• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1554 Manager courses delivered Live Online

WM154 IBM MQ V9 System Administration (using Linux for labs)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is designed for technical professionals who require the skills to administer IBM© MQ queue managers on distributed operating systems, in the Cloud, or on the IBM© MQ Appliance. Overview Describe the IBM© MQ deployment optionsPlan for the implementation of IBM© MQ on-premises or in the CloudUse IBM© MQ commands and the IBM© MQ Explorer to create and manage queue managers, queues, and channelsUse the IBM© MQ sample programs and utilities to test the IBM© MQ networkEnable a queue manager to exchange messages with another queue managerConfigure client connections to a queue managerUse a trigger message and a trigger monitor to start an application to process messagesImplement basic queue manager restart and recovery proceduresUse IBM© MQ troubleshooting tools to identify the cause of a problem in the IBM© MQ networkPlan for and implement basic IBM© MQ security featuresUse accounting and statistics messages to monitor the activities of an IBM© MQ systemDefine and administer a simple queue manager cluster This course provides technical professionals with the skills that are needed to administer IBM© MQ queue managers on distributed operating systems and in the Cloud. In addition to the instructor-led lectures, you participate in hands-on lab exercises that are designed to reinforce lecture content. The lab exercises use IBM© MQ V9.0, giving you practical experience with tasks such as handling queue recovery, implementing security, and problem determination. Describe the IBM© MQ deployment optionsPlan for the implementation of IBM© MQ on-premises or in the CloudUse IBM© MQ commands and the IBM© MQ Explorer to create and manage queue managers, queues, and channelsUse the IBM© MQ sample programs and utilities to test the IBM© MQ networkEnable a queue manager to exchange messages with another queue managerConfigure client connections to a queue managerUse a trigger message and a trigger monitor to start an application to process messagesImplement basic queue manager restart and recovery proceduresUse IBM© MQ troubleshooting tools to identify the cause of a problem in the IBM© MQ networkPlan for and implement basic IBM© MQ security featuresUse accounting and statistics messages to monitor the activities of an IBM© MQ systemDefine and administer a simple queue manager cluster

WM154 IBM MQ V9 System Administration (using Linux for labs)
Delivered OnlineFlexible Dates
Price on Enquiry

Project Management for Non-Project Managers: Virtual In-House Training

By IIL Europe Ltd

Project Management for Non-Project Managers: Virtual In-House Training Individuals who are involved in projects (commissioning, supporting, sponsoring, etc.) may often be unfamiliar with project management. A basic understanding of project management is essential for non-project managers, who are critical stakeholders contributing to project success. This awareness course uses A Guide to the Project Management Body of Knowledge (PMBOK® Guide) and other sources to introduce you to project management vocabulary, concepts, and techniques. It also provides insights into the realities of being a project manager, and opportunities to explore how you can positively impact projects in your own role. What You Will Learn At the end of this program, you will be able to: Identify the benefits of project management Use standard project management terminology Describe characteristics of successful projects, project managers, and high-performing teams Explain various project stakeholder roles, their responsibilities, and the fundamental project management processes Recognize how agile / adaptive practices are useful for certain project life cycles Create a personal action plan for how to support real-world projects within a non-PM role Getting Started Introductions Course structure Course goals and objectives Foundation Concepts Project management overview Strategic value of project management Defining project success Project life-cycle models and governance Project roles and responsibilities Project Initiating and Planning Initiating the project Defining project requirements and scope Developing the project schedule and budget Project Risk Management, Executing, Monitoring, and Closing Understanding, evaluating, and adjusting for risk Honoring the baseline and executing the project Monitoring and controlling the project Closing the project Project Interpersonal Processes Project communication Project team development Conflict management

Project Management for Non-Project Managers: Virtual In-House Training
Delivered OnlineFlexible Dates
£450

Managing Complex Projects: In-House Training

By IIL Europe Ltd

Managing Complex Projects: In-House Training As knowledge and technology expand exponentially, organizations are finding that the tools, processes, and methods used to select, plan, and manage their projects are insufficient for the challenges posed by them. The goal of this course is to provide participants with a working knowledge of project complexities and a framework for managing the ambiguities involved in today's fast-changing, competitive, and technology-based environment As knowledge and technology expand exponentially, organizations are finding that the tools, processes, and methods used to select, plan, and manage their projects are insufficient for the challenges posed by them. Complex projects don't necessarily follow the rules of traditional projects - in many instances the projects' end-products, and the methods by which they will be produced, are not easily defined. Stakeholder diversity and geographical dispersion contribute to the difficulties project managers face in their efforts to gain acceptance of project goals, objectives, and changes. Additionally, hierarchic leadership styles, traditional lifecycle approaches, and traditional project manager competencies may no longer maximize the efficiencies that need to be realized on complex projects. The goal of this course is to provide participants with a working knowledge of project complexities and a framework for managing the ambiguities involved in today's fast-changing, competitive, and technology-based environments. What you Will Learn The learning objectives of this workshop are to enable participants to: Appreciate complexity and its impact on the management of projects Describe the differences among traditional, complicated, and complex projects Explain the effects of complexity on the PMBOK® Guide's process groups Apply a high-level model in the management of real- world projects Complexity and Projects Some characteristics of complex systems Important models/characteristics of complex projects Major players in project complexity Landscapes and project typologies A supplemental framework for complex projects Framing Framing overview Potential pitfalls in framing complex projects Possible solutions Inception Centrality of risk management PM competencies, selection Stakeholder identification, analysis Blueprint Collaborative planning Stakeholder engagements Alternative methodologies/life cycles Collaborative scheduling Procurement management Oversight, Navigation, and Adjustment Leadership and the project team Stakeholder management Networks Close and Continuous Improvement Transition/support Post-project evaluations Rewards/Recognition

Managing Complex Projects: In-House Training
Delivered in London or UK Wide or OnlineFlexible Dates
£1,495

Project Management Fundamentals for IT Projects: In-House Training

By IIL Europe Ltd

Project Management Fundamentals for IT Projects: In-House Training A number of factors impact the new project manager's role within IT - for instance, the need to fully integrate IT into the business improvement process and the advent of distributed technology and Business Process Reengineering. As a result, the range of activities required of a new project manager has greatly increased, as well as the range of people with whom he or she interacts. This workshop enables you to minimize the problems inherent in managing a systems development project. What You Will Learn You'll learn how to: Articulate the benefit of using a project management methodology, processes, and various life cycles for IT projects Articulate on various standards and maturity models that provide benefits to performing organizations that manage IT projects Describe governance, gating, and the processes required for project origination Conduct a stakeholder analysis and describe its benefits throughout the project life cycle Gather good requirements, develop a work breakdown structure (WBS), and establish a baseline project plan Execute against the baseline project plan while managing change and configuration items Monitor and control the project activities using the baseline project plan and earned value management concepts Close the project by conducting scope verification, procurement audits, gathering lessons learned, archiving project records, and releasing resources Getting Started Course goal Course structure Course goals and objectives Foundation Concepts Key definitions and concepts Methodologies, processes, and project life cycles Project success factors and the benefits of standards and models Project Originating and Initiating Originating projects Initiating projects Planning Stakeholder Engagement and Resource Management Planning stakeholder engagement Planning human resources management Developing effective leadership skills Planning Scope and Quality Management Planning project scope Planning project quality Planning Schedule Management Planning project time Identifying schedule activities Sequencing schedule activities Estimating activity resources and time Developing project schedule Optimizing the project schedule Planning Risk and Cost Management Planning for project risks Planning project costs Estimating project costs Developing a project budget Planning Communication and Procurement Management Planning project communications Planning project procurements Project Executing, Monitoring and Controlling, and Closing Project executing Project monitoring and controlling Project closing

Project Management Fundamentals for IT Projects: In-House Training
Delivered in London or UK Wide or OnlineFlexible Dates
£1,495

E2E120 SAP Technical Monitoring in SAP Solution Manager

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course are Technology Consultants, System AdministratorsTechnical Architects, and Support Consultants. Overview Understand and use the Monitoring and Alerting Infrastructure (MAI) for monitoring the system landscape with SAP Solution ManagerSetup and Configure the monitoring types System Monitoring, Self- Monitoring, End-user Experience, Integration Monitoring, Job & BI MonitoringUse the features of the Technical Monitoring Work CenterUse Technical Reporting options (EWA, SL Reporting, Interactive Reporting)Use the SAP Solution Manager Administration work center for Troubleshooting In this course, students learn to understand and use the Monitoring and Alerting Infrastructure (MAI) for monitoring the system landscape with SAP Solution Manager Setup and configure the monitoring types. Course Outline Get an overview about the Technical Monitoring in SAP Solution Manager 7.1 Get an overview about the Monitoring and Alerting Infrastructure (MAI) architecture Get a deep understanding about Monitoring Templates Using the Alert Inbox including Guided Procedures Configure Work Mode Management and Notification Management Configure and using System Monitoring Configure and using Interface Channel Monitoring and Connection Monitoring Configure and using End-user Experience Monitoring Configure and using BI-Monitoring and Job Monitoring Configure and using PI-Monitoring, Message Flow Monitoring and Workflow Monitoring Using Technical Reporting (EarlyWatch Alerts, Service Level Reporting, Interactive Reporting and Dashboards) Get an overview about SAP IT Infrastructure Management Get an overview about SAP Mobile Apps for the Monitoring and Alerting Infrastructure (MAI) Configure and using SAP Solution Manager Self-Monitoring and Self Diagnosis Using Monitoring and Alerting Infrastructure Analysis Tools

E2E120 SAP Technical Monitoring in SAP Solution Manager
Delivered OnlineFlexible Dates
Price on Enquiry

AZ-500T00 Microsoft Azure Security Technologies

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is for Azure Security Engineers who are planning to take the associated certification exam, or who are performing security tasks in their day-to-day job. This course would also be helpful to an engineer that wants to specialize in providing security for Azure-based digital platforms and play an integral role in protecting an organization's data. This course provides IT Security Professionals with the knowledge and skills needed to implement security controls, maintain an organization?s security posture, and identify and remediate security vulnerabilities. This course includes security for identity and access, platform protection, data and applications, and security operations. Prerequisites AZ-104T00 - Microsoft Azure Administrator Security best practices and industry security requirements such as defense in depth, least privileged access, role-based access control, multi-factor authentication, shared responsibility, and zero trust model. Be familiar with security protocols such as Virtual Private Networks (VPN), Internet Security Protocol (IPSec), Secure Socket Layer (SSL), disk and data encryption methods. Have some experience deploying Azure workloads. This course does not cover the basics of Azure administration, instead the course content builds on that knowledge by adding security specific information. Have experience with Windows and Linux operating systems and scripting languages. Course labs may use PowerShell and the CLI. 1 - Manage identities in Microsoft Entra ID Secure users in Microsoft Entra ID Secure groups in Microsoft Entra ID Recommend when to use external identities Secure external identities Implement Microsoft Entra Identity protection 2 - Manage authentication by using Microsoft Entra ID Configure Microsoft Entra Verified ID Implement multifactor authentication (MFA) Implement passwordless authentication Implement password protection Implement single sign-on (SSO) Integrate single sign-on (SSO) and identity providers Recommend and enforce modern authentication protocols 3 - Manage authorization by using Microsoft Entra ID Configure Azure role permissions for management groups, subscriptions, resource groups, and resources Assign built-in roles in Microsoft Entra ID Assign built-in roles in Azure Create and assign a custom role in Microsoft Entra ID Implement and manage Microsoft Entra Permissions Management Configure Microsoft Entra Privileged Identity Management Configure role management and access reviews by using Microsoft Entra Identity Governance Implement Conditional Access policies 4 - Manage application access in Microsoft Entra ID Manage access to enterprise applications in Microsoft Entra ID, including OAuth permission grants Manage app registrations in Microsoft Entra ID Configure app registration permission scopes Manage app registration permission consent Manage and use service principals Manage managed identities for Azure resources Recommend when to use and configure a Microsoft Entra Application Proxy, including authentication 5 - Plan and implement security for virtual networks Plan and implement Network Security Groups (NSGs) and Application Security Groups (ASGs) Plan and implement User-Defined Routes (UDRs) Plan and implement Virtual Network peering or gateway Plan and implement Virtual Wide Area Network, including secured virtual hub Secure VPN connectivity, including point-to-site and site-to-site Implement encryption over ExpressRoute Configure firewall settings on PaaS resources Monitor network security by using Network Watcher, including NSG flow logging 6 - Plan and implement security for private access to Azure resources Plan and implement virtual network Service Endpoints Plan and implement Private Endpoints Plan and implement Private Link services Plan and implement network integration for Azure App Service and Azure Functions Plan and implement network security configurations for an App Service Environment (ASE) Plan and implement network security configurations for an Azure SQL Managed Instance 7 - Plan and implement security for public access to Azure resources Plan and implement Transport Layer Security (TLS) to applications, including Azure App Service and API Management Plan, implement, and manage an Azure Firewall, Azure Firewall Manager and firewall policies Plan and implement an Azure Application Gateway Plan and implement an Azure Front Door, including Content Delivery Network (CDN) Plan and implement a Web Application Firewall (WAF) Recommend when to use Azure DDoS Protection Standard 8 - Plan and implement advanced security for compute Plan and implement remote access to public endpoints, Azure Bastion and just-in-time (JIT) virtual machine (VM) access Configure network isolation for Azure Kubernetes Service (AKS) Secure and monitor AKS Configure authentication for AKS Configure security for Azure Container Instances (ACIs) Configure security for Azure Container Apps (ACAs) Manage access to Azure Container Registry (ACR) Configure disk encryption, Azure Disk Encryption (ADE), encryption as host, and confidential disk encryption Recommend security configurations for Azure API Management 9 - Plan and implement security for storage Configure access control for storage accounts Manage life cycle for storage account access keys Select and configure an appropriate method for access to Azure Files Select and configure an appropriate method for access to Azure Blob Storage Select and configure an appropriate method for access to Azure Tables Select and configure an appropriate method for access to Azure Queues Select and configure appropriate methods for protecting against data security threats, including soft delete, backups, versioning, and immutable storage Configure Bring your own key (BYOK) Enable double encryption at the Azure Storage infrastructure level 10 - Plan and implement security for Azure SQL Database and Azure SQL Managed Instance Enable database authentication by using Microsoft Entra ID Enable and monitor database audit Identify use cases for the Microsoft Purview governance portal Implement data classification of sensitive information by using the Microsoft Purview governance portal Plan and implement dynamic mask Implement transparent data encryption? Recommend when to use Azure SQL Database Always Encrypted 11 - Plan, implement, and manage governance for security Create, assign, and interpret security policies and initiatives in Azure Policy Configure security settings by using Azure Blueprint Deploy secure infrastructures by using a landing zone Create and configure an Azure Key Vault Recommend when to use a dedicated Hardware Security Module (HSM) Configure access to Key Vault, including vault access policies and Azure Role Based Access Control Manage certificates, secrets, and keys Configure key rotation Configure backup and recovery of certificates, secrets, and keys 12 - Manage security posture by using Microsoft Defender for Cloud Implement Microsoft Defender for Cloud Identify and remediate security risks by using the Microsoft Defender for Cloud Secure Score and Inventory Assess compliance against security frameworks and Microsoft Defender for Cloud Add industry and regulatory standards to Microsoft Defender for Cloud Add custom initiatives to Microsoft Defender for Cloud Connect hybrid cloud and multicloud environments to Microsoft Defender for Cloud Identify and monitor external assets by using Microsoft Defender External Attack Surface Management 13 - Configure and manage threat protection by using Microsoft Defender for Cloud Enable workload protection services in Microsoft Defender for Cloud, including Microsoft Defender for Storage, Databases, Containers, App Service, Key Vault, Resource Manager, and DNS Configure Microsoft Defender for Servers Configure Microsoft Defender for Azure SQL Database Manage and respond to security alerts in Microsoft Defender for Cloud Configure workflow automation by using Microsoft Defender for Cloud Evaluate vulnerability scans from Microsoft Defender for Server 14 - Configure and manage security monitoring and automation solutions Monitor security events by using Azure Monitor Configure data connectors in Microsoft Sentinel Create and customize analytics rules in Microsoft Sentinel Configure automation in Microsoft Sentinel Additional course details: Nexus Humans AZ-500T00 Microsoft Azure Security Technologies training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AZ-500T00 Microsoft Azure Security Technologies course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

AZ-500T00 Microsoft Azure Security Technologies
Delivered OnlineFlexible Dates
£2,380

HP ProCurve switches for engineers

5.0(3)

By Systems & Network Training

HP ProCurve training course description A hands on course covering the product specifics of HP switches. Installation, configuration, maintenance and troubleshooting are all covered in a practical oriented way. VLANs often take up a large part of the course. The course covers all interfaces but concentrates on using the command line interface. Delegates are, however, free to use the web based interface in all exercises. What will you learn Install HP ProCurve switches. Use the command line interface and the web based interface to manage HP ProCurve switches. Configure and troubleshoot HP ProCurve switches. Perform software upgrades and maintain configurations using TFTP. HP ProCurve training course details Who will benefit: Anyone working with HP switches. Particularly aimed at engineers and technicians supporting HP switches. Prerequisites: None. Duration 2 days HP ProCurve training course content Introduction Traditional Ethernet, Hubs, Frames, MAC addresses. Hands on Building a network with a hub What is a switch? Switches versus hubs, the MAC address table, handling unknown addresses. Hands on Building a network with HP switches. Configuration methods How to configure a HP switch using: Console port access menus, CLI, telnet, web based access. Hands on Console access, show commands, using the menus, IP address configuration, telnet. Command Line Interface Operator mode, Manager mode, configuration mode, passwords, online help, CLI commands, basic troubleshooting. Hands on More show commands, basic troubleshooting, setting a password, displaying status and counters. Web based interface Web access, basic format, Getting started. SSL. Hands on Web based configuration. Port configuration Common port configuration tasks, port security, port aggregation. Hands on Configuring ports. Trunking and failover. STP configuration Broadcast storms. What is STP? RSTP. Configuring STP. Hands on Enabling and disabling STP, investigation failover. VLAN configuration What are VLANS? 802.1Q, tagged/untagged, creating VLANS, applying VLANS. Addressing and VLANs, Layer 3 switches and VLANs. Hands on Setting up VLANS, setting up tagged ports, Inter VLAN traffic. Housekeeping TFTP, software upgrades, downloading configurations. Hands on Software upgrade, downloading a configuration. SNMP SNMP configuration, HP OpenView. Hands on Using SNMP to manage a HP ProCurve switch. Basic troubleshooting Putting it all together. Layer 1 troubleshooting, Layer 2 troubleshooting. Miscellaneous exercises CDP. Logging

HP ProCurve switches for engineers
Delivered in Internationally or OnlineFlexible Dates
£1,497

HP Switches for engineers

5.0(3)

By Systems & Network Training

HP switches training course description A hands on course covering the product specifics of HP switches. Installation, configuration, maintenance and troubleshooting are all covered in a practical oriented way. VLANs often take up a large part of the course. The course covers all interfaces but concentrates on using the command line interface. Delegates are, however, free to use the web based interface in all exercises. What will you learn Install HP switches. Use the command line interface and the web based interface to manage HP switches. Configure and troubleshoot HP switches. Perform software upgrades and maintain configurations using TFTP. HP switches training course details Who will benefit: Anyone working with HP switches. Particularly aimed at engineers and technicians supporting HP switches. Prerequisites: None. Duration 2 days HP switches training course content Introduction Traditional Ethernet, Hubs, Frames, MAC addresses. Hands on Building a network with a hub. What is a switch? Switches versus hubs, the MAC address table, handling unknown addresses. Hands on Building a network with HP switches. Configuration methods How to configure a HP switch using: Console port access menus, CLI, telnet, web based access. Hands on Console access, show commands, using the menus, IP address configuration, telnet. Command Line Interface Operator mode, Manager mode, configuration mode, passwords, online help, CLI commands, basic troubleshooting. Hands on More show commands, basic troubleshooting, setting a password, displaying status and counters. Web based interface Web access, basic format, Getting started. SSL. Hands on Web based configuration. Port configuration Common port configuration tasks, port security, port aggregation, Hands on Configuring ports. Trunking and failover. STP configuration Broadcast storms. What is STP? RSTP. Configuring STP. Hands on Enabling and disabling STP, investigation failover. VLANs What are VLANS? 802.1Q, tagged/untagged, creating VLANS, applying VLANS. Addressing and VLANs, Layer 3 switches and VLANs. Hands on Setting up VLANS, setting up tagged ports, Inter VLAN traffic. Housekeeping TFTP, software upgrades, downloading configurations. Hands on Software upgrade, downloading a configuration. SNMP SNMP configuration, HP OpenView NNM. Hands on Using SNMP to manage a HP switch. Basic troubleshooting Putting it all together. Layer 1 troubleshooting, Layer 2 troubleshooting. Miscellaneous exercises CDP. Logging

HP Switches for engineers
Delivered in Internationally or OnlineFlexible Dates
£1,497

CUSTOMS PROCEDURES & DOCUMENTATION

By Export Unlocked Limited

This course looks at the procedures required to deal with customs. It is vitally important that importers and exporters understand the information required to be submitted.

CUSTOMS PROCEDURES & DOCUMENTATION
Delivered Online + more
£295

Administering Cisco Unified Communications (Call Manager) (ACUCC v12.5)

By Nexus Human

Duration 5 Days 30 CPD hours This one of kind Cisco UC in-depth course takes student from initial endpoint configuration to a full solution deployment using all of the Cisco UC Components. Students will have extensive labs in which they will Administer and troubleshoot a Cisco 12.5 UC Deployment.Participants will gain in-depth practical knowledge with exercises on administering and troubleshooting of all Cisco UC Components. Tools for Managing UC Collaboration 12.5 Prime Collaboration Deployment Manager Overview 12.5 Bulk Admin Tool (BAT) Importing and Exporting Settings Importing and Exporting Users Importing and Exporting Phones Phone Migrations Unsupported IP Phone Models CUCM Upgrades Loading COP Files Unified Communication Manager 12.5 Cisco Smart Licensing Cisco Unified Communication Manager Overview Cisco UCM Configuration Redundancy Services Service Parameters Enterprises Parameters User Configuration LDAP Integration Synchronization Authentication Attribute Mapping Filters Endpoint Configuration Creating and Modifying Phone and Configuration Call Routing Implementing Calling Privileges Partitions and CSSs Configuration Implementing Extension Mobility Media Resources Cisco Meeting Server Troubleshooting UCM Features CAR (CDR Accounting and Reporting) Tool Reports Dialed Number Analyzer RTMT Log Collection Use RTMT to View Performance Counters Troubleshooting Common Endpoint Registration Issues Disaster Recovery System Remote Site Redundancy Gateway Gateway Overview Cisco H323 Gateways Cisco MGCP Gateways Cisco IOS SIP Gateways Troubleshooting IOS Gateways Cisco Emergency Responder (CER) 12.5 CER Overview Emergency Notifications CER Redundancy and Clustering Integration with CUCM Cisco Emergency Responder Administration Interfaces Configuring Users and Role-Based System Access Configuring Cisco Emergency Responder Notification by IP Subnet SNMP Overview Adding new switches Notification by Switch Port Cisco Unified Communications Mobile and Remote Access (MRA) MRA Overview Expressway Edge MRA Licensing MRA Components Certificates Integrating Cisco Unified IM and Presence 12.5 IM&P and Jabber Overview Configure Service Discovery DNS Record Requirements Install Cisco Jabber Cisco Jabber in Softphone Mode Set Up Cisco Jabber in Full UC Mode Integrating CUCM and IM&P Configuring CUCM Services for Jabber Troubleshooting Jabber Integrating Cisco Unity Connection 12.5 Cisco Unity Connection Overview Cisco Unity Connection Integration Using SIP Cisco Unity Connection Call Handlers Configuring Search spaces and Partitions Cisco Unity Connection Administration Cisco Unity Connection Integration Troubleshooting Tools RTMT Using Port Monitor to Troubleshoot Voice Mails Cisco Unity Audiotext Application Unified Messaging Cisco Meeting Server (CMS) Introduction to Cisco Meeting Server Configuring CMS Configuring Meetings with CMS Configuring Spaces with CMS Scheduling Meeting with TMS Cisco UCCX Cisco Unified Contact Center Express Overview Cisco Unified Contact Center Express Administration Agents Skills Queues Basic Scripting (Overview) Finesse Reporting CUIC Cisco Paging Server (InformaCast) InformaCast Overview InformaCast Administration IP Phone Paging Analog Paging Multicast Requirements Using InformaCast Troubleshooting Using Troubleshooting Methodology Analyze the Troubleshooting Process Troubleshooting Methodology in Complex Environments Define the Problem Gather Facts Consider Possibilities Create an Action Plan Implement an Action Plan Observe Results Restart the Problem-Solving Process Document Facts Using Troubleshooting and Monitoring Tools Cisco Unified Serviceability Cisco Unified RTMT Performance Monitor and Data Logging Trace File Collection Troubleshooting Common Gateway and Endpoint Registration Issues IP Phone Initialization Common DHCP-Related and TFTP-Related Issues Using Ping to Cisco IP Phones Cisco Unified IP Phone Status Messages Cisco Unified IP Phone Network Configuration Additional course details: Nexus Humans Administering Cisco Unified Communications (Call Manager) (ACUCC v12.5) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Administering Cisco Unified Communications (Call Manager) (ACUCC v12.5) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Administering Cisco Unified Communications (Call Manager) (ACUCC v12.5)
Delivered OnlineFlexible Dates
Price on Enquiry