• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

708 Microsoft courses in Cardiff delivered Live Online

Total IPsec for engineers

5.0(3)

By Systems & Network Training

IPsec training course description This hands on course focuses on IPsec VPNs. Rather than focusing on one implementation this course concentrates on the technologies and protocols of IPsec. Starting with an overview of the complete IPsec architecture the course then moves onto ESP packet analysis along with encryption and authentication provided. IKEv1 and IKEv2 are both covered in detail. Having covered IPsec with pre shared keys the course then moves onto IPsec with certificates followed by IPsec issues. The course is vendor neutral with hands on with both Cisco and Microsoft implementations. What will you learn Explain how IPsec works. Explain the role of AH, ESP and IKE. Configure IPsec. Troubleshoot IPsec. IPsec training course details Who will benefit: Technical staff working with IPsec. Prerequisites: Definitive IP VPNs for engineers. Duration 3 days IPsec training course contents What is IPsec? How to spell IPsec, IPsec is IP security, confidentiality, integrity, authenticity, replay protection, what is a VPN? Network layer security, IPsec and IPv4, IPsec and IPv6, the suite of protocols, the standard, IPsec RFCs, IPsec history. Hands on Analysis of 'normal' IP packets. IPsec architecture The IPsec protocols, AH vs ESP, Why two headers? transport mode, tunnel mode, Remote access VPNs, site to site VPNs, security associations, SA database, Security Parameters Index, implementations: Host tack, Bump in the Stack, Bump in the Wire. Hands on Configuring IPsec. AH What AH does, the stack, The AH header, What is authenticated? Device authentication. AH in transport mode, AH in tunnel mode. Hands on AH packet analysis. ESP What ESP does, the ESP header, ESP in transport mode, ESP in tunnel mode, ESP and SA, ESP and SPI. Hands on ESP packet analysis, policy configuration. IPsec encryption IPsec is a framework, standard algorithms, ESP keys, the role of IKE, key lifetimes, how IKE generates the keys, DES, 3DES, AES, cipher block chaining, counter mode, other encryption. Hands on Encryption configuration. IPsec authentication Authentication types, IPsec authentication, Authentication algorithms: MD5, keyed SHA-1, HMAC-MD5, HMAC-SHA-1, HMAC-RIPEMD, other authentication algorithms. Hands on Authentication configuration. IKE Internet Key Exchange, IKE and the SAD, the two phase negotiation, ISAKMP, ISAKMP header, pre shared keys, digital signatures, public key encryption, Diffie Hellman, proposals, counter proposals, nonces, identities, phase 1 negotiation: main mode, aggressive mode, base mode. Phase 2 negotiation: quick mode, new group mode. Hands on IKE packet analysis. More IKE PFS, IKE and dynamic addresses, XAUTH, hybrid authentication, CRACK, ULA, PIC. User level authentication. IKE renegotiation, heartbeats. Hands on Troubleshooting IPsec. IKEv2 The IKEv2 exchange, IKE_SA_INIT, IKE_AUTH, CREATE_CHILD_SA, IKEv2 packets, the informational exchange. Comparing IKev1 vs IKE v2. Hands on IKEv2 configuration and analysis. PKI What is PKI?, Digital certificates, Certificate authorities, CA servers, RA, VA, certificates, CA hierarchy, CRLs, certificate formats. Hands on installing and configuring certificate servers. IPsec issues NAT, IPsec overhead and fragmentation. Summary IPsec strengths and weaknesses. Where to get further information.

Total IPsec for engineers
Delivered in Internationally or OnlineFlexible Dates
£2,367

IOSH - Managing safely online course

By Airborne Environmental Consultants Ltd

The main learning outcomes of the course are: Describe the key reasons to manage safety and health in the workplace Define the key terms relating to safety and health Identify how the law can have an impact on safety and health in the workplace Describe how to assess, reduce and control risk in the workplace Identify workplace hazards and risks, their impact and how to manage them Identify how to evaluate and respond to an incident List the benefits and characteristics of an effective health and safety management system Describe the principles that underpin good safety and health performance

IOSH - Managing safely online course
Delivered in Manchester + 1 more or OnlineFlexible Dates
Price on Enquiry

20703-1 Administering System Center Configuration Manager

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is for experienced information technology (IT) professionals, typically described as Enterprise Desktop Administrators (EDAs). These EDAs deploy, manage, and maintain PCs, devices, and applications across medium, large, and enterprise organizations. A significant portion of this audience uses, or intends to use, the latest release of Configuration Manager to manage and deploy PCs, devices, and applications. Overview After completing this course, students will be able to: •Analyze data by using queries and reports. •Prepare a management infrastructure, including configuring boundaries, boundary groups, and resource discovery, and integrating mobile-device management with Microsoft Exchange Server. •Deploy and manage the Configuration Manager client. •Configure, manage, and monitor hardware and software inventory, and use Asset Intelligence and software metering. •Identify and configure the most appropriate method to distribute and manage content used for deployments. •Distribute, deploy, and monitor applications for managed users and systems. •Maintain software updates for PCs that Configuration Manager manages. •Implement Endpoint Protection for managed PCs. •Manage configuration items, baselines, and profiles to assess and configure compliance settings and data access for users and devices. •Configure an operating-system deployment strategy by using Configuration Manager. •Manage and maintain a Configuration Manager site. In this course, students will learn day-to-day management tasks, including how to manage applications, client health, hardware and software inventory, operating system deployment, and software updates by using Configuration Manager. You also will learn how to optimize System Center Endpoint Protection, manage compliance, and create management queries and reports. Managing computers and mobile devices in the enterprise Overview of systems management by using enterprise management solutions Overview of the Configuration Manager architecture Overview of the Configuration Manager administrative tools Tools for monitoring and troubleshooting a Configuration Manager site Lab : Exploring the Configuration Manager tools Analyzing data using queries, reports, and CMPivot Introduction to queries Configuring SQL Server Reporting Services Analyzing the real-time state of a device by using CMPivot Lab : Creating and running queries Lab : Configuring SSRS Lab : Analyzing the real-time state of a device by using CMPivot Preparing the Configuration Manager management infrastructure Configuring site boundaries and boundary groups Configuring resource discovery Organizing resources using device and user collections Lab : Configuring boundaries and resource discovery Lab: Configuring user and device collections Deploying and managing the Configuration Manager client Overview of the Configuration Manager client Deploying the Configuration Manager client Configuring and monitoring client status Managing client settings and performing management operations Lab : Deploying the Microsoft System Center Configuration Manager client software Lab: Configuring and monitoring client status Lab : Managing client settings Managing inventory for PCs and applications Overview of inventory collection Configuring hardware and software inventory Managing inventory collection Configuring software metering Configuring and managing Asset Intelligence Lab : Configuring and managing inventory collection Lab : Configuring software metering Lab : Configuring and managing Asset Intelligence Distributing and managing content used for deployments Preparing the infrastructure for content management Distributing and managing content on distribution points Lab : Distributing and managing content for deployments Deploying and managing applications Overview of application management Creating applications Deploying applications Managing applications Deploying virtual applications by using System Center Configuration Manager (Optional) Deploying and managing Windows Store apps Lab : Creating and deploying applications Lab : Managing application supersedence and removal Lab : Deploying virtual applications by using Configuration Manager (Optional) Lab : Using Configuration Manager to deploy Windows Store apps Maintaining software updates for managed PCs The software updates process Preparing a Configuration Manager site for software updates Managing software updates Configuring automatic deployment rules Monitoring and troubleshooting software updates Enabling third-party updates Lab : Configuring the site for software updates Lab : Deploying and managing software updates Implementing Endpoint Protection for managed PCs Overview of Endpoint Protection in Configuration Manager Configuring, deploying, and monitoring Endpoint Protection policies Configuring and deploying advanced threat policies Lab : Implementing Microsoft System Center Endpoint Protection Lab : Implementing advanced threat policies Managing compliance and secure data access Overview of Compliance Settings Configuring compliance settings Viewing compliance results Managing resource and data access Lab : Managing compliance settings Managing operating system deployment An overview of operating system deployment Preparing a site for operating system deployment Deploying an operating system Managing Windows as a service Lab : Preparing the site for operating -system deployment Lab : Deploying operating -system images for bare-metal installations Managing and maintaining a Configuration Manager site Configuring role-based administration Configuring Remote Tools Overview of Configuration Manager site maintenance Backing up and recovering a Configuration Manager site Lab : Configuring role-based administration Lab : Configuring Remote Tools Lab : Maintaining a Configuration Manager site Additional course details: Nexus Humans 20703-1 Administering System Center Configuration Manager training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the 20703-1 Administering System Center Configuration Manager course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

20703-1 Administering System Center Configuration Manager
Delivered OnlineFlexible Dates
Price on Enquiry

Get to grips with all the features of Teams, including calls and chats, Teams and Channels and Meetings Course overview Duration: 2 hours This session is aimed at those new or self-taught users of Teams to show them the features and how to setup and use it effectively. Objectives  By the end of the course you will be able to: Use the core functions of Microsoft Teams Set up Microsoft Teams Make Calls Send Chats to colleagues via teams Set up channels Run Teams meetings Content What is Teams Teams elements Setting up your Teams Setting up audio and video Using voicemail Setting voicemail language Calls and Chats Sending individual and group chats Making and receiving calls Missed call notification Searching Teams and Channels Creating channels Channel settings Setting channel notifications Emailing channels Creating private channels Posting to channels Alerting specific people in a channel Adding files to channels Sending links to channels Teams Meetings Setting up meetings Running meetings from channels Setting backgrounds Screen sharing in meetings Handing over control Creating meeting notes Adding files to teams or meetings Using the meeting chat

Teams
Delivered in Horsham or OnlineFlexible Dates
Price on Enquiry

Supporting Windows 10

5.0(3)

By Systems & Network Training

Supporting Windows 10 course description This course is designed to provide students with the knowledge and skills required to support and troubleshoot Windows 10 PCs and devices in a Windows Server domain environment. These skills include understanding of Windows 10 features, how they can be used in an Active Directory environment and how to troubleshoot them. What will you learn Troubleshoot startup issues and operating system services on a Windows 10 PC. Troubleshoot issues related to network connectivity. Troubleshoot client configuration failures and GPO application issues. Troubleshoot issues related to application installation and operation. Recover a PC running Windows 10. Supporting Windows 10 course details Who will benefit: Anyone supporting users running Windows 10 personal computers within a medium to large enterprise. Prerequisites: None. Duration 5 days Supporting Windows 10 course contents Implementing a Troubleshooting Methodology Overview of Windows 10, Introduction to the EDST Job Role, Overview of the Troubleshooting Steps & Tools. Hands on Implementing a Troubleshooting Methodology. Hands on Using Troubleshooting Tools for Windows 10. Troubleshooting Startup Issues Overview of the Windows 10 Startup Recovery Environment, Troubleshooting Startup Settings & Operating System Services Issues, Recovering BitLocker-Protected Drives. Hands on Troubleshooting Startup Issues. Hands on Recovering BitLocker-Encrypted Drives, Creating a New BitLocker Password. Troubleshooting Hardware and Device Drivers Troubleshooting Device Driver Failures & Physical Failures, Overview of Hardware Troubleshooting, Monitoring Reliability, Configuring the Registry. Hands on Troubleshooting Device Driver Issues, Resolving Hardware Issues, Adding a Missing Device Driver to a Driver Store, Reverting a Problematic Device Driver. Hands on Troubleshooting Hardware Issues, Diagnosing Memory, Troubleshooting and Repairing Failed Disk Redundancy Synchronizing Settings, Accessing Data on a Foreign Volume. Troubleshooting Remote Computers Using Remote Desktop and Remote Assistance, Remoting with Windows PowerShell Hands on Troubleshooting Remote Computer by using Remote Desktop and Remote Assistance. Hands on Troubleshooting Remote Computer by using Windows PowerShell. Resolving Network Connectivity Issues Determining Network Settings, Troubleshooting Network Connectivity Issues, Troubleshooting Name Resolution. Hands on Resolving Network Connectivity Issues. Hands onResolving Name Resolution Issues. Troubleshooting Group Policy Overview of Group Policy Application, Resolving Client Configuration Failures and GPO Application Issues. Hands on Troubleshooting Group Policy Application Issues. Hands on Resolving Group Policy Issues. Hands on Installing and Sharing a Printer. Troubleshooting User Settings Troubleshooting Sign In Issues, Troubleshooting the Application of User Settings. Hands on Troubleshooting Sign in Problems. Hands on Troubleshooting the Application of User Settings, Resolving Folder Redirection Problem, Resolving Roaming User Profile Problem. Troubleshooting Remote Connectivity Troubleshooting VPN Connectivity Issues & DirectAccess. Hands on Troubleshooting VPN Connectivity Lab : Configuring and Troubleshooting DirectAccess Configuring and Verifying, DirectAccess Client-Side Settings, Troubleshooting DirectAccess. Troubleshooting Resource Access Within a Domain & File Permissions Issues, Recovering Files Encrypted by EFS, Troubleshooting Printer Access Issues. Lab : Troubleshooting File Access Issues Lab : Troubleshooting Access to Encrypted Files. Hands on Troubleshooting Printer Access Issues Troubleshooting Resource Access for Non Domain Member Clients Configuring and Troubleshooting Device Registration, Configuring and Troubleshooting Work Folders, Configuring and Troubleshooting OneDrive Access. Hands on Troubleshooting Resource Access for Clients that are not Domain Members. Troubleshooting Device Registration, Work Folders and OneDrive for Business. Troubleshooting Applications Troubleshooting Desktop App Installation Issues, Desktop Apps, Managing Windows Store Apps, Troubleshooting Access to Company Web Applications. Hands on Troubleshooting Desktop Apps, AppLocker Policy Application & Application Compatibility issue. Hands on Troubleshooting Access to Company Web Applications, Internet Explorer Issue & Microsoft Edge. Maintaining Windows 10 Managing & Troubleshooting Windows Activation, Troubleshooting Performance, Applying Applications. Hands on Monitoring and Troubleshooting Performance. Recovering Data and Operating System File Recovery in Windows 10, Recovering an OS. Hands on Recovering Data, Recovering Data from Azure Backup, Recovering Deleted File by Using File History. Hands on Provisioning Computer to Comply with Company Standards, Provision Computer to Comply with Company Standards.

Supporting Windows 10
Delivered in Internationally or OnlineFlexible Dates
£3,697

Network management technologies

5.0(3)

By Systems & Network Training

Network management technologies course description A comprehensive tour of the available network management technologies available for todays networks. The course starts with basic tools such as syslog along with Python network automation. SNMP is then covered with the *flow technologies and streaming telemetry. Configuration management with ansible, Python, NETCONF and RESTCONF is then studied. The final part of the course looks at SDN. Hands on sessions are used throughout to reinforce the theory rather than teach specific manufacturer equipment. Note that sections are available as individual courses. What will you learn Evaluate network management technologies. Evaluate network management technologies. Recognise the weaknesses of SNMP versus NETCONF and streaming telemetry. Explain the role of NETCONF and RESTCONF. Compare & contrast *flow and streaming telemetry. Explain the role of SDN in network management. Automate network configuration with ansible and Python. Network management technologies course details Who will benefit: Those wishing to manage networks. (Previous Python experience is NOT needed) Prerequisites: Intro to data comms Duration 5 days Network management technologies course content Basic network management Network management What is network management? Benefits, issues. FCAPS model. Fault management, Configuration management, accounting, performance, security. What to manage, what not to manage. Managing network devices, managing servers. Monitoring networks Traditional network tools Ping..., SSH, syslog, TFTP for configurations. nmap. Wireshark. CLI. Web based management. Splunk. Nessus, snort, Kali. Hands on syslog, network inventories. Network automation using the CLI Programming and automating networks, netOps. Python, Git. Python network modules, SSH, paramiko, netmiko. EVE-NG. Hands onPython network modules. Structured versus unstructured data Problems with automation and unstructured data. XML, JSON, YAML. The role of YANG. Hands on Parsing data. SNMP SNMP architecture, SNMP MIBs, SMI, the SNMP protocol, polling security. Configuring SNMP. SNMPv1, v2, v3, SNMP security. Which version should you use? MIBs and MIB structure. mib-2, extra parts of mib-2, Private enterprise MIBs. Summary: What SNMP is good/bad at. Hands on Configuring agents and a NMS. MIB browsing. Server management Microsoft, Linux, application polling. WMI vs SNMP. Hands on: Application polling. Performance management *flow Polling, push vs pull, netflow, sflow, IPFIX, *flow. Flows. Where to monitor traffic. Comparing *flow with SNMP. Architecture: Generators and collectors. When flows are exported. NetFlow reporting products. SolarWinds. Hands on Netflow configuration. Collectors. Streaming telemetry Model driven telemetry, periodic/on change. Structured data. Telemetry protocol stack. gRPC and gNMI. Protobuf. gNMI operations. Telemetry architecture. Telegraf, databases, Grafana. Hands on Telemetry example. Configuration management Configuration management tools Chef, puppet, ansible, saltstack. Ansible architecture, controlling machines, nodes, agentless, SSH, modules. Inventories, playbooks, modules, network modules, jinja2 templates. Hands on Network configuration with ansible. NETCONF What is NETCONF? Protocol stack, Data stores, traffic flows, validating configurations, rollback. YANG data models and how YANG is used by NETCONF. XML. Explorers and other tools. Hands on anx, Python and NETCONF. RESTCONF The REST API, HTTP, What is RESTCONF? Tools including Postman. Comparison with NETCONF. Hands on Configuration with RESTCONF. Python network automation: configuration SSH issues. Using structured data. Jinja2. ncclient, requests, NAPALM, Nornir. Automated testing. Hands on Python network device configuration with nornir. Software Defined Networks and orchestration Classic SDN What is SDN? benefits. SDN architecture. SDN applications, SDN switches, SDN controllers, Network Operating Systems. Control plane, data plane. Northbound interfaces. SDN components. Southbound interfaces. OpenFlow. ONF, OpenFlow ports, Flow tables. Network virtualization Virtual networks, virtual switches, NfV. Service chaining. NfV and SDN. SDN implementations Classic SDN, Hybrid SDN, SDN via APIs, SDN via overlays. Data centre SDN, VXLAN, Service Provider SDN, SD WAN, Enterprise SDN, WiFi. SDN and open source OpenDaylight, OpenVSwitch, Open Networking Forum, Open Network Operating System. Hands onOpenStack. SD-WAN What is SD-WAN? Architecture: Edge, gateway, orchestrator, controller. Overlay and underlay. Use of MPLS, 4G/5G. Benefits and features. Secure Access Service Edge (SASE).

Network management technologies
Delivered in Internationally or OnlineFlexible Dates
£3,697

Customization and Configuration for Dynamics 365

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Students receive comprehensive Microsoft Dynamics exam preparation, becoming familiarized with the Dynamics CRM customization and configuration tools. Aspirants also learn to leverage the platform tools to create custom objects, automate tasks, modify user interface, and perform other such customizations. Overview Configure the Dynamics CRM settingsConfigure different entities and fieldsImplement entity relationships, custom actions, workflows, and dialogsIdentify scenarios for utilizing multiple forms, and design considerations for chartsSet default share views and public views, and configure and manage dashboardsIdentify role-based business processesIdentify and manage business requirements and teams This course explains everything you need to know about customizing and configuring the Dynamics CRM 365 system in accordance with a company?s specific requirements. Introduction to Customization and Configuring Dynamics CRM Talent and Course Introduction Module Overview CRM Overview What is Dynamics Customization and Configuration? CRM Architecture Customization Methodology Module review Obtaining a Dynamics CRM Trial TEST YOUR KNOWLEDGE MODULE 1' Manage Microsoft Dynamics CRM Online Subscriptions Module Overview Configuring CRM Overview of CRM Security User Administration Mailboxes Teams CRM Security Model Module Overview Purpose of the CCRM Security Model Privileges Access Levels Security Roles Hierarchy Security Hierarchy Types Module review Introduction to Solutions Module Overview Solutions Overview Solution Detail Creating and Working with Solutions Working with Solution Assets Exporting Solutions Importing Solutions Module review Entity and Field Customization Module Overview Types Entities Entity Ownership Entity Properties System vs Custom Entities Custom Entities and Security Roles Overview of Fields Field Properties Module review Additional Field Customization Module Overview Creating Fields to Meet Client Needs Calculated Fields Rollup Fields CRM Option Sets Alternate Keys Field Level Security State and Status Reason Transitions Module Review Configure mobile devices Module Overview Types of Relationships How and where they are created Many to Many Relationships Hierarchical Data Entity Mapping Connection and Connection Roles Module Review Customizing Forms Module Overview Form types Qualities of a good form Building a Form Specialized Form Components Access Teams and Sub Grids Working with Navigation Additional Form Types Multiple Forms Form customizations and Mobile Clients Module Review Business Rules Module Overview Business Rules Business Rule Scope Trigger Rules Condition and Actions Else Conditions and Actions Occur When Conditions Are True Module review Views and Visualizations Module Overview Using Views View Customization System View Types Quick Find Customization Charts Customizing Dashboard Themes Module Review Introduction to Processes Module Overview Processes and Automation Workflow Basics Module review Business Process Flows What are CRM Business Process Flows Enabling Business Process Flows Steps Stages and Categories Conditional Branching Module Review Bringing it all Together Module Overview Review of Customization Topics Covered Senario Packaging in a Solution Module review

Customization and Configuration for Dynamics 365
Delivered OnlineFlexible Dates
Price on Enquiry

55337 Introduction to Programming

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for anyone who is new to software development and wants, or needs, to gain an understanding of programming fundamentals and object-oriented programming concepts. They will typically be high school students, post-secondary school students, or career changers, with no prior programming experience. They might want to gain an understanding of the core programming fundamentals before moving on to more advanced courses such as Programming in C#. Overview Explain core programming fundamentals such as computer storage and processing. Explain computer number systems such as binary. Create and use variables and constants in programs. Explain how to create and use functions in a program. Create and use decisions structures in a computer program. Create and use repetition (loops) in a computer program. Explain pseudocode and its role in programming. Explain the basic computer data structures such as arrays, lists, stacks, and queues. Implement object-oriented programming concepts. Create and use classes in a computer program. Implement encapsulation, inheritance, and polymorphism. Describe the base class library (BCL) in the .NET Framework. Explain the application security concepts. Implement simple I/O in a computer program. Identify application errors and explain how to debug an application and handle errors. Identify the performance considerations for applications. In this 5-day course, students will learn the basics of computer programming through the use of Microsoft Visual Studio 2022 and the Visual C# and Visual Basic programming languages. The course assumes no prior programming experience and introduces the concepts needed to progress to the intermediate courses on programming, Programming in C#. The focus will be on core programming concepts such as computer storage, data types, decision structures, and repetition by using loops. The course also covers an introduction to object-oriented programming covering classes, encapsulation, inheritance, and polymorphism. Coverage is also included around exception handling, application security, performance, and memory management. 1 - Introduction to Core Programming Concepts Computer Data Storage and Processing Application Types Application Lifecycle Code Compilation 2 - Core Programming Language Concepts Syntax Data Types Variables and Constants 3 - Program Flow Introduction to Structured Programming Concepts Introduction to Branching Using Functions Using Decision Structures Introducing Repetition 4 - Algorithms and Data Structures Understand How to Write Pseudocode Algorithm Examples Introduction to Data Structures 5 - Error Handling and Debugging Introduction to Program Errors Introduction to Structured Error Handling Introduction to Debugging 6 - Introduction to Object-Oriented Programming Introduction to Complex Structures Introduction to Structs Introduction to Classes Introducing Encapsulation 7 - More Object-Oriented Programming Introduction to Inheritance Introduction to Polymorphism Introduction to .NET and the Base Class Library 8 - Introduction to Application Security Authentication and Authorization Code Permissions on Computers Introducing Code Signing 9 - Core I/O Programming Using Console I/O Using File I/O 10 - Application Performance and Memory Management Value Types vs Reference Types Converting Types The Garbage Collector Additional course details: Nexus Humans 55337 Introduction to Programming training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the 55337 Introduction to Programming course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

55337 Introduction to Programming
Delivered OnlineFlexible Dates
£2,975

EFQM Performance Improvement Practitioner Workshop - May 2025

By Centre for Competitiveness

EFQM Performance Improvement Practitioner Course A 2-day deep-dive workshop on RADAR and how to use it as an agile project performance framework. The essential course for anyone wanting to learn more about the RADAR logic and how to build a continuous improvement culture and mindset across your whole organisation.   Who is it for? This course is suitable for anyone who wants to understand the RADAR logic and how it can be used to make their organisation more effective. Whilst this training is effective as a stand-alone course; it is also a Level 1 option for anyone considering one of the EFQM qualification routes as a way of progressing their management development and career.   Benefits By the end of the course, participants will be able to: Explain the overall RADAR logic Explain the main principles of positive culture and mindset for driving performance Describe how RADAR can be implemented into an organisation to improve performance at every level Identify how to use RADAR to drive the management agenda Apply RADAR across day-to-day initiatives and key projects as an agile project performance framework. Programme The main topics covered during the EFQM Performance Improvement Practitioner training are: RADAR logic and examples of how it can be used Using RADAR to drive the management agenda Using RADAR to drive strategic initiatives Using RADAR to set up strategic KPI’s RADAR as a Performance Improvement Framework Case studies and group exercises RADAR Improvement Matrix self-assessment The training is spread over two days and is delivered in a virtual classroom setting (Zoom or Microsoft Teams), using videos, group discussions, case studies and activities in breakout rooms and presentations from the trainer.   Further Development The EFQM Performance Improvement Practitioner training provides core knowledge about the RADAR Logic. In some cases, the training will have fulfilled an individual's learning needs. In many cases, the individual will want to consolidate their learning by applying the theory to a practical task. We encourage you to apply RADAR to a practical, work-based project, and we provide guidance on how to approach and complete your project.    Completion of the RADAR Performance Improvement Project also allows you to progress to one of the advanced EFQM qualification programmes: EFQM Performance Improvement Leader, EFQM Assessor or EFQM Organisational Change Leader.   EFQM Performance Improvement Leader If you successfully complete the EFQM Performance Improvement Practitioner training and the subsequent project, you are invited to apply for the EFQM Performance Improvement Leader assessment. You will be guided and coached by an EFQM trainer and asked to present your project to the EFQM expert panel. Here you will answer questions about how you applied the RADAR logic and principles (we provide participants with templates for running the project, as well as a high-level mid-term review). You will also receive feedback on how to improve and maximise the use of RADAR for future endeavours. Dates and time: This is a two day on-line workshop delivered on the 12th of June & 18th of June from 9:00 AM to 3:30 PM GMT Cost: £1000 + VAT

EFQM Performance Improvement Practitioner Workshop - May 2025
Delivered Online + more
£1,000

Accessible Documents

By Nexus Human

Duration 0.75 Days 4.5 CPD hours This course is intended for Making Microsoft Word documents accessible. Overview Please refer to Overview. During this course students will interact with a variety of Word documents and review components that would render the document inaccessible. Students will enable the Accessibility Checker and the Speak feature and progress through the processes and procedures to meet the AODA mandate. Students will ultimately create an accessible set of styles and use those styles within the document. Adding the Accessibility Checker and the Speak feature Discussions will follow as to the limitations of the checker When the checker won?t run Document Metadata Students will review where and why to add metadata to a Word Document Setting the application language and setting the document language Setting the document title Adding the Author and subject metadata fields Creating Accessible Paragraphs and Columns Students will see the perils of incorrect use of hard returns and text boxes within a document Exercises will have students work with paragraph formatting and column formatting for accessibility Creating Accessible Tables Students will interact with tables that are poorly designed and restricted them to still maintain content but that are now accessible Discussions will surround, changes to how tables are handled when sending to PDF Accessible Imagery Students will discuss the need to images with a document The Alternate text feature will be used and the rationale for adding specific types of descriptions Students will see and understand the rationale for ?in-line- imagery Styles for Navigation Students will use and modify the built-in styles feature of Microsoft Word and create a table of contents Students will see with the use of the navigation pane, how styles impact accessibility Students will also understand the importance of proper styles nesting Headers, Footers and Footnotes Students will discuss and then implement accessible headers and footers Students will discuss footnotes and alternative methods to provide footnotes Verifying Reading Order Students will ?listen? to their documents using the Speak feature Students will enable the selection pane as an accessibility tools and discuss its limitations Creating an Accessible Style Template Students will create several accessible styles including headings and paragraphs Students will save the style within a template Additional course details: Nexus Humans Accessible Documents training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Accessible Documents course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Accessible Documents
Delivered OnlineFlexible Dates
Price on Enquiry