• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

592 Networking courses in Banstead delivered Live Online

VMware Cloud Foundation: Planning, Management, Operations [V4.3]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Experienced system administrators, system integrators, and consultants responsible for implementing and managing VMware Cloud Foundation Overview By the end of the course, you should be able to meet the following objectives: Describe design implications of VMware Cloud Foundation standard or consolidated architecture List requirements for VMware Cloud Foundation deployment Describe the VMware Cloud Foundation bring-up process and the VMware Cloud Foundation architecture Perform VMware Cloud Foundation bring-up Describe physical and virtual networking considerations Outline VMware Cloud Foundation storage options Use the VMware Imaging Appliance to image ESXi hosts Describe VMware Cloud Foundation multi-instance federation Use VMware Cloud Foundation™ SDDC Manager™ to perform operational tasks Describe user roles in VMware Cloud Foundation and VMware vSphere Manage users and passwords using VMware Cloud Foundation Manage certificate rotation for VMware Cloud Foundation components Use Active Directory integration to automate certificate generation and rotation Describe workload domains Manage workload domains in VMware Cloud Foundation Manage VMware NSX-T™ for VMware Cloud Foundation Describe use cases for Application Virtual Networks (AVNs) Meet vSphere with VMware Tanzu™ requirements Deploy a vSphere with Tanzu enabled workload domain Manage VMware vSAN™ storage in a workload domain Create vSAN storage policies Describe Cloud Native storage Describe the importance of business continuity measures in VMware Cloud Foundation Plan appropriate backup and restore workflows for VMware Cloud Foundation components Implement stretched clusters in VMware Cloud Foundation workload domains This five-day course includes instruction on the capabilities of VMware Cloud Foundation? and how to successfully plan, deploy, manage, and operate hybrid and cloud infrastructures, including customization. The course explains the architecture of VMware Cloud Foundation and explains licensing, certificates, and storage and network management. The course also covers workload domains, availability, life cycle management, and troubleshooting. Course Introduction Introductions and course logistics Course objectives VMware Cloud Foundation Overview Describe the VMware Cloud Foundation solution Describe VMware Cloud Foundation architecture Identify VMware Cloud Foundation components Describe VMware Cloud Foundation topology Define VMware Cloud Foundation terminology Day Zero Tasks Identify the requirements for deploying VMware Cloud Foundation Identify management domain sizing considerations Identify workload domain sizing considerations Detail design considerations for ESXi in management and VI workload domains Detail design considerations for vCenter in management and VI workload domains Detail the VMware Cloud Foundation bring-up process Identify information required for the Planning and Preparation Workbook Identify information required for the Deployment Parameter Workbook Describe how VMware Cloud Builder automates the deployment process Explain how the Deployment Parameter Workbook is imported into VMware Cloud Builder Recognize the configuration validation process performed by VMware Cloud Builder Detail the deployment of the management domain Recognize the options to image a host Identify the key capabilities of VIA Recognize how to use VIA for imaging the ESXi Nodes Post Deployment Operations Understand VMware Cloud Foundation integration with VMware Single Sign-On Configure user access to VMware Cloud Foundation Describe the importance of user roles in vSphere Configure identity sources in vSphere to use with VMware Cloud Foundation Manage passwords in VMware Cloud Foundation Explain the importance of using VMware Cloud Foundation to manage passwords for vSphere components Detail the best practices for password management for VMware Cloud Foundation Retrieve and secure the password list Describe the process for rotating passwords not managed by VMware Cloud Foundation VMware Cloud Foundation License Management Describe how to add license keys to the VMware Cloud Foundation inventory Describe how to view license keys in SDDC Manager Describe how to assign license keys Describe how to remove license keys Describe how to replace expiring licenses VMware Cloud Foundation Networking with NSX-T Describe NSX Management plane and Control planes Detail design considerations for workload domains with shared NSX Manager instances Detail design considerations for workload domains with dedicated NSX Manager instances Describe the spine-and-leaf design Describe the addressing scheme for the underlay Recognize possible variations of the spine-and-leaf design Describe the multi-NIC design Describe NSX Edge node design and BGP peering with the physical network Describe cluster design and rack design Explain dynamic routing with BGP Explain virtual IP addressing Describe logical switching Detail NSX Edge functions Define application virtual networks Describe management domain rack options List NSX Edge cluster requirements for vSphere with Tanzu Discuss NSX Edge cluster placement considerations Describe NSX-T Data Center deployment in VMware Cloud Foundation Explain how logical routing works in NSX-T Data Center Identify NSX Edge functions Describe data plane preparation for NSX-T Data Center Edge nodes in a workload domain Recognize Tier-0 and Tier-1 gateway topologies Recognize features of NSX distributed firewalls Describe the benefits of NSX Federation in VMware Cloud Foundation Identify NSX Federation Use Cases Explain NSX Federation Components and Architecture Discuss NSX Federation configuration basics Managing Workload Domains Define workload domains Detail design considerations for vSphere networking in management and VI workload domains Detail design considerations for storage in management and VI workload domains Recognize design choices for a consolidated design or standard design List the types of workload domains State scale limits for workload domains Identify use cases for multiple clusters in a workload domain List workload domain prerequisites Explain how to create a workload domain Describe how to scale a workload domain Explain how to delete a workload domain Describe host decommissioning vSphere with Tanzu in VMware Could Foundation Discuss the vSphere with Tanzu solution Define the role of Spherelet Describe the supervisor cluster control plane Define vSphere with Tanzu namespaces Describe the role of NSX-T networking components Discuss vSphere with Tanzu networking topology Describe VMware Container Networking with Antrea Describe control plane VM management networking requirements Plan appropriate IP address CIDR ranges for pod, ingress, and egress networking Describe prerequisites for vSphere with Tanzu cluster compatibility Deploy vSphere with Kubernetes Create a vSphere namespace Configure limits and permissions for a vSphere namespace Enabling Harbor Image Registry VMware Cloud Foundation Storage Management Identify vSAN architecture and components Recognize storage options for VMware Cloud Foundation Recognize the connectivity options for supplemental storage Explain why vSAN is the best option for VMware Cloud Foundation storage Recognize vSAN design considerations Identify sizing and performance considerations that impact the storage design Describe vSAN requirements for the management and workload domains Define deduplication and compression Discuss how to scale vSAN clusters in VMware Cloud Foundation Explain how storage policies work with VMware Cloud Foundation vSAN clusters Explain storage policy failure tolerance rules Identify a VM storage policy compliance status Relate storage policies to Kubernetes storage classes Describe persistent volumes Monitor Cloud Native Storage in the vSphere Client Availability and Business Continuity Identify steps in the SDDC Manager backup and restore process Recognize the importance of external service availability Describe native vSphere availability options Identify steps in the NSX backup and restore process Identify stretched cluster use cases Identify stretched cluster components Recognize stretched cluster requirements in VMware Cloud Foundation Prepare and deploy a vSAN stretched cluster using APIs VMware Cloud Foundation Certificate Management Describe public key infrastructure (PKI) Explain the purpose of certificate signing requests (CSRs) List the available CA options in SDDC Manager Describe how to view certificates Explain how to generate a CSR Describe how to replace and install certificates for VMware Cloud Foundation components List the available CA options in SDDC Manager Explain how to configure the Microsoft CA server Describe how to install certificates issued by the Microsoft CA server Explain how to add OpenSSL CA in SDDC Manager Describe how to install certificates issued by OpenSSL CA Explain how to install certificates issued by third-party CAs

VMware Cloud Foundation: Planning, Management, Operations [V4.3]
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Optical Technology Intermediate v3.0 (OPT200)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is intended for: System engineers Technical support personnel Channel partners and resellers Overview After taking this course, you should be able to: Describe Cisco DWDM platform basics Describe DWDM network topologies Describe the management software used for managing Cisco DWDM networks List the different hardware components of the Cisco ONS and Cisco NCS DWDM systems Provision nodes and circuits in a Cisco DWDM network Perform node and multishelf configurations Implement SMR-based rings Provision optical circuit protection mechanisms Configure Any Rate cards Describe the function of Raman amplifiers Perform basic maintenance and troubleshooting of a Cisco DWDM network The Cisco Optical Technology Intermediate (OPT200) v3.0 course is designed to teach you the skills necessary to deploy the Cisco© Optical Networking System (ONS), 15454 Multiservice Transport Platform (MSTP), and Cisco Network Convergence System (NCS) 2000 Series Dense Wavelength-Division Multiplexing (DWDM) networks from installation to protection. Through a combination of lecture and hands-on experience, you will learn installation, configuration, circuit protection, maintenance, and basic troubleshooting using the Cisco Transport Controller for the Cisco ONS 15454 M6 and M12 shelves, and for the Cisco NCS 2016 shelf.Additionally, in this course you will review DWDM terminology and components, explore available chassis and cards, and discuss hardware installation. You will learn to use the Cisco Transport Controller server software to connect to the nodes, perform network turn-up and circuit creation, and deploy linear and single-module ROADM (SMR) DWDM multishelf topologies. Using this software, you will also configure Raman amplifiers and Any Rate cards, and configure protected and unprotected circuits. The course covers a variety of card options: controllers, transponders, multiplexer-demultiplexer, add/drop, Raman amplifiers, and Cisco Any Rate muxponder cards. You will use the various cards to configure terminal, amplifier, mesh, split, Optical Service Channel (OSC) regenerator, and Reconfigurable Optical Add/Drop Multiplexing (ROADM) nodes. Finally, you will learn how to use many of the tools and features available with the Cisco Transport Controller to perform maintenance, testing, and basic troubleshooting of your optical network. Course Outline DWDM Optical Platform Foundation Chassis and Cards Hardware Installation Node Turn-Up and Circuit Creation Node and Multishelf Configurations SMR-Based Rings 10Gb Circuit Protection Any Rate Card Configuration Raman Amplifiers Maintenance and Basic Troubleshooting Additional course details: Nexus Humans Cisco Optical Technology Intermediate v3.0 (OPT200) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Optical Technology Intermediate v3.0 (OPT200) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Optical Technology Intermediate v3.0 (OPT200)
Delivered OnlineFlexible Dates
Price on Enquiry

How to speak in public with Karen Hale - Speak up and be heard

By The Motivation Clinic

An interactive workshop with Karen Hale. Learn how to gain the confidence, skills and techniques to speak up so you can be heard. "There are two types of speakers: Those who get nervous and those who are liars." - Mark Twain Is this you? Promotions not applied for, jobs roles not tried for, networking events not attended? Parties avoided, family ceremonies not spoken at, too much left unsaid? Do you have excellent ideas that get lost in time because you are fearful of voicing them. Have you missed opportunities because it involves showing up? Do you stay silent in meetings? Do you have a brilliant business idea that isn’t being pursued because you know it will involve some kind of networking or public speaking? If the answer to any/most of these is YES, then read on... This workshop is strange by its nature. Why would someone who disliked public speaking, go to a place where they would speak in public? This is why.... Because Karen has analysed what makes a good communicator when speaking informally to people; she has taken those aspects and developed a group of exercises that allows you to use these exact techniques when speaking at networking events and in public. Added to that, Karen provides a smorgasbord of methods on how to control nerves to ensure you communicate at your authentic best. Please note: everybody in the room will be there for the same reason as you! You will be supported and encouraged and will learn how to turn fear into empowerment! About Karen: An empowerment and public speaking coach with over 30 years experience in coaching and advising individuals and business leaders from a diverse range of sectors on effective communication skills. It takes a second to form a first impression about a person. Your body language, clothes, speech and personal presence convey messages about your background, skills and expertise. Karen works with her clients to ensure they make that first impression powerful and authentic so they get remembered for the right reasons. By creating a confident and authentic presence you increase your visibility and your credibility. “Karen is a truly special individual. She made me feel totally at ease and was able to help me stand and speak confidently for the first time and she did that all with huge warmth and a lot of humour.” She fulfils her greatest passion on a daily basis, helping people present themselves to the outside world in the very best way. She has enabled hundreds of people to move on in their life and careers and build their growth, confidence and image. Karen works across a huge spectrum - from CEOs in FTSE 100 companies to Foundation Class university students at UAL coaching presentation skills. She coaches senior individuals and consults to leading global banks, private banks and family offices, advising business leaders and their teams. She is Central School of Speech and Drama trained. Kind words about Karen... I have had the absolute pleasure of working with Karen numerous times over the past 16 years to assist me in my various corporate roles. Karen has always been the person I have turned to first and foremost when I have needed help with my personal brand, presence and communication, helping me develop confidence in public speaking and showing up in front of the camera. A HUGE thank you for Monday – you were wonderful. The feedback we have had has been unbelievable – I can honestly say in all my years in this industry I have never heard such positive comments on every aspect. Karen has an incredible gift of making you feel completely at ease and is able to bring the best out of a person with ease. She is friendly, approachable and warm and I now refer Karen to everybody I know who needs assistance with any type of public speaking, communication and confidence requirement. The results speak for themselves. Highly recommend! You can contact Karen at: https://www.linkedin.com/in/karen-hale-8925862b/ / 07956626740 For any questions regarding this event, please contact the organiser lara@themotivationclinic.co.uk / 07817247727 - thank you!

How to speak in public with Karen Hale - Speak up and be heard
Delivered OnlineFlexible Dates
£5

Configuring Aruba Mobility Level 1, Rev 23.22

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Typical candidates for this course are IT Professionals who deploy small-to-medium scale enterprise network solutions based on Aruba products and technologies. Overview After you successfully complete this course, expect to be able to: Explain how Aruba's wireless networking solutions meet customers' requirements Explain fundamental WLAN technologies, RF concepts, and 802.11 Standards Learn to configure the Mobility Conductor and Mobility Controller to control access to the Employee and Guest WLAN Control secure access to the WLAN using Aruba Firewall Policies and Roles Recognize and explain Radio Frequency Bands and channels, and the standards used to regulate them Describe the concept of radio frequency coverage and interference and successful implementation and diagnosis of WLAN systems Identify and differentiate antenna technology options to ensure optimal coverage in various deployment scenarios Describe RF power technology including, signal strength, how it is measured and why it is critical in designing wireless networks Learn to configure and optimize Aruba ARM and Client Match and Client Insight features Learn how to perform network monitoring functions and troubleshooting This course teaches the knowledge, skills and practical experience required to set up and configure a basic Aruba WLAN utilizing the AOS 8.X architecture and features. Using lecture and labs, this course provides the technical understanding and hands-on experience of configuring a single Mobility Conductor with one controller and AP Aruba WLAN. Participants will learn how to use Aruba hardware and AOS8 to install and build a complete, secure controller network with multiple SSIDs. WLAN Fundamentals Describes the fundamentals of 802.11, RF frequencies and channels Explain RF Patterns and coverage including SNR Roaming Standards and QOS requirements Mobile First Architecture An introduction to Aruba Products including controller types and modes OS 8.X Architecture and features License types and distribution Mobility Conductor Mobility Controller Configuration Understanding Groups and Subgroups Different methods to join Mobility Controller with Mobility Conductor Understanding Hierarchical Configuration Secure WLAN configuration Identifying WLAN requirements such as SSID name, encryption, authentication Explain AP groups structure and profiles Configuration of WLAN using the Mobility Conductor GUI AP Provisioning Describes the communication between AP and Mobility controller Explain the AP booting sequence and requirements Explores the APs controller discovery mechanisms Explains how to secure AP to controller communication using CPSec Describes AP provisioning and operations WLAN Security Describes the 802.11 discovery, authentication and association Explores the various authentication methods, 802.1x with WPA/WPA2, Mac auth Describes the authentication server communication Explains symmetric vs asymmetric Keys, encryption methods WIPS is described along with rogue discovery and protection Firewall Roles and Policies An introduction into Firewall Roles and policies Explains Aruba?s Identity based Firewall Configuration of Policies and Rules including aliases Explains how to assign Roles to users Dynamic RF Management Explain how ARM calibrates the network selecting channels and power settings Explores OS 8.X Airmatch to calibrate the network How Client Match and Client Insight match steers clients to better APs Guest Access Introduces Aruba?s solutions for Guest Access and the Captive portal process Configuration of secure guest access using the internal Captive portal The configuration of Captive portal using Clearpass and its benefits Creating a guest provisioning account Troubleshooting guest access Network Monitoring and Troubleshooting Using the Mobility Conductor dashboard to monitor and diagnose client, WLAN and AP issues Traffic analysis using APPrf with filtering capabilities A view of AirWave's capabilities for monitoring and diagnosing client, WLAN and AP issues

Configuring Aruba Mobility Level 1, Rev 23.22
Delivered OnlineFlexible Dates
Price on Enquiry

Business development for professional services (In-House)

By The In House Training Company

The market for professional services is becoming increasingly competitive, with some firms and individuals becoming very effective at winning new work, leaving others lagging way behind. Given the choice between spending time on client work and business development work, we all tend to choose that which we feel to be easier, more attractive and more aligned with our image of ourselves. We stay within our comfort zones, we focus on client work, and we only resort to business development work when we have to, which can also lead to 'feast or famine' syndrome. The programme will help participants: Understand the professional business development approach and the style that is appropriate for their business and their clients Follow a process to guide their conversations and business development meetings Prepare thoroughly for a business development meeting/contact with a client to ensure they use their time efficiently and maximise results Create a great first impression and professional opening to a conversation Ask open questions and listen effectively in order to spot opportunities, understand needs and progress the opportunity Identify and understand buying and decision-making processes and criteria Skilfully and confidently handle questions and objections Sell the benefits of their services and approach over those of their competitors Progress the sale by agreeing next steps and gaining commitment appropriately 1 Introduction Aims and objectives of the programme Personal introductions and objectives Workshop overview 2 An introduction to business development and selling for professionals What is selling? Who are you selling to? The buying experience What clients want The four-step business development process The business development cycle and pipeline management Upselling and cross-selling as well as winning new clients 3 Networking and generating leads What is networking? Networking objectives It's not what you know but who you know Asking for referrals and introductions Making appointments from networking activity 4 Opening the sales relationship/sales meeting What potential customers are thinking Judging first impressions Creating positive first impressions Building rapport and creating interest and impact Earning the right 5 Core communication skills for professional selling Overcoming barriers to listening The art of listening Questioning refresher Types of questions Questioning funnel 6 Understanding and identifying needs and opportunities Identifying the questions to ask to identify needs and opportunities Questions to move us through the buying and selling process Understanding their buying processes Asking questions that position you as a 'trusted adviser' The questions that give you a competitive advantage Knowing when you have asked enough questions 7 Introducing solutions Tailoring your 'pitch' to the client Speaking the client's language Using features and benefits Applying the benefit cycle 8 Handling objections and concerns Identifying the typical objections and concerns Understanding why clients raise objections and concerns Following a structure for handling objections Handling the price objection 9 Gaining commitment Knowing when to close The art of checking Recognising buying signals Small c and big C 10 Putting it all together Personal learning summary and action plans

Business development for professional services (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry

AZ-801T00 Configuring Windows Server Hybrid Advanced Services

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This four-day course is intended for Windows Server Hybrid Administrators who have experience working with Windows Server and want to extend the capabilities of their on-premises environments by combining on-premises and hybrid technologies. Windows Server Hybrid Administrators who already implement and manage on-premises core technologies want to secure and protect their environments, migrate virtual and physical workloads to Azure Iaas, enable a highly available, fully redundant environment, and perform monitoring and troubleshooting. This course teaches IT Professionals to configure advanced Windows Server services using on-premises, hybrid, and cloud technologies. The course teaches IT Professionals how to leverage the hybrid capabilities of Azure, how to migrate virtual and physical server workloads to Azure IaaS, and how to secure Azure VMs running Windows Server. The course also teaches IT Professionals how to perform tasks related to high availability, troubleshooting, and disaster recovery. The course highlights administrative tools and technologies including Windows Admin Center, PowerShell, Azure Arc, Azure Automation Update Management, Microsoft Defender for Identity, Azure Security Center, Azure Migrate, and Azure Monitor. Prerequisites An understanding of the following concepts as related to Windows Server technologies: High availability and disaster recovery Automation Monitoring Troubleshooting 1 - Secure Windows Server user accounts Configure user account rights Protect user accounts with the Protected Users group Describe Windows Defender Credential Guard Block NTLM authentication Locate problematic accounts 2 - Hardening Windows Server Describe Local Password Administrator Solution Configure Privileged Access Workstations Secure domain controllers Analyze security configuration with Security Compliance Toolkit Secure SMB traffic 3 - Windows Server update management Explore Windows Update Outline Windows Server Update Services server deployment options Define Windows Server Update Services update management process Describe the process of Update Management 4 - Secure Windows Server DNS Implement split-horizon DNS Create DNS policies Implement DNS policies Secure Windows Server DNS Implement DNSSEC 5 - Implement Windows Server IaaS VM network security Implement network security groups and Windows IaaS VMs Implement adaptive network hardening Implement Azure Firewall and Windows IaaS VMs Implement Windows firewall with Windows Server IaaS VMs Choose the appropriate filtering solution Deploy and configure Azure firewall using the Azure portal Capture network traffic with network watcher Log network traffic to and from a VM using the Azure portal 6 - Audit the security of Windows Server IaaS Virtual Machines Describe Azure Security Center Enable Azure Security Center in hybrid environments Implement and assess security policies Protect your resources with Azure Security Center Implement Azure Sentinel 7 - Manage Azure updates Describe update management Enable update management Deploy updates View update assessments Manage updates for your Azure Virtual Machines 8 - Create and implement application allowlists with adaptive application control Describe adaptive application control Implement adaptive application control policies 9 - Configure BitLocker disk encryption for Windows IaaS Virtual Machines Describe Azure Disk Encryption and server-side encryption Configure Key Vault for Azure Disk Encryption Encrypt Azure IaaS Virtual Machine hard disks Back up and recover data from encrypted disks Create and encrypt a Windows Virtual Machine 10 - Implement change tracking and file integrity monitoring for Windows IaaS VMs Implement Change Tracking and Inventory Manage Change Tracking and Inventory Manage tracked files Implement File Integrity Monitoring Select and monitor entities Use File Integrity Monitoring 11 - Introduction to Cluster Shared Volumes Determine the functionality of Cluster Shared Volumes Explore the architecture and components of Cluster Shared Volumes Implement Cluster Shared Volumes 12 - Implement Windows Server failover clustering Define Windows Server failover clustering Plan Windows Server failover clustering Implement Windows Server failover clustering Manage Windows Server failover clustering Implement stretch clusters Define cluster sets 13 - Implement high availability of Windows Server VMs Select high-availability options for Hyper-V Consider network load balancing for Hyper-V VMs Implement Hyper-V VM live migration Implement Hyper-V VMs storage migration 14 - Implement Windows Server File Server high availability Explore the Windows Server File Server high-availability options Define Cluster Shared Volumes Implement Scale-Out File Server Implement Storage Replica 15 - Implement scale and high availability with Windows Server VM Describe virtual machine scale sets Implement scaling Implement load-balancing VMs Create a virtual machine scale set in the Azure portal Describe Azure Site Recovery Implement Azure Site Recovery 16 - Implement Hyper-V Replica Define Hyper-V Replica Plan for Hyper-V Replica Configure and implement Hyper-V Replica Define extended replication Define Azure Site Recovery Implement Site Recovery from on-premises site to Azure Implement Site Recovery from on-premises site to on-premises site 17 - Protect your on-premises infrastructure from disasters with Azure Site Recovery Azure Site Recovery overview Workloads supported for protection with Azure Site Recovery Run a disaster recovery drill Failover and failback 18 - Implement hybrid backup and recovery with Windows Server IaaS Describe Azure Backup Implement recovery vaults Implement Azure Backup policies Recover Windows IaaS Virtual Machines Perform file and folder recovery Perform backup and restore of on-premises workloads Manage Azure Virtual Machine backups with Azure Backup service 19 - Protect your Azure infrastructure with Azure Site Recovery What is Azure Site Recovery Prepare for disaster recovery with Azure Site Recovery Run a disaster recovery drill Failover and failback using Azure Site Recovery 20 - Protect your virtual machines by using Azure Backup Azure Backup features and scenarios Back up an Azure virtual machine by using Azure Backup Restore virtual machine data 21 - Active Directory Domain Services migration Examine upgrade vs. migration Upgrade a previous version of Active Directory Domain Services to Windows Server 2022 Migrate to Active Directory Domain Services in Windows Server 2022 from a previous version Explore the Active Directory Migration Tool 22 - Migrate file server workloads using Storage Migration Service Storage Migration Service overview and usage scenarios Storage migration requirements Migrate a server with Storage migration Evaluate storage migration considerations 23 - Migrate Windows Server roles Describe the Windows Server Migration Tools Install the Migration Tools Migrate roles using the Migration Tools 24 - Migrate on-premises Windows Server instances to Azure IaaS virtual machines Plan your migration Describe Azure Migrate Perform server assessment Assess physical servers with Azure Migrate Migrate Windows Server workloads by using Azure Migrate 25 - Upgrade and migrate Windows Server IaaS virtual machines Describe Azure Migrate Migrate Windows Server workloads by using Azure Migrate Describe storage migration Migrate file servers by using Storage Migration Service 26 - Containerize and migrate ASP.NET applications to Azure App Service Azure Migrate App Containerization overview 27 - Monitor Windows Server performance Use Performance Monitor to identify performance problems Use Resource Monitor to review current resource usage Review reliability with Reliability Monitor Implement a performance monitoring methodology Use Data Collector Sets to analyze server performance Monitor network infrastructure services Monitor virtual machines running Windows Server Monitor performance with Windows Admin Center Use System Insights to help predict future capacity issues Optimize the performance of Windows Server 28 - Manage and monitor Windows Server event logs Describe Windows Server event logs Use Windows Admin Center to review logs Use Server Manager to review logs Use custom views Implement event log subscriptions 29 - Implement Windows Server auditing and diagnostics Describe basic auditing categories Describe advanced categories Log user access Enable setup and boot event collection 30 - Troubleshoot Active Directory Recover objects from the AD recycle bin Recover the AD DS database Recover SYSVOL Troubleshoot AD DS replication Troubleshoot hybrid authentication issues 31 - Monitor Windows Server IaaS Virtual Machines and hybrid instances Enable Azure Monitor for Virtual Machines Monitor an Azure Virtual Machine with Azure Monitor Enable Azure Monitor in hybrid scenarios Collect data from a Windows computer in a hybrid environment Integrate Azure Monitor with Microsoft Operations Manager 32 - Monitor your Azure virtual machines with Azure Monitor Monitoring for Azure VMs Monitor VM host data Use Metrics Explorer to view detailed host metrics Collect client performance counters by using VM insights Collect VM client event logs 33 - Troubleshoot on-premises and hybrid networking Diagnose DHCP proble

AZ-801T00 Configuring Windows Server Hybrid Advanced Services
Delivered OnlineFlexible Dates
£2,380

Wed 1 Oct 2025 - Christmas Tree Recycling

By Hospice Income Generation Network

Sharing & Networking - Christmas tree recycling programmes. Session aimed at tree recycling fundraisers THIS SESSION WILL NOT BE RECORDED

Wed 1 Oct 2025 - Christmas Tree Recycling
Delivered Online
FREE

Awareness of Safeguarding

By Madeleys First Aid Plus

RQF level 1 Awareness of Safeguarding The RQF Level 1 Awareness of Safeguarding course is designed to provide individuals with a basic understanding of safeguarding principles and practices. It aims to raise awareness about the importance of safeguarding and promote the well-being and protection of vulnerable individuals, such as children, young people, and adults at risk. The course covers the following topics: Introduction to Safeguarding: Definition and importance of safeguarding. Key legislation, policies, and guidance related to safeguarding. Roles and responsibilities of individuals and organizations in safeguarding. Types of Abuse and Neglect: Overview of different types of abuse, including physical, emotional, sexual, and financial abuse. Recognizing signs and indicators of abuse and neglect. Understanding the impact of abuse on individuals' well-being. Vulnerable Groups: Identifying vulnerable groups, such as children, young people, older adults, and individuals with disabilities or mental health issues. Understanding the specific safeguarding concerns and considerations for each group. Reporting and Responding to Safeguarding Concerns: Procedures for reporting safeguarding concerns or disclosures. Understanding the importance of maintaining confidentiality and handling sensitive information appropriately. Responding to safeguarding concerns in a timely and appropriate manner. Promoting Safeguarding and Preventing Abuse: Strategies for promoting a safe and inclusive environment. Recognizing potential risk factors and implementing preventative measures. Understanding the importance of creating a culture of safeguarding within organizations. Multi-Agency Collaboration: Collaboration between different agencies and organizations involved in safeguarding, such as social services, law enforcement, and healthcare. Sharing information and working together to ensure effective safeguarding practices. Case Studies and Scenarios: Reviewing case studies and scenarios to apply safeguarding principles and practices. Analysing potential safeguarding dilemmas and decision-making processes. Personal Responsibilities: Recognizing personal boundaries and limitations when working with vulnerable individuals. Understanding the importance of self-care and managing emotional well-being when dealing with safeguarding issues. It is important to ensure that the course meets local safeguarding guidelines and requirements. Suitability - Who should attend? The RQF Level 1 Awareness of Safeguarding course is suitable for a wide range of individuals who may come into contact with vulnerable individuals or have a general interest in understanding safeguarding principles. Here are some key groups of people who should attend the course: Employees and Staff: The course is relevant for employees and staff members across various sectors and industries, including but not limited to education, healthcare, social services, hospitality, sports and recreation, and community organizations. It helps them develop a basic understanding of safeguarding principles and their responsibilities in ensuring the well-being and protection of vulnerable individuals they may encounter in their work. Volunteers: Individuals who volunteer their time and services in organizations that work with vulnerable individuals should attend the course. It equips them with essential knowledge and awareness of safeguarding issues, helping them provide appropriate support and maintain the safety and dignity of those they interact with. Parents and Caregivers: The course can benefit parents, guardians, and caregivers by providing them with a foundation in safeguarding principles. It helps them recognize potential risks and signs of abuse or neglect, enabling them to create safer environments for the children or vulnerable individuals under their care. Community and Youth Workers: Individuals involved in community work, youth organizations, or youth clubs should attend the course to enhance their understanding of safeguarding. It enables them to promote the well-being and safety of young people and recognize signs of potential abuse or exploitation. Volunteers or Trustees of Charitable Organizations: Individuals serving as volunteers or trustees in charitable organizations that work with vulnerable populations can benefit from the course. It helps them fulfill their responsibilities in safeguarding the individuals the organization serves and ensures they are aware of their legal and ethical obligations. General Public: The course is open to the general public as it provides valuable knowledge and awareness of safeguarding principles. It can benefit individuals who have an interest in understanding the rights and protection of vulnerable individuals in society. It's important to note that the RQF Level 1 Awareness of Safeguarding course provides foundational knowledge and awareness. For individuals who require more in-depth training or who have specific safeguarding roles or responsibilities, higher-level courses may be more suitable. Outcome / Qualification etc. Certification The qualification does not have an expiry date but refresher training and keeping up to date with changes to policies, procedures and new legislation through ongoing CPD is vital. Training Course Content Module 1 Introductions Module 2 Safeguarding legislation and guidance Module 3 Roles and responsibilities Module 4 Abuse and neglect Module 5 Identifying concerns and disclosure Module 6 Making judgements Module 7 Reporting concerns Module 8 Course closure and assessment MODULE 1 INTRODUCTIONS Session content Trainer/Assessor introduction Learner introductions Course syllabus Learning outcomes and assessment criteria Session duration 20 minutes MODULE 2 SAFEGUARDING LEGISLATION AND GUIDANCE Session content Introduction to safeguarding Definitions Assessment framework Safeguarding statistics Safeguarding legislation and guidance Rights of a child/adult at risk Session duration 40 minutes MODULE 3 ROLES AND RESPONSIBILITIES Session content Safeguarding partnerships Local authority safeguarding officer Social care services Multi-agency safeguarding hubs Organisational safeguarding policies Safeguarding lead Session duration 30 minutes MODULE 4 ABUSE AND NEGLECT Session content Definitions Types of abuse and neglect Physical abuse Emotional abuse Sexual abuse Neglect Signs and indicators Parent/carer abuse Radicalisation FGM Forced marriage Modern slavery County line gangs Electronic media abuse - Internet and social networking dangers Session duration 50 minutes MODULE 5 IDENTIFYING CONCERNS AND DISCLOSURE Session content Identifying concerns Being a point of disclosure Recording disclosure information Session duration 20 minutes MODULE 6 MAKING JUDGEMENTS Session content Child development needs Identifying a safeguarding concern Group activity making judgements Session duration 30 minutes MODULE 7 REPORTING CONCERNS Session content Silencing factors Barriers to raising concerns Reporting concerns Importance of sharing concerns Session duration 20 minutes MODULE 8 COURSE CLOSURE AND ASSESSMENT Session content Course summary Assessment paper Course evaluation Course closure Session duration 30 minutes Course delivery details Qualification delivery The qualification has 4 assigned guided learning hours (GLH) and 5 hours total qualification time (TQT). GLH indicates the number of classroom contact hours that the learner will undertake. TQT includes GLH but also takes into account any unsupervised learning and is an estimate of how long the average learner will take to complete the qualification. The minimum classroom contact time of 4 hours should be delivered over a minimum of half a day. The course can be spread over a maximum of 2 weeks, ensuring that each session is a minimum of two hours. The class ratio for this qualification is a maximum of 16 learners to 1 Trainer/Assessor Why choose Madeleys First Aid Plus Founded in 2021 after Louise left 30 years in the NHS as an Advanced practitioner in A&E/ITU, had spent 1.5 years in Covid ITU Won FSB Best start-up business in the West Midlands in May 2023 Now trained 100's of delegates in Physical and Mental Health First Aid Expenses Travel costs and lunch required, there are many cafes and sandwich bars here in Much Wenlock to buy your lunch, you may eat it in the training room. All training material, books, qualification certificates are included in the price Continuing Studies The RQF Level 1 Awareness of Safeguarding course serves as an introductory course that provides individuals with a basic understanding of safeguarding principles. While it is a standalone qualification, individuals who complete the course may choose to progress further in their safeguarding training and education. Here are some potential progression options: RQF Level 2 Award in Safeguarding: This qualification builds upon the knowledge gained in the Level 1 course and provides a more comprehensive understanding of safeguarding principles, policies, and procedures. It covers topics such as risk assessment, responding to safeguarding concerns, and effective communication in safeguarding contexts. Specialized Safeguarding Courses: Individuals who wish to focus on specific areas of safeguarding can pursue specialized courses related to their field of interest. These courses may include Child Protection, Adult Safeguarding, Domestic Abuse Awareness, Online Safety, or Safeguarding in Healthcare. Specialized courses delve deeper into the specific risks, regulations, and best practices associated with safeguarding vulnerable individuals in those particular contexts. Safeguarding Training for Specific Professions: Many professions have specific safeguarding training requirements tailored to their sector. For example, teachers may need to complete safeguarding training specific to the education setting, healthcare professionals may have training focused on safeguarding vulnerable patients, and social workers may have specialized safeguarding training in line with their role. Progression may involve undertaking profession-specific safeguarding courses or qualifications. Safeguarding Leadership and Management Training: Individuals in supervisory or managerial positions may consider pursuing training that focuses on the leadership and management aspects of safeguarding. This can include courses on developing and implementing safeguarding policies and procedures, managing safeguarding incidents, conducting internal investigations, and providing guidance and support to staff. Continued Professional Development (CPD): Engaging in ongoing CPD activities is essential for staying updated with the latest developments in safeguarding practices and policies. Individuals can attend conferences, workshops, or seminars related to safeguarding, child protection, or specific areas of interest within the field. This allows for continued learning and networking with other professionals. Higher Education: Individuals who wish to pursue a more in-depth study of safeguarding can consider higher education programs in social work, psychology, criminology, or related fields. These programs provide comprehensive knowledge and training in safeguarding practices, policies, and research. They may lead to professional certifications or degrees that enhance career opportunities in safeguarding roles. It's important for individuals to research and explore progression options that align with their specific career goals, interests, and local requirements. Different countries or regions may have varying certification or training requirements for safeguarding roles, so it's advisable to check with relevant regulatory bodies or professional associations for specific guidance.

Awareness of Safeguarding
Delivered in Much Wenlock or Online + more
£60

VMware Kubernetes Fundamentals and Cluster Operations

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Anyone who is preparing to build and run Kubernetes clusters Overview By the end of the course, you should be able to meet the following objectives: Build, test, and publish Docker container images Become familiar with YAML files that define Kubernetes objects Understand Kubernetes core user-facing concepts, including pods, services, and deployments Use kubectl, the Kubernetes CLI, and become familiar with its commands and options Understand the architecture of Kubernetes (Control plane and its components, worker nodes, and kubelet) Learn how to troubleshoot issues with deployments on Kubernetes Apply resource requests, limits, and probes to deployments Manage dynamic application configuration using ConfigMaps and Secrets Deploy other workloads, including DaemonSets, Jobs, and CronJobs Learn about user-facing security using SecurityContext, RBAC, and NetworkPolicies This four-day course is the first step in learning about Containers and Kubernetes Fundamentals and Cluster Operations. Through a series of lectures and lab exercises, the fundamental concepts of containers and Kubernetes are presented and put to practice by containerizing and deploying a two-tier application into Kubernetes. Course Introduction Introductions and objectives Containers What and Why containers Building images Running containers Registry and image management Kubernetes Overview Kubernetes project Plugin interfaces Building Kubernetes Kubectl CLI Beyond Kubernetes Basics Kubernetes objects YAML Pods, replicas, and deployments Services Deployment management Rolling updates Controlling deployments Pod and container configurations Kubernetes Networking Networking within a pod Pod-to-Pod Networking Services to Pods ClusterIP, NodePort, and LoadBalancer Ingress controllers Service Discovery via DNS Stateful Applications in Kubernetes Stateless versus Stateful Volumes Persistent volumes claims StorageClasses StatefulSets Additional Kubernetes Considerations Dynamic configuration ConfigMaps Secrets Jobs, CronJobs Security Network policy Applying a NetworkPolicy SecurityContext runAsUser/Group Service accounts Role-based access control Logging and Monitoring Logging for various objects Sidecar logging Node logging Audit logging Monitoring architecture Monitoring solutions Octant VMware vRealize Operations Manager Cluster Operations Onboarding new applications Backups Upgrading Drain and cordon commands Impact of an upgrade to running applications Troubleshooting commands VMware Tanzu portfolio overview

VMware Kubernetes Fundamentals and Cluster Operations
Delivered OnlineFlexible Dates
Price on Enquiry

Nice Work x Jones Knowles Ritchie (JKR)

By Right Aligned

Our masterclass series goes behind the studio door and explores the processes of globally respected people, studios and businesses.

Nice Work x Jones Knowles Ritchie (JKR)
Delivered OnlineFlexible Dates
FREE to £100