservice deployments using Kubernetes and GKE. Leverage App Engine for a completely automated platform as a service (PaaS). Create serverless applications using Cloud Functions. Designing Reliable Systems Design services to meet requirements for availability, durability, and scalability. Implement fault-tolerant systems by avoiding single points of failure, correlated failures, and cascading failures. Avoid overload failures with the circuit breaker and truncated exponential backoff design patterns. Design resilient data storage with lazy deletion. Analyze disaster scenarios and plan for disaster recovery using cost/risk analysis. Security Design secure systems using best practices like separation of concerns, principle of least privilege, and regular audits. Leverage Cloud Security Command Center to help identify vulnerabilities. Simplify cloud governance using organizational policies and folders. Secure people using IAM roles, Identity-Aware Proxy, and Identity Platform. Manage the access and authorization of resources by machines and processes using service accounts. Secure networks with private IPs, firewalls, and Private Google Access. Mitigate DDoS attacks by leveraging Cloud DNS and Cloud Armor. Maintenance and Monitoring Manage new service versions using rolling updates, blue/green deployments, and canary releases. Forecast, monitor, and optimize service cost using the Google Cloud pricing calculator and billing reports and by analyzing billing data. Observe whether your services are meeting their SLOs using Cloud Monitoring and Dashboards. Use Uptime Checks to determine service availability. Respond to service outages using Cloud Monitoring Alerts. Additional course details: Nexus Humans Architecting with Google Cloud: Design and Process training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Architecting with Google Cloud: Design and Process course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Architecting with Google Cloud: Design and Process
Delivered OnlineFlexible Dates
Price on Enquiry

VMware Tanzu Kubernetes Grid: Install, Configure, Manage [V2.0]

By Nexus Human

Duration 4 Days 24 CPD hours Overview By the end of the course, you should be able to meet the following objectives: Describe how Tanzu Kubernetes Grid fits in the VMware Tanzu portfolio Describe the Tanzu Kubernetes Grid architecture Deploy and manage Tanzu Kubernetes Grid management and supervisor clusters Deploy and manage Tanzu Kubernetes Grid workload clusters Deploy, configure, and manage Tanzu Kubernetes Grid packages Perform basic troubleshooting During this four-day course, you focus on installing VMware Tanzu© Kubernetes Grid? in a VMware vSphere© environment and provisioning and managing Tanzu Kubernetes Grid clusters. The course covers how to install Tanzu Kubernetes Grid packages for image registry, authentication, logging, ingress, multipod network interfaces, service discovery, and monitoring. The concepts learned in this course are transferable for users who must install Tanzu Kubernetes Grid on other supported clouds. Course Introduction Introductions and course logistics Course objectives Introducing VMware Tanzu Kubernetes Grid Identify the VMware Tanzu products responsible for Kubernetes life cycle management and describe the main differences between them Explain the core concepts of Tanzu Kubernetes Grid, including bootstrap, Tanzu Kubernetes Grid management, supervisor, and workload clusters List the components of a Tanzu Kubernetes Grid instance VMware Tanzu Kubernetes Grid CLI and API Illustrate how to use the Tanzu CLI Define the Carvel Tool set Define Cluster API Identify the infrastructure providers List the Cluster API controllers Identify the Cluster API custom resource definitions Authentication Explain how Kubernetes manages authentication with Management clusters Explain how Kubernetes manages authentication with supervisor clusters Define Pinniped Define Dex Describe the Pinniped authentication workflow Load Balancers Illustrate how load balancing works for the Kubernetes control plane Illustrate how load balancing works for application workload Explain how Tanzu Kubernetes Grid integrates with VMware NSX Advanced Load Balancer List load balancing options available on public clouds VMware Tanzu Kubernetes Grid on vSphere List the requirements for deploying a supervisor cluster List the steps to install a Tanzu Kubernetes Grid supervisor cluster Summarize the events of a supervisor cluster creation List the requirements for deploying a management cluster List the steps to install a Tanzu Kubernetes Grid management cluster Summarize the events of a management cluster creation Demonstrate how to use commands when working with management clusters VMware Tanzu Kubernetes Grid on Public Clouds List the requirements for deploying a management cluster on AWS and Microsoft Azure List the configuration options to install a Tanzu Kubernetes Grid a management cluster on AWS and Azure Tanzu Kubernetes Workload Clusters List the steps to build a custom image Describe the available customizations Identify the options for deploying Tanzu Kubernetes Grid clusters Explain the difference between the v1alpha3 and v1beta1 APIs Explain how Tanzu Kubernetes Grid clusters are created Discuss which VMs compose a Tanzu Kubernetes Grid cluster List the pods that run on a Tanzu Kubernetes Grid cluster Describe the Tanzu Kubernetes Grid core add-ons that are installed on a cluster Tanzu Kubernetes Grid Packages Define the Tanzu Kubernetes Grid packages Explain the difference between Auto-Managed and CLI-Managed packages Define packages repositories Configuring and Managing Tanzu Kubernetes Grid Operation and Analytics Packages Describe Cert-Manager Describe the Harbor Image Registry Describe Fluent Bit Identify the logs that Fluent Bit collects Explain basic Fluent Bit configuration Describe Prometheus and Grafana Configuring and Managing Tanzu Kubernetes Grid Networking Packages Describe the Contour ingress controller Demonstrate how to install Contour on a Tanzu Kubernetes Grid cluster Describe ExternalDNS Demonstrate how to install Service Discovery with ExternalDNS Describe Multus CNI Tanzu Kubernetes Grid Day 2 Operations List the load balancer configuration options in vSphere to load balance applications Demonstrate how to configure Ingress with the NodePortLocal Mode Explain how to install VMware Tanzu Application Platform Describe life cycle management in Tanzu Kubernetes Grid Explain how backup and restore are implemented in Tanzu Kubernetes Grid Describe Velero and Restic List the steps to back up a Workload cluster using Velero and Restic Troubleshooting Tanzu Kubernetes Grid Discuss the various Tanzu Kubernetes Grid logs Identify the location of Tanzu Kubernetes Grid logs Explain the purpose of crash diagnostics Demonstrate how to check the health of a Tanzu Kubernetes Grid cluster Explain packages cleanup procedures Explain management recovery procedures Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Tanzu Kubernetes Grid: Install, Configure, Manage [V2.0] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Tanzu Kubernetes Grid: Install, Configure, Manage [V2.0] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware Tanzu Kubernetes Grid: Install, Configure, Manage [V2.0]
Delivered OnlineFlexible Dates
Price on Enquiry

VMware NSX for Intrinsic Security [V4.x]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Experienced security administrators Overview By the end of the course, you should be able to meet the following objectives: Define the concepts related to information security Explain the different types of firewalls and their use cases Describe the operation of intrusion detection and intrusion prevention systems Differentiate between Malware Prevention approaches Describe the VMware intrinsic security portfolio Use NSX segmentation to implement Zero-Trust Security Configure user and role management Configure and troubleshoot Distributed Firewall, Identity Firewall, and time-based policies Configure and troubleshoot Gateway Security Use VMware Aria Operations™ for Logs and VMware Aria Operations™ for Networks to operate NSX firewalls Explain the security best practices related to grouping, tagging, and rule configuration Describe north-south and east-west service insertion Describe endpoint protection Configure and troubleshoot IDS/IPS Deploy NSX Application Platform Configure and troubleshoot NSX Malware Prevention Describe the capabilities of NSX Intelligence and NSX NDR This five-day, hands-on training course provides you with the knowledge, skills, and tools to achieve competency in configuring, operating, and troubleshooting VMware NSX© for intrinsic security. This course introduces all the security features in NSX, including Distributed Firewall and Gateway Firewall, Intrusion Detection and Prevention (IDS/IPS), NSX Application Platform, NSX Malware Prevention, VMware NSX© Intelligence?, and VMware NSX© NDR?. In addition, this course presents common configuration issues and gives a methodology to resolve them. Course Introduction Introduction and course logistics Course objectives Security Basics Define the concepts related to information security Explain the different types of firewalls and their use cases Describe the operation of IDS/IPS Differentiate between Malware Prevention approaches VMware Intrinsic Security Define the VMware intrinsic security strategy Describe the VMware intrinsic security portfolio Explain how NSX aligns with the intrinsic security strategy Implementing Zero-Trust Security Define Zero-Trust Security Describe the five pillars of a Zero-Trust architecture Define NSX segmentation and its use cases Describe the steps needed to enforce Zero-Trust with NSX segmentation User and Role Management Integrate NSX and VMware Identity Manager? Integrate NSX and LDAP Describe the native users and roles in NSX Create and assign custom user roles Explain object-based RBAC in a multitenancy environment Distributed Firewall Configure Distributed Firewall rules and policies Describe the NSX Distributed Firewall architecture Troubleshoot common problems related to NSX Distributed Firewall Configure time-based policies Configure Identity Firewall rules Configure the distributed firewall to block malicious IPs Gateway Security Configure Gateway Firewall rules and policies Describe the architecture of the Gateway Firewall Identify and troubleshoot common Gateway Firewall issues Configure TLS Inspection to decrypt traffic for both internal and external services Configure URL filtering and identify common configuration issues Operating Internal Firewalls Use VMware Aria Operations for Logs and VMware Aria Operations for Networks to operate NSX firewalls Explain security best practices related to grouping, tagging, and rule configuration Network Introspection Explain network introspection Describe the architecture and workflows of north-south and east-west service insertion Troubleshoot north-south and east-west service insertion Endpoint Protection Explain endpoint protection Describe the architecture and workflows of endpoint protection Troubleshoot endpoint protection Intrusion Detection and Prevention Describe the MITRE ATT&CK framework Explain the different phases of a cyber attack Describe how NSX security solutions can be used to protect against cyber attacks Configure and troubleshoot Distributed IDS/IPS Configure and troubleshoot North-South IDS/IPS NSX Application Platform Describe NSX Application Platform and its use cases Identify the topologies supported for the deployment of NSX Application Platform Deploy NSX Application Platform Explain the NSX Application Platform architecture and services Validate the NSX Application Platform deployment and troubleshoot common issues NSX Malware Prevention Identify use cases for NSX Malware Prevention Identify the components in the NSX Malware Prevention architecture Describe the NSX Malware Prevention packet flows for known and unknown files Configure NSX Malware Prevention for east-west and north-south traffic NSX Intelligence and NSX NDR Describe NSX Intelligence and its use cases Explain NSX Intelligence visualization, recommendation, and network traffic analysis capabilities Describe NSX NDR and its use cases Explain the architecture of NSX NDR in NSX Describe the visualization capabilities of NSX NDR Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware NSX for Intrinsic Security [V4.x] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware NSX for Intrinsic Security [V4.x] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware NSX for Intrinsic Security [V4.x]
Delivered OnlineFlexible Dates
Price on Enquiry

AZ-400 Designing and Implementing Microsoft DevOps Solutions

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Students in this course are interested in implementing DevOps processes or in passing the Microsoft Azure DevOps Solutions certification exam. Overview After completing this course, students will be able to: Plan for the transformation with shared goals and timelines Select a project and identify project metrics and Key Performance Indicators (KPI's) Create a team and agile organizational structure Design a tool integration strategy Design a license management strategy (e.g., Azure DevOps and GitHub users) Design a strategy for end-to-end traceability from work items to working software Design an authentication and access strategy Design a strategy for integrating on-premises and cloud resources Describe the benefits of using Source Control Describe Azure Repos and GitHub Migrate from TFVC to Git Manage code quality including technical debt SonarCloud, and other tooling solutions Build organizational knowledge on code quality Explain how to structure Git repos Describe Git branching workflows Leverage pull requests for collaboration and code reviews Leverage Git hooks for automation Use Git to foster inner source across the organization Explain the role of Azure Pipelines and its components Configure Agents for use in Azure Pipelines Explain why continuous integration matters Implement continuous integration using Azure Pipelines Define Site Reliability Engineering Design processes to measure end-user satisfaction and analyze user feedback Design processes to automate application analytics Manage alerts and reduce meaningless and non-actionable alerts Carry out blameless retrospectives and create a just culture Define an infrastructure and configuration strategy and appropriate toolset for a release pipeline and application infrastructure Implement compliance and security in your application infrastructure Describe the potential challenges with integrating open-source software Inspect open-source software packages for security and license compliance Manage organizational security and compliance policies Integrate license and vulnerability scans into build and deployment pipelines Configure build pipelines to access package security and license ratings This course provides the knowledge and skills to design and implement DevOps processes and practices. Students will learn how to plan for DevOps, use source control, scale Git for an enterprise, consolidate artifacts, design a dependency management strategy, manage secrets, implement continuous integration, implement a container build strategy, design a release strategy, set up a release management workflow, implement a deployment pattern, and optimize feedback mechanisms. Module 1: Get started on a DevOps transformation journey Introduction to DevOps Choose the right project Describe team structures Choose the DevOps tools Plan Agile with GitHub Projects and Azure Boards Introduction to source control Describe types of source control systems Work with Azure Repos and GitHub Module 2: Development for enterprise DevOps Structure your Git Repo Manage Git branches and workflows Collaborate with pull requests in Azure Repos Explore Git hooks Plan foster inner source Manage Git repositories Identify technical debt Module 3: Implement CI with Azure Pipelines and GitHub Actions Explore Azure Pipelines Manage Azure Pipeline agents and pools Describe pipelines and concurrency Explore Continuous integration Implement a pipeline strategy Integrate with Azure Pipelines Introduction to GitHub Actions Learn continuous integration with GitHub Actions Design a container build strategy Module 4: Design and implement a release strategy Introduction to continuous delivery Explore release strategy recommendations Build a high-quality release pipeline Introduction to deployment patterns Implement blue-green deployment and feature toggles Implement canary releases and dark launching Implement A/B testing and progressive exposure deployment Module 5: Implement a secure continuous deployment using Azure Pipelines Create a release pipeline Provision and test environments Manage and modularize tasks and templates Automate inspection of health Manage application configuration data Integrate with identity management systems Implement application configuration Module 6: Manage infrastructure as code using Azure and DSC Explore infrastructure as code and configuration management Create Azure resources using Azure Resource Manager templates Create Azure resources by using Azure CLI Explore Azure Automation with DevOps Implement Desired State Configuration (DSC) Implement Bicep Module 7: Implement security and validate code bases for compliance Introduction to Secure DevOps Implement open-source software Software Composition Analysis Static analyzers OWASP and Dynamic Analyzers Security Monitoring and Governance Module 8: Design and implement a dependency management strategy Explore package dependencies Understand package management Migrate, consolidate, and secure artifacts Implement a versioning strategy Introduction to GitHub Packages Module 9: Implement continuous feedback Implement tools to track usage and flow Develop monitor and status dashboards Share knowledge within teams Design processes to automate application analytics Manage alerts, Blameless retrospectives and a just culture Additional course details: Nexus Humans AZ-400 Designing and Implementing Microsoft DevOps Solutions training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AZ-400 Designing and Implementing Microsoft DevOps Solutions course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

AZ-400 Designing and Implementing Microsoft DevOps Solutions
Delivered OnlineFlexible Dates
Price on Enquiry

55355 SharePoint 2016 Administration

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for an IT person wanting to learn about administrating SharePoint 2016. Overview After completing this course, you will be able to: The Installation and configure a SharePoint 2016 Farm How to manage a SharePoint 2016 Farm through the GUI and PowerShell How to create site collections via GUI and PowerShell How to create and configure the all the required service applications for SharePoint 2016 How to backup and restore in SharePoint 2016 This SharePoint 2016 Administrator course is design for Administrators who are new to SharePoint Server Administration or who are upgrading from previous versions of SharePoint.This course covers content that was in retired Microsoft Course 20339-1. Module 1: Hardware, Installation and Patching How to build a Min Role Farm How to View ULS Logs How to document and check IIS Settings for SharePoint 2016 Module 2: Farm Management How to manage the SharePoint Farm Administors group How to configure Outgoing Email How to configure Incoming Email How to Configure Diagnostic and Usage Log Options Module 3: Web Applications How to define a new Managed Account How to add new IP Addresses to a SharePoint Server How to create a claims based web application in SharePoint Central Administration How to create a claims based web application in PowerShell How to create a hosting web application in PowerShell Module 4: Site Collections How to create a managed path How to create a site collection using SharePoint Central Administration How to create a site collection using PowerShell How to create a site collection in its own database using SharePoint Central Administration How to create a site collection in its own database using PowerShell How to create a host named site collection using PowerShell Module 5: Service Applications How to create a State Service Application How to create a Search Service Application How to create the Managed Metadate Service Module 6: Application Management How to add a new IP and Certificate to a SharePoint Web Application How to configure DNS for SharePoint Web Application How to Create a Subscription Settings Service Application How to create the Application Management Application Service How to configure the application URLs How to create the App Catalog Site Colleciton How to Add Apps to the catalog Module 7: Managing the User Profile Service How to create the My Site Web Application How to create the User Profile Service Application How to Configure the User Profile Synchronization Permissions How to create the Active Directory Import Connection How to assign permissions for the AD Group to create a My Site How to create a My Site Module 8: Search How to view the currenty Search Topology How to create an Enterprise Search Centre How to configure a new search schema property How to create a site collection-level result source How to create a new content source Module 9: Office Online Server How to install the pre-requisites for Office Online Server How to install the Office Online Server Binaries How to create the Office Online Server SSL Certifcate How to create the Office Online Server Farm How to connect to the farm from SharePoint How to test the connectivity Module 10: Enterprise Content Management How to create and Apply a site policy How to create discovery sets How to configure In Place records management How to configure the records centre How to configure DLP Module 11: Web Content Management How to configure cross-site publication How to configure content deployment Module 12: Workflow Server How to install Workflow Manger server and Client Binaires How to configure the workflow farm How to patch the workflow farm manager and clients How to register the workflow service in SharePoint How to test Workflow creation Module 13: Business Connectity Services and Secure Store How to configure the secure store service How to create the BCS service Application How to setup the products database How to import the BCS Definition How to use the BDC file in a list web part Module 14: Hybrid SharePoint Shown and Demonstrated the Hybrid features of SharePoint 2016 Module 15: Backup and Restore How to backup SharePoint 2016 Content How to delete SharePoint 2016 Content How to restore SharePoint 2016 Content via PowerShell How to recover a unattached content database Module 16: Upgrade How to restore and attach a SharePoint 2013 Database How to upgrade a SharePoint 2013 MMS Service Application Additional course details: Nexus Humans 55355 SharePoint 2016 Administration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the 55355 SharePoint 2016 Administration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

55355 SharePoint 2016 Administration
Delivered OnlineFlexible Dates
Price on Enquiry

Data Ethics for Business Professionals

By Mpi Learning - Professional Learning And Development Provider

Data Ethics for Business Professionals is designed for individuals who are seeking to demonstrate an understanding of the ethical uses of data in business settings.

Data Ethics for Business Professionals
Delivered in Loughborough or UK Wide or OnlineFlexible Dates
£45

Get Smart With QuickBooks 2021 for Windows

By Nexus Human

Duration 2 Days 12 CPD hours Overview What's New in This Guide? Automatic Payment Reminders for open customer invoices Ability to automatically include the PO# (purchase order number) to Invoice Emails Able to combine multiple emails which allows you to attach multiple sales or purchasing documents to a single email Quickly locate a company file using the new company file search feature Smart Help is an improved search experience that includes access to live experts through messaging and call back options This course covers all features that are in QuickBooks Pro and Premier 2020 and prepares you for the QuickBooks Certified User exam. This course combines all topics in the two 1 day courses ?Get Started with QuickBooks 2021 for Windows? and ?Keep Going with QuickBooks 2021 for Windows?. First-time QuickBooks users will learn the basic features of the software. Experienced QuickBooks users will quickly learn the new features and functionality of QuickBooks 2021. Getting Started Starting QuickBooks Setting QuickBooks Preferences Components of the QuickBooks Operating Environment Using QuickBooks Help Identifying Common Business Terms Exiting QuickBooks Setting Up a Company Creating a QuickBooks Company Using the Chart of Accounts Working with Lists Creating Company Lists Working with the Customers & Jobs List Working with the Employees List Working with the Vendors List Working with the Item List Working with Other Lists Managing Lists Setting Up Inventory Entering Inventory Ordering Inventory Receiving Inventory Paying for Inventory Manually Adjusting Inventory Selling Your Product Creating Product Invoices Applying Credit to Invoices Emailing Invoices Setting Price Levels Creating Sales Receipts Invoicing for Services Setting Up a Service Item Changing the Invoice Format Creating a Service Invoice Editing an Invoice Voiding an Invoice Deleting an Invoice Entering Statement Charges Creating Billing Statements Processing Payments Displaying the Open Invoices Report Using the Income Tracker Receiving Payments for Invoices Making Deposits Handling Bounced Checks Working with Bank Accounts Writing a QuickBooks Check Voiding a QuickBooks Check Using Bank Account Registers Entering a Handwritten Check Transferring Funds Between Accounts Reconciling Checking Accounts Entering and Paying Bills Handling Expenses Using QuickBooks for Accounts Payable Using the Bill Tracker Entering Bills Paying Bills Entering Vendor Credit Memorizing Transactions Entering a New Memorized Transaction Editing a Memorized Transaction Deleting a Memorized Transaction Grouping Memorized Transactions Using a Memorized Transaction Printing the Memorized Transaction List Customizing Forms Creating a Custom Template Modifying a Template Printing Forms Using Other QuickBooks Accounts Other QuickBooks Account Types Working with Credit Card Transactions Working with Fixed Assets Working with Long-Term Liability Accounts Using the Loan Manager Creating Reports Working with QuickReports Working with Preset Reports Sharing Reports Exporting Reports to Microsoft Excel Printing Reports Creating Graphs Creating QuickInsight Graphs Using QuickZoom with Graphs Working with the Sales Graph Customizing Graphs Printing Graphs Tracking and Paying Sales Tax Using Sales Tax in QuickBooks Setting Up Tax Rates and Agencies Indicating Who and What Gets Taxed Applying Tax to Each Sale Determining What You Owe Paying Your Tax Agencies Preparing Payroll with QuickBooks Using Payroll Tracking Setting Up for Payroll Setting Up Employee Payroll Information Setting Up a Payroll Schedule Writing a Payroll Check Printing Paycheck Stubs Tracking Your Tax Liabilities Paying Payroll Taxes Preparing Payroll Tax Forms Using the EasyStep Interview Using the EasyStep Interview Using Online Banking Setting Up an Internet Connection Setting Up Bank Feeds for Accounts Viewing, Downloading, and Adding Online Transactions Creating Online Payments Transferring Funds Online Canceling Online Payments Managing Company Files Using QuickBooks in Multi-user Mode Setting Up Users and Passwords Setting a Closing Date Sharing Files with an Accountant Updating QuickBooks Backing Up and Restoring a Company File Condensing a Company File Estimating, Time Tracking, and Job Costing Creating Job Estimates Creating an Invoice from an Estimate Displaying Reports for Estimates Updating the Job Status Tracking Time Displaying Reports for Time Tracking Tracking Vehicle Mileage Displaying Vehicle Mileage Reports Displaying Other Job Reports Writing Letters Using the Letters and Envelopes Wizard Customizing Letter Templates Additional course details: Nexus Humans Get Smart With QuickBooks 2021 for Windows training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Get Smart With QuickBooks 2021 for Windows course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Get Smart With QuickBooks 2021 for Windows
Delivered OnlineFlexible Dates
Price on Enquiry

BA07 - Implementing an Agile Project

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Executives, Project Managers, Business Analysts, Business and IT stakeholders working with analysts, Quality and process engineers, technicians, managers; supervisors, team leaders, and process operators; anyone who wants to improve their Business Analysis skills. Overview After completing this course, students will know how to: Plan, manage and close requirements for software development project in reduced time using Agile Scrum practices Minimize project uncertainty and risk by applying Agile principles through the Scrum method Ensure your project delivers required functionality and adds value to the business Create an environment of self-management for your software development team that will be able to continuously align the delivered software with desired business needs, easily adapting to changing requirements throughout the process. Learn how to apply Agile Scrum by measuring and evaluating status based on the undeniable truth of working, testing software, creating a more accurate visibility into the actual progress of projects. Many of today?s Project Management and Business Analyst Professionals are finding themselves leading, managing and analyzing on Agile development teams - only to find that many of the tools and techniques applied when using a traditional project management approach no longer work as effectively or at all. In order to do more than survive in this iterative development environment, today?s Project Manager and Business Analyst must employ additional project management and business analysis tools and techniques to effectively lead their teams and deliver their projects. Introduction - Fundamentals of Agile Why Agile? Exercise 1a: Waterfall-Lean-Agile Simulation History & Mindset: Understand how the agile approach arose. The Agile Lifecycle Introducing Agile to the organization Roles and Responsibilities on an Agile project team. Understand the purpose, the concepts, the theory, and some applications around the importance of people as individuals providing value through working in teams. Establishing core hours - How will the team work during a day? How to build end-to-end systems in early iterations Exercise 1b: How to build end-to-end systems in early iterations Planning and Managing Business Analysis Communication and Performance Agile and CMMI Exercise 1c: Case Study Project Assembling the team ? Scrum Roles Value-Driven Development: Understand why agile development focuses so heavily on working products, its more general casting as 'value-driven' development, with incremental, iterative and risk-driven approaches. Themes, theory and applications. Exercise 2a: Identify the ?Product Owner? Identify Project Success Criteria Exercise 2b: Review the Scrum Cheat Sheet Establish your Agile team using RACI Exercise 2c: Build the Scrum Team Define the Product and Project Vision Envision the Product and Project outcomes Exercise 3a: Review Agile Checklist Project Chartering (Project Planning) Assemble the Agile project team ? what are their responsibilities? Compile the Product Backlog (Coarse-Grain Requirements) Discuss how to Plan Sprints and Releases Exercise 3b: Product Vision ? Goals and Strategies Establish the Project ?time-box? Exercise 3c: Create a Release Plan Embrace the High-Level (Coarse-Grain) Plan Managing different types of Personas on an Agile Project Identifying and managing ?Information Radiators? Planning in Agile Projects ? Common practices that work Determine how the team will tracking and monitoring activities Exercise 3c: Establish the Project Time-box Tools and Techniques ? Building the Scrum Task board Communications Exercise 4a: Discussion ? Tools and Techniques for Scrum Planning, Monitoring and Adapting Scrum Task Board Exercise 4c: Create a Scrum Task board ? Identify work streams Agile Estimating Agile Analysis and Design Burndown Chart Team Velocity Soft Skills Negotiation Estimating ad Prioritizing Effort Planning Releases. Understand the value, the concepts, the theory and some applications for learning and adapting at all levels and on all topics (the product, the process, the team, and the organization). Exercise 5a: Brainstorm Business Functionality Establishing decision and acceptance criteria for user stories Planning Poker Exercise 5b: Estimate Effort (Coarse-Grain) Prioritize themes and releases Prioritize user stories Exercise 5c: Confirm the Estimated Effort (Fine Grain) Estimating team velocity Preparing for change ? Is the organization ready? Exercise 5d: Hold a daily Scrum and update the Scrum Task Board Exercise 5e: Conduct a Scrum or Scrums Plan the Iteration (Sprint) Sprint Zero activities Elements of a successful Sprint Planning meeting Create a Sprint Backlog How to create a task board Exercise 6a: Using the case study ? Review Iteration Planning Checklist Create a Sprint plan ? Establishing Sprint success metrics Exercise 6b: Discussion Sprint ?Zero? Activities Define the vision and Iteration Requirements Estimating the level of effort (LOE) with the team Creating user Stories for the Product Backlog -Guidelines to consider The art of slicing user stories Exercise 6c: Review the Sprint Plan Managing the Solution Scope and Requirements using 2-4 week Sprints Exercise 6d: Adapting a change-driven Project plan that works Adapting a change-driven (Agile) Project plan that works ? what are the key differences from traditional (waterfall) project plans? Finalize the Iteration Plan and how the team will operate Running the Sprint - from Planning to Review and Retrospective Managing your Scrums and setting expectations with your team Exercise 7a: Using the case study ? Review the Review Planning checklist Using Burndown charts to track progress Exercise 7b: Using the case study ? Review the Review Retrospective checklist Manage changes during the Sprint ? What questions to ask Prepare for the Sprint Review Exercise 7c: Review of roles - Quiz Obtain Customer Acceptance of the Product Increment Hold a Sprint Retrospective - What is working and what needs to be improved upon during the Sprints Update the product backlog - Rework the High-Level (Coarse-Grain) Plan Plan and Execute the next Sprint Create an environment for continuous improvement ? Product, Process and People Additional Information Useful books and links on Agile

BA07 - Implementing an Agile Project
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Securing Email with Cisco Email Security Appliance v3.1 (SESA)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Security engineers Security administrators Security architects Operations engineers Network engineers Network administrators Network or security technicians Network managers System designers Cisco integrators and partners Overview After taking this course, you should be able to: Describe and administer the Cisco Email Security Appliance (ESA) Control sender and recipient domains Control spam with Talos SenderBase and anti-spam Use anti-virus and outbreak filters Use mail policies Use content filters Use message filters to enforce email policies Prevent data loss Perform LDAP queries Authenticate Simple Mail Transfer Protocol (SMTP) sessions Authenticate email Encrypt email Use system quarantines and delivery methods Perform centralized management using clusters Test and troubleshoot This course shows you how to deploy and use Cisco© Email Security Appliance to establish protection for your email systems against phishing, business email compromise, and ransomware, and to help streamline email security policy management. This hands-on course provides you with the knowledge and skills to implement, troubleshoot, and administer Cisco Email Security Appliance, including key capabilities such as advanced malware protection, spam blocking, anti-virus protection, outbreak filtering, encryption, quarantines, and data loss prevention. This course helps you prepare to take the exam, Securing Email with Cisco Email Security Appliance (300-720 SESA). Describing the Cisco Email Security Appliance Cisco Email Security Appliance Overview Technology Use Case Cisco Email Security Appliance Data Sheet SMTP Overview Email Pipeline Overview Installation Scenarios Initial Cisco Email Security Appliance Configuration Centralizing Services on a Cisco Administering the Cisco Email Security Appliance Distributing Administrative Tasks System Administration Managing and Monitoring Using the Command Line Interface (CLI) Other Tasks in the GUI Advanced Network Configuration Using Email Security Monitor Tracking Messages Logging Controlling Sender and Recipient Domains Public and Private Listeners Configuring the Gateway to Receive Email Host Access Table Overview Recipient Access Table Overview Configuring Routing and Delivery Features Controlling Spam with Talos SenderBase and Anti-Spam SenderBase Overview Anti-Spam Managing Graymail Protecting Against Malicious or Undesirable URLs File Reputation Filtering and File Analysis Bounce Verification Using Anti-Virus and Outbreak Filters Anti-Virus Scanning Overview Sophos Anti-Virus Filtering McAfee Anti-Virus Filtering Configuring the Appliance to Scan for Viruses Outbreak Filters How the Outbreak Filters Feature Works Managing Outbreak Filters Using Mail Policies Email Security Manager Overview Mail Policies Overview Handling Incoming and Outgoing Messages Differently Matching Users to a Mail Policy Message Splintering Configuring Mail Policies Using Content Filters Content Filters Overview Content Filter Conditions Content Filter Actions Filter Messages Based on Content Text Resources Overview Using and Testing the Content Dictionaries Filter Rules Understanding Text Resources Text Resource Management Using Text Resources Using Message Filters to Enforce Email Policies Message Filters Overview Components of a Message Filter Message Filter Processing Message Filter Rules Message Filter Actions Attachment Scanning Examples of Attachment Scanning Message Filters Using the CLI to Manage Message Filters Message Filter Examples Configuring Scan Behavior Preventing Data Loss Overview of the Data Loss Prevention (DLP) Scanning Process Setting Up Data Loss Prevention Policies for Data Loss Prevention Message Actions Updating the DLP Engine and Content Matching Classifiers Using LDAP Overview of LDAP Working with LDAP Using LDAP Queries Authenticating End-Users of the Spam Quarantine Configuring External LDAP Authentication for Users Testing Servers and Queries Using LDAP for Directory Harvest Attack Prevention Spam Quarantine Alias Consolidation Queries Validating Recipients Using an SMTP Server SMTP Session Authentication Configuring AsyncOS for SMTP Authentication Authenticating SMTP Sessions Using Client Certificates Checking the Validity of a Client Certificate Authenticating User Using LDAP Directory Authenticating SMTP Connection Over Transport Layer Security (TLS) Using a Client Certificate Establishing a TLS Connection from the Appliance Updating a List of Revoked Certificates Email Authentication Email Authentication Overview Configuring DomainKeys and DomainKeys Identified Mail (DKIM) Signing Verifying Incoming Messages Using DKIM Overview of Sender Policy Framework (SPF) and SIDF Veri?cation Domain-based Message Authentication Reporting and Conformance (DMARC) Verification Forged Email Detection Email Encryption Overview of Cisco Email Encryption Encrypting Messages Determining Which Messages to Encrypt Inserting Encryption Headers into Messages Encrypting Communication with Other Message Transfer Agents (MTAs) Working with Certificates Managing Lists of Certificate Authorities Enabling TLS on a Listener?s Host Access Table (HAT) Enabling TLS and Certi?cate Verification on Delivery Secure/Multipurpose Internet Mail Extensions (S/MIME) Security Services Using System Quarantines and Delivery Methods Describing Quarantines Spam Quarantine Setting Up the Centralized Spam Quarantine Using Safelists and Blocklists to Control Email Delivery Based on Sender Configuring Spam Management Features for End Users Managing Messages in the Spam Quarantine Policy, Virus, and Outbreak Quarantines Managing Policy, Virus, and Outbreak Quarantines Working with Messages in Policy, Virus, or Outbreak Quarantines Delivery Methods Centralized Management Using Clusters Overview of Centralized Management Using Clusters Cluster Organization Creating and Joining a Cluster Managing Clusters Cluster Communication Loading a Configuration in Clustered Appliances Best Practices Testing and Troubleshooting Debugging Mail Flow Using Test Messages: Trace Using the Listener to Test the Appliance Troubleshooting the Network Troubleshooting the Listener Troubleshooting Email Delivery Troubleshooting Performance Web Interface Appearance and Rendering Issues Responding to Alerts Troubleshooting Hardware Issues Working with Technical Support References Model Specifications for Large Enterprises Model Specifications for Midsize Enterprises and Small-to-Midsize Enterprises or Branch O?ces Cisco Email Security Appliance Model Specifications for Virtual Appliances

Cisco Securing Email with Cisco Email Security Appliance v3.1 (SESA)
Delivered OnlineFlexible Dates
Price on Enquiry