• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

9085 Network courses

Human Rights Consultant

By Compete High

Course Overview: Human Rights Consultant Certification   As societies strive for equality and justice, understanding human rights principles and their practical applications becomes increasingly vital. The 'Human Rights Consultant' course offers a comprehensive journey into the realm of human rights, equipping participants with the knowledge and skills necessary to advocate for and implement human rights principles effectively. This course is designed for individuals passionate about human rights, including activists, lawyers, policymakers, and professionals in various fields seeking to integrate human rights into their work.   Module 1: Introduction to Human Rights In this foundational module, participants will explore the origins, evolution, and philosophical underpinnings of human rights. They will examine key documents such as the Universal Declaration of Human Rights and learn about the core principles and concepts that form the basis of human rights law and practice. Module 2: Practical Applications of Human Rights Building upon the theoretical foundation laid in Module 1, this module delves into real-world applications of human rights principles. Participants will learn how to identify human rights violations, analyze case studies, and develop strategies to address human rights issues in diverse contexts, including conflict zones, marginalized communities, and corporate settings. Module 3: Human Rights Advocacy and Activism Effective advocacy and activism are essential for promoting and protecting human rights. In this module, participants will gain practical skills in advocacy techniques, community organizing, coalition building, and leveraging social media and other platforms to raise awareness and mobilize support for human rights causes. Module 4: Human Rights and Business Businesses have a significant impact on human rights, both positively and negatively. This module examines the intersection of human rights and business, focusing on corporate social responsibility, supply chain management, labor rights, and the role of businesses in advancing human rights principles within their operations and beyond. Module 5: Human Rights and International Law International law serves as a critical framework for the protection and enforcement of human rights. Participants will explore the international legal mechanisms and institutions responsible for upholding human rights, including the United Nations, regional human rights bodies, and international courts. They will also analyze landmark human rights cases and treaties. Module 6: Human Rights and Climate Change Climate change poses profound threats to human rights, including the right to life, health, food, and shelter. In this module, participants will examine the nexus between human rights and environmental sustainability, exploring topics such as climate justice, environmental rights, indigenous rights, and the role of states and international actors in addressing climate-related human rights challenges.   Certification and Beyond Upon successful completion of all modules and assessments, participants will receive a certification as a Human Rights Consultant, validating their expertise in understanding, promoting, and defending human rights. Graduates of the course will join a global network of human rights advocates and professionals, equipped to make a meaningful impact in their communities and beyond. Additionally, the course provides a solid foundation for further study or specialization in human rights law, policy, or advocacy. Course Curriculum Module 1_ Introduction to Human Rights Introduction to Human Rights 00:00 Module 2_ Practical Applications of Human Rights Practical Applications of Human Rights 00:00 Module 3_ Human Rights Advocacy and Activism Human Rights Advocacy and Activism 00:00 Module 4_ Human Rights and Business Human Rights and Business 00:00 Module 5_ Human Rights and International Law Human Rights and International Law 00:00 Module 6_ Human Rights and Climate Change Human Rights and Climate Change 00:00

Human Rights Consultant
Delivered Online On Demand6 hours
£25

Information Assurance (STIG) Overview (TT8800)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The intended audience for this comprehensive course on Information Assurance and STIGs includes professionals with roles such as: IT professionals - System administrators, network engineers, and security analysts who are responsible for maintaining and securing IT infrastructure and web applications. Developers - Software engineers and web developers who design, implement, and maintain web applications, and need to integrate security best practices throughout the development process. Project teams - Cross-functional teams that collaborate on application development projects, including members from development, testing, and deployment teams. Technical leads - Senior software engineers or architects who oversee technical aspects of projects and ensure the implementation of secure design and coding practices. Project managers - Professionals responsible for planning, executing, and closing projects, ensuring that security requirements are met throughout the project lifecycle. Overview Working in an interactive learning environment, guided by our application security expert, you'll explore: The concepts and terminology behind defensive coding Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against meaningful assets The entire spectrum of threats and attacks that take place against software applications in today's world The role that static code reviews and dynamic application testing to uncover vulnerabilities in applications The vulnerabilities of programming languages as well as how to harden installations The basics of Cryptography and Encryption and where they fit in the overall security picture The requirements and best practices for program management as specified in the STIGS The processes and measures associated with the Secure Software Development (SSD) The basics of security testing and planning Understand the concepts and terminology behind defensive coding Understand Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against meaningful assets Learn the entire spectrum of threats and attacks that take place against software applications in today's world Discuss the role that static code reviews and dynamic application testing to uncover vulnerabilities in applications Understand the vulnerabilities of programming language as well as how to harden installations Understand the basics of Cryptography and Encryption and where they fit in the overall security picture Understand the fundamentals of XML Digital Signature and XML Encryption as well as how they are used within the web services arena Understand the requirements and best practices for program management as specified in the STIGS Understand the processes and measures associated with the Secure Software Development (SSD) Understand the basics of security testing and planning The Information Assurance (STIG) Overview is a comprehensive two-day course that delves into the realm of Information Assurance, empowering you to enhance your cybersecurity skills, understand the essentials of STIGs, and discover cutting-edge web application security practices. This immersive experience is tailored for IT professionals, developers, project teams, technical leads, project managers, testing/QA personnel, and other key stakeholders who seek to expand their knowledge and expertise in the evolving cybersecurity landscape. The course focuses on the intricacies of best practices for design, implementation, and deployment, inspired by the diverse and powerful STIGs, ultimately helping participants become more proficient in application security.The first half of the course covers the foundations of DISA's Security Technical Implementation Guides (STIGs) and learn the ethical approach to bug hunting, while exploring the language of cybersecurity and dissecting real-life case studies. Our expert instrtors will guide you through the importance of respecting privacy, working with bug bounty programs, and avoiding common mistakes in the field.The next half delves into the core principles of information security and application protection, as you learn how to identify and mitigate authentication failures, SQL injections, and cryptographic vulnerabilities. You?ll gain experience with STIG walkthroughs and discover the crucial steps for securing web applications.Throughout the course, you'll also explore the fundamentals of application security and development, including checklists, common practices, and secure development lifecycle (SDL) processes. You?ll learn from recent incidents and acquire actionable strategies to strengthen your project teams and IT organizations. You'll also have the opportunity to explore asset analysis and design review methodologies to ensure your organization is prepared to face future cybersecurity challenges. DISA's Security Technical Implementation Guides (STIGs) The motivations behind STIGs Requirements that the various software development roles must meet Implementing STIG requirements and guidelines Why Hunt Bugs? The Language of CyberSecurity The Changing Cybersecurity Landscape AppSec Dissection of SolarWinds The Human Perimeter Interpreting the 2021 Verizon Data Breach Investigation Report First Axiom in Web Application Security Analysis First Axiom in Addressing ALL Security Concerns Lab: Case Study in Failure Safe and Appropriate Bug Hunting/Hacking Working Ethically Respecting Privacy Bug/Defect Notification Bug Bounty Programs Bug Hunting Mistakes to Avoid Principles of Information Security Secuity Is a Lifecycle Issue Minimize Attack Surface Area Layers of Defense: Tenacious D Compartmentalize Consider All Application States Do NOT Trust the Untrusted Identification and Authentication Failures Applicable STIGs Quality and Protection of Authentication Data Proper hashing of passwords Handling Passwords on Server Side Session Management HttpOnly and Security Headers Lab: STIG Walk-Throughs Injection Applicable STIGs Injection Flaws SQL Injection Attacks Evolve Drill Down on Stored Procedures Other Forms of Server-Side Injection Minimizing Injection Flaws Client-side Injection: XSS Persistent, Reflective, and DOM-Based XSS Best Practices for Untrusted Data Lab: STIG Walk-Throughs Applications: What Next? Common Vulnerabilities and Exposures CWE/SANS Top 25 Most Dangerous SW Errors Strength Training: Project Teams/Developers Strength Training: IT Organizations Cryptographic Failures Applicable STIGs Identifying Protection Needs Evolving Privacy Considerations Options for Protecting Data Transport/Message Level Security Weak Cryptographic Processing Keys and Key Management Threats of Quantum Computing Steal Now, Crack Later Threat Lab: STIG Walk-Throughs Application Security and Development Checklists Checklist Overview, Conventions, and Best Practices Leveraging Common AppSec Practices and Control Actionable Application Security Additional Tools for the Toolbox Strength Training: Project Teams/Developers Strength Training: IT Organizations Lab: Recent Incidents SDL Overview Attack Phases: Offensive Actions and Defensive Controls Secure Software Development Processes Shifting Left Actionable Items Moving Forward Lab: Design Study Review Asset Analysis Asset Analysis Process Types of Application-Related Assets Adding Risk Escalators Discovery and Recon Design Review Asset Inventory and Design Assets, Dataflows, and Trust Boundaries Risk Escalators in Designs Risk Mitigation Options

Information Assurance (STIG) Overview (TT8800)
Delivered OnlineFlexible Dates
Price on Enquiry

VMware vSphere: Operate, Scale and Secure [V8]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Experienced system administrators, system engineers, and system integrators Overview By the end of the course, you should be able to meet the following objectives: Configure and manage a VMware Tools Repository Configure vSphere Replication and recover replicated VMs Manage VM resource usage with resource pools Configure and manage vSphere networking and storage for a large and sophisticated enterprise Configure vCenter High Availability Use host profiles to manage VMware ESXi host compliance Use the vSphere Client to manage certificates Monitor the vCenter, ESXi, and VMs performance in the vSphere client Secure vCenter, ESXi, and VMs in your vSphere environment Use VMware vSphere Trust Authority to secure the infrastructure for encrypted VMs Use Identity Federation to configure the vCenter to use external identity sources This five-day course teaches you advanced skills for configuring and maintaining a highly available and scalable virtual infrastructure. Through a mix of lecture and hands-on labs, you configure and optimize the VMware vSphere 8 features that build a foundation for a truly scalable infrastructure. You also discuss when and where these features have the greatest effect. Attend this course to deepen your understanding of vSphere and learn how its advanced features and controls can benefit your organization. Course Introduction Introductions and course logistics Course objectives Virtual Machine Operations Recognize the role of a VMware Tools Repository Configure a VMware Tools Repository Recognize the backup and restore solution for VMs Identify the components in the vSphere Replication architecture Deploy and configure vSphere Replication Recover replicated VMs vSphere Cluster Operations Create and manage resource pools in a cluster Describe how scalable shares work Describe the function of the vCLS Recognize operations that might disrupt the healthy functioning of vCLS VMs Network Operations Configure and manage vSphere distributed switches Describe how VMware vSphere Network I/O Control enhances performance Explain distributed switch features such as port mirroring and NetFlow Define vSphere Distributed Services Engine Describe the use cases and benefits of vSphere Distributed Services Engine Storage Operations Discuss vSphere support for NVMe and iSER technologies Describe the architecture and requirements of vSAN configuration Describe storage policy-based management Recognize components in the vSphere Virtual Volumes architecture Configure Storage I/O Control vCenter and ESXi Operations Create a vCenter backup schedule Recognize the importance of vCenter High Availability Explain how vCenter High Availability works Use host profiles to manage ESXi configuration compliance Use the vSphere client to manage vSphere certificates vSphere Monitoring Monitor the key factors that can affect a virtual machine's performance Describe the factors that influence vCenter performance Use vCenter tools to monitor resource use Create custom alarms in vCenter Describe the benefits and capabilities of VMware Skyline Recognize uses for Skyline Advisor Pro vSphere Security and Access Control Recognize strategies for securing vSphere components, such as vCenter, ESXi hosts, and virtual machines Describe vSphere support for security standards and protocols Describe identity federation and recognize its use cases Configure identity federation to allow vCenter to use an external identity provider vSphere Trusted Environments and VM Encryption Configure ESXi Host Access and Authentication Describe virtual machine security features Describe the components of a VM encryption architecture Create, manage, and migrate encrypted VMs List VM encryption events and alarms Describe the benefits and use cases of vSphere Trust Authority Configure vSphere Trust Authority

VMware vSphere: Operate, Scale and Secure [V8]
Delivered OnlineFlexible Dates
Price on Enquiry

Success Mindset Mastery

By Compete High

🚀 Unlock Your Full Potential with Success Mindset Mastery! 🌟 Are you ready to transform your life and achieve unprecedented success? Introducing our groundbreaking online course: Success Mindset Mastery! This comprehensive program is designed to empower you with the knowledge and tools to cultivate a mindset that breeds success in every aspect of your life.   🔍 Uncover the Secrets to Success with Our 5-Module Curriculum: Module 1: Introduction & First Concepts 🌐 Dive into the fundamentals of success mindset. Understand the power of mindset in shaping your reality and learn how to lay the foundation for your journey to success. Module 2: Goal Setting Secrets 🎯 Master the art of goal setting and discover the strategies used by high achievers. Set clear, achievable goals that propel you towards your dreams and create a roadmap for your personal and professional success. Module 3: Keys To Success 🗝️ Explore the key principles that successful individuals swear by. Uncover the habits, attitudes, and behaviors that distinguish achievers from the rest. Learn how to adopt these keys to unlock doors to success you never thought possible. Module 4: Major Success Concepts 💡 Delve into advanced success concepts that will elevate your thinking and actions. Understand the psychology behind success and gain insights that will propel you to new heights. Transform challenges into opportunities and setbacks into stepping stones. Module 5: Final Ideas & Tips 🚀 Wrap up the course with a collection of final ideas and expert tips to solidify your success mindset. Leave with actionable strategies that will keep you on the path to success long after the course concludes.   💪 What Sets Success Mindset Mastery Apart? 🌐 Comprehensive Curriculum: Our meticulously crafted curriculum covers every aspect of developing a success mindset, leaving no stone unturned on your journey to greatness. 🎓 Expert Guidance: Learn from industry experts and thought leaders who have mastered the art of success. Benefit from their wisdom, experience, and practical insights. 🤝 Community Support: Join a community of like-minded individuals on the same journey. Share experiences, gain inspiration, and build a network that will support you throughout your success transformation. 🌈 Lifetime Access: Enjoy lifetime access to the course materials, allowing you to revisit and reinforce your success mindset whenever you need a boost.   🔥 Take the first step towards the life you deserve! Enroll in Success Mindset Mastery today and rewrite your story. Your success journey starts now! 🔥   Don't miss this opportunity to invest in yourself and unlock a future of limitless possibilities. Enroll now and embark on the path to Success Mindset Mastery! 🚀 Course Curriculum Introduction & First Concepts Introduction 00:00 Goal Setting Secrets Setting Big Goals 00:00 Making Real Decisions 00:00 Keys To Success Consistency Is Key 00:00 Nothing Is Impossible 00:00 Being Accountable 00:00 Major Success Concepts Living In The Moment 00:00 Being Adventurous 00:00 Words Of Success 00:00 Being A Lifetime Learner 00:00 No Such Thing As Failure 00:00 Final Ideas & Tips Final Ideas & Tips 00:00

Success Mindset Mastery
Delivered Online On Demand1 hour 2 minutes
£25

Data Analyst Job Ready Program with Money Back Guarantee

4.9(27)

By Apex Learning

Land Your Dream Job! Get Personalised Career Support & Expert Tips, Craft Your CV, Explore Top Jobs & Ace Interviews!

Data Analyst Job Ready Program with Money Back Guarantee
Delivered Online On Demand18 weeks
£1,299

Fundamentals of Digital Marketing: Objectives and KPI Setting

By Study Plex

Recognised Accreditation This course is accredited by continuing professional development (CPD). CPD UK is globally recognised by employers, professional organisations, and academic institutions, thus a certificate from CPD Certification Service creates value towards your professional goal and achievement. The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries. What is CPD? Employers, professional organisations, and academic institutions all recognise CPD, therefore a credential from CPD Certification Service adds value to your professional goals and achievements. Benefits of CPD Improve your employment prospects Boost your job satisfaction Promotes career advancement Enhances your CV Provides you with a competitive edge in the job market Demonstrate your dedication Showcases your professional capabilities What is IPHM? The IPHM is an Accreditation Board that provides Training Providers with international and global accreditation. The Practitioners of Holistic Medicine (IPHM) accreditation is a guarantee of quality and skill. Benefits of IPHM It will help you establish a positive reputation in your chosen field You can join a network and community of successful therapists that are dedicated to providing excellent care to their client You can flaunt this accreditation in your CV It is a worldwide recognised accreditation What is Quality Licence Scheme? This course is endorsed by the Quality Licence Scheme for its high-quality, non-regulated provision and training programmes. The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries. Benefits of Quality License Scheme Certificate is valuable Provides a competitive edge in your career It will make your CV stand out Course Curriculum Introduction Introduction 00:02:00 Assessment 00:02:00 Role of Marketing 00:01:00 Business Objectives 4 Levers of Objectives 00:02:00 KPI: Volume Sales and Value Sales 00:02:00 Volum Share And Value Share 00:03:00 Volume Growth And Value Growth 00:03:00 Brand Growth and Category Growth 00:05:00 Profit 00:09:00 Summary of Basic KPIs 00:04:00 Marketing Objectives Introduction: Source of Growth 00:02:00 Penetration 00:06:00 Low Penetration and How to Increase 00:02:00 Consumption 00:04:00 Communication Objectives Communication Objectives 00:02:00 Brand Equity Tracking 00:05:00 Creative Quality and Communication Awareness 00:06:00 Obtain Your Certificate Order Your Certificate of Achievement 00:00:00 Get Your Insurance Now Get Your Insurance Now 00:00:00 Feedback Feedback 00:00:00

Fundamentals of Digital Marketing: Objectives and KPI Setting
Delivered Online On Demand
£19

Crafting Irresistible Value Statements

By Compete High

🌟 Unleash Your Power with Crafting Irresistible Value Statements Online Course! 🌟   Are you tired of struggling to articulate what sets you apart in a crowded market? Do you want to captivate your audience with compelling value statements that leave a lasting impression?   Introducing 'Crafting Irresistible Value Statements' - Your Ultimate Guide to Mastering the Art of Unforgettable Messaging!   🚀 What You'll Learn:   Module 1: Introduction Lay the foundation for success by understanding the critical role of value statements in today's competitive landscape. Discover real-world examples of businesses that have transformed their fortunes through the power of compelling messaging. Module 2: Unique Value Proposition Explained Demystify the concept of a Unique Value Proposition (UVP) and its profound impact on brand differentiation. Gain insights into the psychology behind a compelling UVP and how it influences customer behavior. Module 3: Create Your Unique Value Proposition Dive into the hands-on process of crafting a UVP that resonates with your target audience. Unlock proven techniques to identify and articulate the unique qualities that make your brand stand out from the crowd. Module 4: Workshop Put theory into practice with an interactive workshop designed to refine your value proposition. Receive personalized feedback and guidance from industry experts to ensure your messaging is as powerful as it can be.   🎓 Why Choose Our Course?   ✨ Expert Guidance: Learn from seasoned professionals with a wealth of experience in crafting compelling value statements that drive results. ✨ Practical Workshops: Move beyond theory with practical, real-world exercises that will elevate your skills to new heights. ✨ Lifetime Access: Enjoy unlimited access to course materials, including updates and additional resources, ensuring you stay ahead of the curve. ✨ Community Support: Join a vibrant community of like-minded individuals, share insights, and network with professionals on a similar journey.   🌈 Transform Your Messaging, Transform Your Business!   Crafting Irresistible Value Statements is not just a course; it's a journey toward unlocking the true potential of your brand. Elevate your communication skills, stand out in the market, and watch your business soar to new heights!   Don't miss this opportunity to revolutionize the way you present your brand. Enroll now and start crafting value statements that turn heads and win hearts!   Enroll Today and Master the Art of Irresistible Value Statements! 🚀 Course Curriculum Module 1- Introduction Characteristics of Unique Value Propositions 00:00 Module 2- Unique Value Proposition Explained Types of Customer Benefits UVPs Express 00:00 Examples of Unique Value Propositions 00:00 What Investors Are Looking For 00:00 Value Proposition vs Competitive Advantage 00:00 Module 3- Create Your Unique Value Proposition Understand Your Competitor's Unique Value Proposition 00:00 Streaming Services Example 00:00 The Value Proposition Framework 00:00 Step 1 - Brainstorming 00:00 Step 2 - Create a Value Proposition List 00:00 Step 3 - Determine Uniqueness 00:00 Step 4 - Prioritize Top Value Propositions 00:00 Step 5 - Tell a Story 00:00 Common Mistakes 00:00 Module 4- Workshop Workshop - Build Your Unique Value Proposition 00:00

Crafting Irresistible Value Statements
Delivered Online On Demand1 hour
£25

Getting Started With the Mac Operating System

By Nexus Human

Duration 1 Days 6 CPD hours This one day course provides a comprehensive overview of macOS, complete with insider tips for getting the most out of the operating system. The course shows how to configure system preferences, navigate around the finder, personalize the interface and as well as achieve fluency with all the operational functions of the macOS. Meet The macOS The User InterfaceUser PreferencesThe Menus and Menu Paths The Toolbar Scroll Bars The Sidebar The Go Menu, Utilities Folder The Clipboard Launching Applications The Finder The Launchpad and Mission Control Finder Essentials The Desktop Quick Look Different Viewing Options Spring Loaded Folders Creating an Archive Customizing your Finder The Desktop Customize your Toolbar Organizing your Desktop Labeling your Documents and Folders Creating Folders Smart Folders The Dock Opening Applications from the Dock Dock Preferences and Customizing your Dock Choosing which Applications appear in the Dock Accessing Folder content using Stacks Your Home Folder Moving, Copying and Deleting Files Emptying the Trash Switching Between Applications Showing and Hiding Applications. Closing Documents vs. Quitting Applications Using Continuity - Mac and iOS Interfacing with your Mac and your Apple mobile devices Messages and answering your iPhone Windows Closing and Minimizing Placing documents in the Dock The Keyboard Control, Option (Alt) and Command Keys Keyboard Shortcuts The Dictation Function Gestures and Voice Mouse and Hand Gestures Using Text-to-Speech Searches Finding Files and documents Advanced Spotlight Searches Widgets & Notifications The Dashboard Enabling and Viewing Widgets Enabling and Viewing Notifications Using Spaces Switching between Spaces Running applications in full screen mode Installing or Upgrading Applications Buying from the Mac App Store Downloading from the Internet Sharing Files Sending files using AirDrop Dropbox File Synchronization Enable File Sharing Getting OnLine Understanding the Apple Airport Connecting wirelessly Using Ethernet Creating a Network Connecting through outside Network Servers and VPN Staying Current with Software Update Troubleshooting Application Crashes Force Quit Deleting Preferences The Key Chain Internet Connections Backing Up Time Machine Setting up Time Machine Performing Backups Shortcuts How to better use and access Files and documents Basic shortcuts for speed and efficiency New User Account Creating a New User Switching Between Multiple User Accounts Additional course details: Nexus Humans Getting Started With the Mac Operating System training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Getting Started With the Mac Operating System course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Getting Started With the Mac Operating System
Delivered OnlineFlexible Dates
Price on Enquiry

WM156G IBM MQ V9.1 System Administration (using Windows for labs)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for technical professionals who require the skills to administer IBM MQ. Overview After completing this course, you should be able to: Describe the IBM MQ deployment options Create and manage queue managers, queues, and channels Use the IBM MQ sample programs and utilities to test the IBM MQ network Configure distributed queuing Configure MQ client connections to a queue manager Define and administer a queue manager cluster Administer Java Message Service (JMS) in MQ Implement basic queue manager restart and recovery procedures Use IBM MQ troubleshooting tools to identify the cause of a problem in the IBM MQ network Manage IBM MQ security Monitor the activities and performance of an IBM MQ system This course is also available as self-paced virtual (e-learning) course IBM MQ V9.1 System Administration (ZM156G). This option does not require any travel.This course teaches you how to customize, operate, administer, and monitor IBM MQ on-premises on distributed operating systems. The course covers configuration, day-to-day administration, problem recovery, security management, and performance monitoring. In addition to the instructor-led lectures, the hands-on exercises provide practical experience with distributed queuing, working with MQ clients, and implementing clusters, publish/subscribe messaging. You also learn how to implement authorization, authentication, and encryption, and you learn how to monitor performance. Introducing IBM MQ Exercise Getting started with IBM MQ Working with IBM MQ administration tools Exercise Working with IBM MQ administration tools Configuring distributed queuing Exercise Implementing distributed queuing Managing clients and client connections Exercise Connecting an IBM MQ client Advanced IBM MQ client features Working with queue manager clusters Exercise Implementing a basic cluster Publish/subscribe messaging Exercise Configuring publish/subscribe message queuing Implementing basic security in IBM MQ Exercise Controlling access to IBM MQ Securing IBM MQ channels with TLS Exercise Securing channels with TLS Authenticating channels and connections Exercise Implementing connection authentication Supporting JMS with IBM MQ Diagnosing problems Running an IBM MQ trace Backing up and restoring IBM MQ messages and object definitions Using a media image to restore a queue Backing up and restoring IBM MQ object definitions High availability Monitoring and configuring IBM MQ for performance Monitoring IBM MQ for performance Monitoring resources with the IBM MQ Console Additional course details: Nexus Humans WM156G IBM MQ V9.1 System Administration (using Windows for labs) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the WM156G IBM MQ V9.1 System Administration (using Windows for labs) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

WM156G IBM MQ V9.1 System Administration (using Windows for labs)
Delivered OnlineFlexible Dates
Price on Enquiry

CWS-251 Implement Citrix DaaS on Microsoft Azure

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course is recommended for administrators and engineers. Overview What you'll learn: Prepare the Azure environment for secure integration with Citrix DaaS. Deploy and manage Virtual Delivery Agent machines in Microsoft Azure using Machine Creation Services. Integrate Citrix Cloud and Citrix DaaS with Microsoft Azure Active Directory. Design Machine Catalogs and virtual machines on Microsoft Azure Resource Manager. Provide remote access with Citrix StoreFront and Citrix Gateway on Microsoft Azure. In this course you willLearn to deploy and manage your Citrix DaaS deployment on Microsoft Azure. Gain the skills to plan your machine catalog and virtual machine design based in Microsoft's public cloud and get hands-on practice deploying those machines using Machine Creation Services. You will also learn about additional Azure considerations including maintenance and power management which are critical in a cloud environment. For remote access, you will learn to configure Citrix StoreFront and Citrix Gateway on the Azure platform. This course focuses on Microsoft Azure as a Citrix Cloud resource location however concepts are relevant to both Citrix Cloud and fully managed Citrix DaaS sites. Module 1: Introduction to Citrix DaaS on Microsoft Azure Partnering for Success Module 2: Planning - Citrix DaaS Resource Location on Microsoft Azure Overview of Citrix DaaS Components Creating a Citrix DaaS Deployment Overview Module 3: Planning - Microsoft Azure Overview Azure Virtual Network Structure Azure Virtual Network Connectivity Azure Virtual Resources Azure Active Directory Identity and Access Management Azure Active Directory Options and Considerations Module 4: Planning - Deploying Citrix DaaS on Microsoft Azure Citrix DaaS Resource Locations in Azure Citrix DaaS Components in Azure Creating and Managing Workloads in an Azure Resource Location Module 5: Planning - Provide Access to End Users Providing Access to Resources in Citrix Cloud Citrix Gateway Deployment Options Deploying Citrix Gateway or ADC in Azure GSLB and StoreFront Optimal Gateway in Hybrid Environments Module 6: Rollout - Citrix DaaS Deployment on Microsoft Azure Citrix Workspace App Rollout Preparing Migration of End-Users to Workspace Platform Module 7: Managing - Citrix DaaS Workloads on Microsoft Azure Maintaining Citrix Gateway Backup and Monitoring in Azure Maintaining Master Images in Azure Monitoring VDAs in Manage Console and Azure Module 8: Optimize - Citrix DaaS on Microsoft Azure Managing Azure Costs Using Azure Pricing Calculator - Instructor Demo Student Exercise - Calculate a case Additional course details: Nexus Humans CWS-251 Implement Citrix DaaS on Microsoft Azure training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CWS-251 Implement Citrix DaaS on Microsoft Azure course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CWS-251 Implement Citrix DaaS on Microsoft Azure
Delivered OnlineFlexible Dates
Price on Enquiry