This comprehensive one-day course is designed to empower registered healthcare professionals (HCPs) practicing in primary care with the latest advancements and insights in the field of asthma care. Building on the participants' existing expertise, this update day aims to enhance their proficiency in managing asthma effectively and providing the highest level of patient care. Target Audience: Exclusively tailored for registered healthcare professionals already experienced in asthma care within the primary care setting, this course is a unique opportunity for these practitioners to stay current with the latest developments in the field. Course Benefits: This Asthma Update Day is a prime opportunity for seasoned primary care healthcare professionals to deepen their expertise in asthma care. By staying current with the latest developments, practitioners can enhance their ability to provide high-quality, up-to-date patient care. The course encourages interactive learning, networking, and problem-solving, fostering a dynamic and collaborative learning environment. Prerequisites: This course is exclusively designed for registered healthcare professionals already actively practicing in the field of asthma care within the primary care setting. Outcome: Participants will leave the course armed with new insights, strategies, and approaches to further elevate their asthma care practice, ultimately improving patient outcomes and contributing to the advancement of respiratory healthcare within primary care. Asthma Update Day - Learning Objectives · Understanding Asthma Diagnosis Essentials o Gain insight into the latest diagnostic criteria and techniques for asthma. o Discuss the challenges and methods in accurately diagnosing asthma in children. · Investigative Tests and Guideline Exploration o Review the range of investigative tests available for diagnosing and managing asthma. o Examine the current BTS/NICE & GINA Guidelines and their application in clinical practice. · Pharmacological Treatments and Inhaler Techniques o Update knowledge on the pharmacology of asthma treatments. o Develop practical skills in various inhaler techniques and understand their importance in patient care. · Personalised Asthma Management o Understand the factors influencing the choice of inhalers. o Learn to develop and implement Personalised Asthma Action Plans (PAAPs). o Explore SMART/MART therapy and its role in managing asthma. · Managing Asthma Exacerbations o Identify and manage asthma exacerbations effectively. o Discuss strategies for preventing and managing severe asthma episodes. · Application Through Case Studies o Engage in interactive case studies to apply learning in real-world scenarios. o Encourage the sharing of experiences and best practices among participants. · Conclusion and Future Directions o Summarise key takeaways from the day's sessions. o Discuss future trends and areas for continued professional development in asthma care. Through the "Asthma Update Day" course, clinicians will leave with an elevated level of confidence and competence, empowered to provide enhanced asthma care and positively influence patient outcomes within the primary care setting.
Course Information This one day course is designed to provide you with comprehensive guidance and practical help for when designing and implementing audit programmes. Using the guidance of ISO 19011 with reference to PV, GCP, GMP and GLP audit programmes, you will explore audit programme design, operation, review and improvement. The course will work through why audits are important and understanding the drivers behind a good audit programme. It will discuss how to identify and assess the risks in your organisation, linking them with organisational goals, using these risks as a basis for the design of a risk-based audit programme during facilitated practical workshops. Delegates will have the opportunity to consider and discuss common issues and constraints that may shape their audit programmes. By the end of the course you will have: A clear understanding of the role of audit programmes in managing compliance and of the drivers and risks behind audit programmes An understanding of the roles and responsibilities of management and personnel An appreciation of resourcing implications and auditor attributes A good insight into the practicalities and activities required for design of risk based audit programmes A comparison of your circumstances, challenges, common issues and ways to approach managing audit programmes with other delegates on the course. Tutors Tutors will be comprised of (click the photos for biographies): Louise Handy Director, Handy Consulting Ltd Programme Please note timings may be subject to alteration. Day 1 08:50 Registration 09:00 Welcome and Introduction 09:15 Why do we Need to Audit? Exploring risk and regulation, responsibility and performance. 09:45 Discussion - Programmes, Needs, Commonalities Understanding the needs of delegates' own organisation and comparing common themes and threats. 10:00 Establishing an Audit Programme Design, objectives, risk and resources. This session discusses the consideration when designing audit programmes. 10:30 Break 10:45 Risk Management Considerations, guidance and methods for assessing and controlling risk. 11:00 Workshop 1 - Risks, Prioritisation and Control Looking at specific risks, assessing and evaluating to feed into audit programme management. 12:00 Workshop 1 - Feedback 12:30 Lunch 13:30 Putting it into Practice Resources, practicalities and challenges - the realities of auditing, including selection of auditors, ensuring practice will meet expectations and the reasons to note audit results. 13:45 Workshop 2- Designing Audit Programmes Designing audit programmes using output from risk assessment process. Challenges and flexibility. 15:00 Break 15:15 Workshop 2 - Feedback 15:30 Monitoring, Reviewing and Improving Why or when should existing processes change, understanding the implications of change or inaction and exploring how to improve the audit programme. 16:15 Panel Session This final session will address any outstanding issues raised by delegates. 16:30 Close of Course Extra Information Remote Course Course Material This course will be run completely online. You will receive an email with a link to our online system, which will house your licensed course materials and access to the remote event. Please note this course will run in UK timezone. The advantages of this include: Ability for delegates to keep material on a mobile device< Ability to review material at any time pre and post course Environmental benefits – less paper being used per course Access to an online course group to enhance networking You will need a stable internet connection, a microphone and a webcam. CPD Points 7 Points Development Level Develop
Photoshop Training Course Basics to Advanced designed for individuals of every skill level, ranging from beginners to advanced image editing professionals. Immerse yourself in the realm of potent image manipulation tools at our school in London. Personalized Photoshop courses either at our facility or directly at your location. Click here for more info: Website Duration: 20 hours. Method: Personalized 1-on-1. Schedule: Customize your learning with pre-booked sessions available Monday to Saturday, from 9 am to 7 pm. Course Title: Mastering Photoshop: From Basics to Advanced Proficiency Course Duration: 20 hours Module 1: Introduction to Photoshop (2 hours) Understanding the Photoshop interface Navigating tools and panels Basic keyboard shortcuts for efficient workflow Introduction to different file formats and their uses Module 2: Essential Tools and Techniques (3 hours) Selection tools and techniques for precise editing Working with layers: management and blending modes Understanding brushes, gradients, and patterns Introduction to basic filters and their applications Module 3: Image Editing and Retouching (4 hours) Color correction and adjustment layers Advanced retouching techniques: Healing Brush, Clone Stamp, and Content-Aware tools Removing backgrounds and unwanted elements Restoring old or damaged photographs Module 4: Advanced Photo Manipulation (3 hours) Compositing multiple images seamlessly Advanced blending modes and layer effects Creative use of masks and clipping paths Special effects: lighting, shadows, and reflections Module 5: Text and Typography (2 hours) Working with text layers and formatting options Creating custom typography and text effects Utilizing layer styles for creative text designs Text manipulation along paths and shapes Module 6: Web and UI Design (3 hours) Designing web banners, buttons, and interfaces Slicing and optimizing images for the web Creating interactive prototypes and mockups Exporting assets for web and app development Module 7: Print Design and Prepress (2 hours) Understanding color modes: CMYK vs. RGB Setting up documents for print: bleed, margins, and resolution Designing print materials: brochures, business cards, and posters Preparing files for professional printing Module 8: Project-Based Learning (1 hour) Applying learned techniques to real-world projects Instructor-led project: creating a digital artwork or advertisement Feedback and critique session for skill refinement Final presentation of completed projects Upon completion, you will: Master Photoshop Skills: Gain proficiency in fundamental and advanced Photoshop techniques, enabling professional-level image editing and creative design. Enhance Creativity: Develop creative problem-solving abilities, enabling innovative and visually appealing design solutions. Job Opportunities: Graphic Designer: Craft compelling visual content for ads, websites, and marketing materials. Photo Retoucher: Edit and enhance photographs to meet professional standards. Digital Artist: Create digital artwork and illustrations for various purposes. Web/UI/UX Designer: Design user-friendly interfaces and engaging online experiences. Marketing Content Creator: Generate eye-catching promotional visuals and social media content. Video Editor: Enhance video footage and create engaging video content for online platforms. Professional Adobe Photoshop Training in London - On-Site & Live Virtual Classes Being the industry-leading image editing software, Photoshop empowers users to manipulate images, enhance colors, and create visually striking designs. Its extensive toolkit allows for intricate adjustments, retouching, and even editing videos, graphic design, and 3D imagery. Enroll in our Photoshop course to establish a strong foundation in creative visuals, focusing on essential skills like image adjustment, composition, and common troubleshooting. For a more in-depth understanding, our Advanced course delves into advanced techniques such as color fills, text and layer styling, and creating web-ready artwork. Explore our masterclass options for advanced training and deeper insights. Both beginner courses are available in physical classrooms and online, providing flexible learning opportunities. Holistic Design Education: Comprehensive training across diverse design fields. Industry-Experienced Instructors: Learn from seasoned professionals in the field. Flexible Learning: Accommodating schedules for busy professionals and students. Practical Projects: Hands-on projects for real-world design experience. Career-Focused Skills: Acquire industry-relevant skills for professional growth. Cutting-Edge Facilities: Access state-of-the-art technology and facilities. Personalized Training: Tailored programs to suit individual learning needs. Networking Opportunities: Connect with design professionals for valuable connections. Innovation Exploration: Explore creative trends and emerging technologies. Ongoing Support: Continuous assistance and post-course guidance.
Course Information Join us for a comprehensive refresher focusing on crucial Good Laboratory Practice (GLP) requirements, including an emphasis on data integrity, recent developments, and emerging trends gleaned from MHRA inspections. The programme dives into specific domains such as risk assessment, OECD guidance on sponsor influence, and the advisory from OECD on QA. Additionally, delegates can benefit from a dedicated GLP clinic, facilitating discussions on understanding and upholding GLP compliance. Is this course for you? This course is tailored for study directors, principal investigators, test facility management, and QA professionals seeking to refresh their knowledge and responsibilities within the GLP framework. Tutors Tutors will be comprised of (click the photos for biographies): Vanessa Grant -, - Tim Stiles Consultant, Qualogy Ltd Programme Please note timings may be subject to alteration. Day 1 09:00 Registration, Welcome and Introduction 09:20 Development of Good Laboratory Practice A reminder of the history of GLP, its current scope and application, with a synopsis of current UK, European and international standards. 09:50 Roles and Responsibilities of Study Director, Test Facility Management, Principal Investigator, Test Site Management, Study Staff and QA A reminder of the roles and responsibilities with regard to the GLP management and oversight of the Test Facility and the management and control of the study, as defined by GLP. 10:30 Break 10:45 Workshop 1 Workshop 1 Roles and responsibilities 11:15 Influence of Sponsors The published OECD Position Paper No. 21 regarding Possible Influence of Sponsors on conclusions of GLP Studies is reviewed and discussed. 11:45 Data Integrity The fundamentals of data integrity according to the OECD Guidance No. 22 on Data Integrity is discussed along with the responsibilities of Study Director, Test Facility Management, and study staff in ensuring the integrity of the GLP study data. 12:30 Lunch 13:15 Quality Assurance and GLP OECD Advisory No. 23 (Revision of OECD No.4)- A walk through of the changes to the OECD Guidance on the role and activities of Quality Assurance 13:45 Quality Improvement Tools and GLP The tools that might be considered for GLP and their role and operation when used in Test Facilities- OECD Position Paper No.24 published July 2022 14:15 Workshop 2 Workshop 2 Change control 14:30 Risk Assessment How should we assess risk and how can we use the process to assist in evaluation audit findings? 15:00 Break 15:15 Current hot topics in GLP Explore the current issues in Industry and trends /types of Regulatory inspection findings 15:50 GLP Clinic An opportunity to discuss any other issues regarding understanding and maintaining GLP Compliance. 16:30 Close of Course Extra Information Course Material This course will be run completely online. You will receive an email with a link to our online system, which will house your licensed course materials and access to the remote event. Please note this course will run in UK timezone. The advantages of this include: Ability for delegates to keep material on a mobile device Ability to review material at any time pre and post course Environmental benefits – less paper being used per course Access to an online course group to enhance networking. You will need a stable internet connection, a microphone and a webcam. CPD Points 7 Points Development Level Learn
Duration 3 Days 18 CPD hours This course is intended for Built for IT Professionals working with Citrix SD-WAN, with little or no previous SD-WAN experience. Potential students include networking administrators, engineers, and architects interested in learning how to deploy or manage Citrix SD-WAN. Overview Initial configuration and management of Citrix SD-WAN Deployment options available Citrix SD-WAN Orchestrator utilities and considerations Citrix SD-WAN administration, including monitoring and reporting In this three-day course, you will learn how Citrix SD-WAN can simplify branch networking for your organization. You?ll walk away understanding how to configure and manage SD-WAN, including the SD-WAN architecture, deployment options, provisioning, and how to use Citrix SD-WAN Orchestrator in your environment.Additional topics include: branch office deployment, SD-WAN monitoring, reporting, and diagnostics. Citrix SD-WAN Overview Citrix SD-WAN Use Cases Citrix SD-WAN Technical Overview Citrix SD-WAN Management Citrix SD-WAN Architecture Citrix SD-WAN Architecture Citrix SD-WAN Hardware Bypass Citrix SD-WAN Packet Processing Citrix SD-WAN Deployment Citrix SD-WAN Deployment Modes Citrix SD-WAN Branch Office Deployment Citrix SD-WAN Deployment Considerations Citrix SD-WAN Configuration Citrix SD-WAN Configuration Process Citrix SD-WAN Provisioning Citrix SD-WAN Orchestrator Citrix SD-WAN Orchestrator Overview Citrix SD-WAN Orchestrator Customer Onboarding Citrix SD-WAN Orchestrator Configuration Citrix SD-WAN Orchestrator Reporting Citrix SD-WAN Administration Citrix SD-WAN Administrative Tasks Citrix SD-WAN Monitoring Citrix SD-WAN Reporting Citrix SD-WAN Diagnostics
Duration 3 Days 18 CPD hours This course is intended for Experienced system administrators and system integrators responsible for designing and implementing vSphere with Kubernetes Overview By the end of the course, you should be able to meet the following objectives: Describe vSphere with Kubernetes and use cases in on-premises environments Deploy vSphere with Kubernetes Describe the VMware NSX networking requirements for vSphere with Kubernetes. Create and manage vSphere with Kubernetes namespaces Deploy and run container applications on vSphere with Kubernetes Deploy and configure VMware Harbor Describe the VMware Tanzu⢠Kubernetes Grid⢠service Deploy a Tanzu Kubernetes Grid cluster Deploy and run container applications on a Tanzu Kubernetes Grid cluster Describe the vSphere with Kubernetes lifecycle Use logs and CLI commands to monitor and troubleshoot vSphere with Kubernetes During this 3-day course, you focus on deploying and managing VMware vSphere© with Kubernetes. You learn about how vSphere with Kubernetes can be used to orchestrate the delivery of Kubernetes clusters and containerized applications in a VMware vSphere© environment. Course Introduction Introductions and course logistics Course objectives Introduction to Containers and Kubernetes Describe Virtual Machines and Containers Describe Container Hosts Describe Container Engines Describe Dockerfile Describe Container Images Describe Image Registry Describe the purpose and functionality of Kubernetes Describe Manifest YAML files Explain Pod YAML files Explain ReplicaSets Explain Services Explain Deployments Introduction to vSphere with Kubernetes Describe the purpose and functionality of vSphere with Kubernetes Explain the integration with VMware Tanzu? Mission Control? Describe the capabilities of vSphere with Kubernetes Describe the components of vSphere with Kubernetes Contrast vSphere with Kubernetes to traditional Kubernetes Describe the requirements for vSphere with Kubernetes Prepare a vSphere cluster for vSphere with Kubernetes Describe the NSX components required for vSphere with Kubernetes Describe the network topology of vSphere with Kubernetes Explain the networking requirements of vSphere with Kubernetes Compare NSX networking objects with Kubernetes networking objects vSphere with Kubernetes Core Services Explain the architecture of the vSphere with Kubernetes Core Services Describe the Container Service Describe the Volume Service Describe the Network Service Describe the Registry Service Describe the use cases of vSphere with Kubernetes Enable vSphere with Kubernetes Deploy VMware Harbor Registry vSphere with Kubernetes Namespaces Describe a vSphere with Kubernetes namespace Contrast a vSphere with Kubernetes namespace to a traditional Kubernetes namespace Describe Resource Quotas Explain Authentication and Authorization to vSphere with Kubernetes Explain the use cases of namespaces Create a namespace Describe kubectl Use kubectl to interact with vSphere with Kubernetes Describe using kubectl pod deployment Explain scaling a pod deployment Explain managing pod lifecycle Explain deleting pods Use kubectl to deploy a pod Use kubectl to scale a pod Use kubectl to switch between namespaces VMware Tanzu Kubernetes Grid service Explain Tanzu Kubernetes Grid service Describe the use cases for Tanzu Kubernetes Grid clusters Describe the integration with Tanzu Mission Control Explain the lifecycle of Tanzu Kubernetes Grid clusters Deploy Tanzu Kubernetes Grid cluster Deploy pods to a Tanzu Kubernetes Grid cluster Monitoring and Troubleshooting Describe the monitoring tools for vSphere with Kubernetes Describe the troubleshooting tools for vSphere with Kubernetes Explain cluster, node, and namespace health Explain usage and capacity monitoring Describe vCenter Server events Describe vSphere with Kubernetes events Gather support information vSphere with Kubernetes Lifecycle Describe the vSphere with Kubernetes lifecycle Describe the Tanzu Kubernetes Grid lifecycle Describe scaling a vSphere with Kubernetes cluster Update vSphere with Kubernetes Update Tanzu Kubernetes Grid clusters Remove vSphere with Kubernetes Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware vSphere with Tanzu: Deploy and Manage [V7] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware vSphere with Tanzu: Deploy and Manage [V7] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Why Choose Complete Maya Beginner to Advanced Training? Maya's extensive toolkit includes modeling, animation, simulation, and more, amplifying your versatility and influence in the 3D production pipeline. Click here for more info: Website Beginners or those with basic 3D knowledge. No specific digital media background is required. Duration: 40 hours Training Approach: 1-on-1 Sessions. Schedule: Customize your schedule by pre-booking a convenient hour of your choice, available Monday to Saturday between 9 am and 7 pm Course Structure: I. Introduction to Maya (3 hours) Maya Overview and Applications Interface Navigation and Basic Tools Project Creation and Management II. Basic Polygon Modeling (6 hours) Fundamentals of Polygon Modeling Creating and Editing Basic Shapes Advanced Techniques: Extrusions, Bevels, and NURBS for Organic Shapes III. Intermediate Modeling (6 hours) Advanced Polygon Modeling: Booleans, Deformers, and Surfaces Architectural Model Creation Sculpting Tools for Organic Shapes IV. Texturing and Materials (6 hours) Introduction to Texturing and Material Application Texture Mapping, UV Unwrapping, and Shaders Painting Textures with 3D Paint Tool V. Lighting and Rendering (6 hours) Basic and Advanced Lighting Techniques Realistic Lighting Environments Camera Setup, Composition, and Rendering VI. Animation (9 hours) Keyframe Animation and Animation Curves Character Rigging and Animation Complex Character Rigs, Lip Sync, Facial Animation, Dynamics, and Simulations VII. Rigging (4 hours) Skeleton Creation and Joint Binding Weight Maps and Simple to Complex Rigging Systems VIII. Special Effects (4 hours) Particle Systems, Fluid Dynamics, Fire, and Explosions Advanced Simulations with nCloth and nParticles Paint Effects and Mash Networks IX. Advanced Rendering Techniques (2 hours) Render Layers, Passes, and Global Illumination Mental Ray Rendering and Settings X. Conclusion and Next Steps (1 hour) Course Review, Tips for Further Learning Q&A Session and Feedback Please note that the course outline is flexible and can be tailored based on the learners' needs and proficiency levels. Autodesk Maya Basics to Advanced Level Course: Modeling: Surfaces, Control Vertex, Polygons, Extrusion Techniques, Subdiv Modeling, and More Deformations: Twist, Lattice, Flare, Bend Tools Shapes: Lines, Pen Tools, Surface Manipulation Techniques Animations: Keyframe Setup, Path Animations, Skeletons, IK Handles, Skinning Dynamics and Special Effects: Particle Systems, Fluid Dynamics, Lighting Effects, and Advanced Simulations Texturing and Rendering: Diffuse and Bump Mapping, Reflections, Shaders, Lights, and Camera Techniques Fluid Effects and Ncloth: 2D and 3D Containers, Collision Effects, Wind Simulations, and Gravity Control Rendering: Image and Animation Rendering, Playblast, Resolution Controls, and Output Formats. Advanced Modeling: Master intricate 3D models, including polygon, NURBS, and architectural modeling. Expert Texturing: Create realistic textures, apply shaders, and utilize the 3D paint tool. Complex Animation: Rig characters, perform lip sync, facial animation, and dynamic simulations. Special Effects Mastery: Understand particle systems, fluid dynamics, fire effects, and advanced simulations. Rendering Expertise: Grasp advanced rendering techniques, including layers, passes, and global illumination. Comprehensive Rigging: Develop joints, skeletons, and advanced rigging systems for characters and objects. Fluid Dynamics Proficiency: Manipulate 2D/3D fluid containers, create collision effects, and work with wind/gravity simulations. Advanced Lighting and Camera: Perfect lighting, shadows, and special effects. Master camera setups for diverse visual compositions. Recommended Books: "Introducing Autodesk Maya 2023" by Dariush Derakhshani and Randi L. Derakhshani "Mastering Autodesk Maya 2023" by Todd Palamar "Maya Character Creation: Modeling and Animation Controls" by Chris Maraffi "Maya Secrets of the Pros" by John Kundert-Gibbs and Dariush Derakhshani "The Art of 3D Computer Animation and Effects" by Isaac Victor Kerlow Advanced Maya Training Tailored to You: Elevate your Maya skills with specialized training covering essential areas like modeling, UV mapping, texturing, lighting, camera movement, and rigging. Your learning experience is personalized to match your unique requirements and preferences. Discuss your goals with our trainer, and we'll create a syllabus tailored just for you. Flexible Training Choices: Select between in-person sessions at our UK center or attend live online classes, offering convenience and accessibility. Certified Instructors: Benefit from expert guidance provided by Autodesk Authorized Trainers from London Design Training Course. Hands-On Learning: Our practical approach combines theory with step-by-step demonstrations, allowing ample time for hands-on practice on your computer with Maya. You'll retain all the files you create. Compatibility Across Platforms: Maya training caters to both Windows and Mac users, ensuring compatibility with various versions of Maya. Comprehensive Training Package: Participants receive an e-certificate upon successful completion, validating their Maya training. Lifetime Support: Enjoy a lifetime of email support post-training, ensuring assistance with any queries or challenges that arise. Tailored to Your Version: Training can be adapted to your preferred Maya version, ensuring you learn using the most relevant and up-to-date software features. Download Maya https://www.autodesk.co.uk Highly skilled mentors with practical experience. Cutting-edge facilities ensuring an immersive learning environment. Comprehensive courses spanning diverse design disciplines. Practical projects to enhance your portfolio. Networking avenues within the dynamic design community. Skills attuned to current industry trends. Opportunities for professional growth. Choose from flexible in-person or online classes. Internationally recognized training credentials. Engage in London's thriving art and design scene.
Duration 5 Days 30 CPD hours This course is intended for This intermediate course is appropriate for experienced UNIX system administrators who want to support AIX running on POWER processor based systems in a mult-iuser POWER (System p) partitioned environment. Overview At course completion, you will be able to:- Install the AIX operating system, filesets, and RedHat Package Manager (RPM) packages - Perform system startup and shutdown - Discuss and use system management tools such as System Management Interface Tool (SMIT) and IBM systems director console for AIX - Manage physical and logical devices - Discuss the purpose of the logical volume manager - Perform logical volume and file system management - Perform and restore system backups - Use the AIX error log as a tool in problem determination - Configure TCP/IP networking Students will learn to install, customize and administer the AIX operating system in a multi-user POWER (System p) partitioned environment. Introduction to AIX and IBM Power systems AIX system management tools AIX software installation and maintenance System configuration and devices TCP/IP networking System startup and shutdown Basics of configuring logical partitions AIX installation Working with the Logical Volume Manager File systems administration The Object Data Manager LVM metadata Disk management procedures Backup and restore Error monitoring System initialization - I System initialization - II (00:35) Exercise 17 (00:25) Unit 18: The AIX system dump facility (00:15) Exercise 18 Advanced install techniques Alternate disk installation Alternate disk - part 1 (pre-clone) Using multibos Alternate disk - part 2 (post-clone) multibos Appendix A: Survey of additional AIX facilities
Duration 4 Days 24 CPD hours This course is intended for The Microsoft Security Operations Analyst collaborates with organizational stakeholders to secure information technology systems for the organization. Their goal is to reduce organizational risk by rapidly remediating active attacks in the environment, advising on improvements to threat protection practices, and referring violations of organizational policies to appropriate stakeholders. Responsibilities include threat management, monitoring, and response by using a variety of security solutions across their environment. The role primarily investigates, responds to, and hunts for threats using Microsoft Sentinel, Microsoft Defender for Cloud, Microsoft 365 Defender, and third-party security products. Since the Security Operations Analyst consumes the operational output of these tools, they are also a critical stakeholder in the configuration and deployment of these technologies. Learn how to investigate, respond to, and hunt for threats using Microsoft Sentinel, Microsoft Defender for Cloud, and Microsoft 365 Defender. In this course you will learn how to mitigate cyberthreats using these technologies. Specifically, you will configure and use Microsoft Sentinel as well as utilize Kusto Query Language (KQL) to perform detection, analysis, and reporting. The course was designed for people who work in a Security Operations job role and helps learners prepare for the exam SC-200: Microsoft Security Operations Analyst. Prerequisites Basic understanding of Microsoft 365 Fundamental understanding of Microsoft security, compliance, and identity products Intermediate understanding of Windows 10 Familiarity with Azure services, specifically Azure SQL Database and Azure Storage Familiarity with Azure virtual machines and virtual networking Basic understanding of scripting concepts. 1 - Introduction to Microsoft 365 threat protection Explore Extended Detection & Response (XDR) response use cases Understand Microsoft Defender XDR in a Security Operations Center (SOC) Explore Microsoft Security Graph Investigate security incidents in Microsoft Defender XDR 2 - Mitigate incidents using Microsoft 365 Defender Use the Microsoft Defender portal Manage incidents Investigate incidents Manage and investigate alerts Manage automated investigations Use the action center Explore advanced hunting Investigate Microsoft Entra sign-in logs Understand Microsoft Secure Score Analyze threat analytics Analyze reports Configure the Microsoft Defender portal 3 - Protect your identities with Microsoft Entra ID Protection Microsoft Entra ID Protection overview Detect risks with Microsoft Entra ID Protection policies Investigate and remediate risks detected by Microsoft Entra ID Protection 4 - Remediate risks with Microsoft Defender for Office 365 Automate, investigate, and remediate Configure, protect, and detect Simulate attacks 5 - Safeguard your environment with Microsoft Defender for Identity Configure Microsoft Defender for Identity sensors Review compromised accounts or data Integrate with other Microsoft tools 6 - Secure your cloud apps and services with Microsoft Defender for Cloud Apps Understand the Defender for Cloud Apps Framework Explore your cloud apps with Cloud Discovery Protect your data and apps with Conditional Access App Control Walk through discovery and access control with Microsoft Defender for Cloud Apps Classify and protect sensitive information Detect Threats 7 - Respond to data loss prevention alerts using Microsoft 365 Describe data loss prevention alerts Investigate data loss prevention alerts in Microsoft Purview Investigate data loss prevention alerts in Microsoft Defender for Cloud Apps 8 - Manage insider risk in Microsoft Purview Insider risk management overview Create and manage insider risk policies Investigate insider risk alerts Take action on insider risk alerts through cases Manage insider risk management forensic evidence Create insider risk management notice templates 9 - Investigate threats by using audit features in Microsoft Defender XDR and Microsoft Purview Standard Explore Microsoft Purview Audit solutions Implement Microsoft Purview Audit (Standard) Start recording activity in the Unified Audit Log Search the Unified Audit Log (UAL) Export, configure, and view audit log records Use audit log searching to investigate common support issues 10 - Investigate threats using audit in Microsoft Defender XDR and Microsoft Purview (Premium) Explore Microsoft Purview Audit (Premium) Implement Microsoft Purview Audit (Premium) Manage audit log retention policies Investigate compromised email accounts using Purview Audit (Premium) 11 - Investigate threats with Content search in Microsoft Purview Explore Microsoft Purview eDiscovery solutions Create a content search View the search results and statistics Export the search results and search report Configure search permissions filtering Search for and delete email messages 12 - Protect against threats with Microsoft Defender for Endpoint Practice security administration Hunt threats within your network 13 - Deploy the Microsoft Defender for Endpoint environment Create your environment Understand operating systems compatibility and features Onboard devices Manage access Create and manage roles for role-based access control Configure device groups Configure environment advanced features 14 - Implement Windows security enhancements with Microsoft Defender for Endpoint Understand attack surface reduction Enable attack surface reduction rules 15 - Perform device investigations in Microsoft Defender for Endpoint Use the device inventory list Investigate the device Use behavioral blocking Detect devices with device discovery 16 - Perform actions on a device using Microsoft Defender for Endpoint Explain device actions Run Microsoft Defender antivirus scan on devices Collect investigation package from devices Initiate live response session 17 - Perform evidence and entities investigations using Microsoft Defender for Endpoint Investigate a file Investigate a user account Investigate an IP address Investigate a domain 18 - Configure and manage automation using Microsoft Defender for Endpoint Configure advanced features Manage automation upload and folder settings Configure automated investigation and remediation capabilities Block at risk devices 19 - Configure for alerts and detections in Microsoft Defender for Endpoint Configure advanced features Configure alert notifications Manage alert suppression Manage indicators 20 - Utilize Vulnerability Management in Microsoft Defender for Endpoint Understand vulnerability management Explore vulnerabilities on your devices Manage remediation 21 - Plan for cloud workload protections using Microsoft Defender for Cloud Explain Microsoft Defender for Cloud Describe Microsoft Defender for Cloud workload protections Enable Microsoft Defender for Cloud 22 - Connect Azure assets to Microsoft Defender for Cloud Explore and manage your resources with asset inventory Configure auto provisioning Manual log analytics agent provisioning 23 - Connect non-Azure resources to Microsoft Defender for Cloud Protect non-Azure resources Connect non-Azure machines Connect your AWS accounts Connect your GCP accounts 24 - Manage your cloud security posture management? Explore Secure Score Explore Recommendations Measure and enforce regulatory compliance Understand Workbooks 25 - Explain cloud workload protections in Microsoft Defender for Cloud Understand Microsoft Defender for servers Understand Microsoft Defender for App Service Understand Microsoft Defender for Storage Understand Microsoft Defender for SQL Understand Microsoft Defender for open-source databases Understand Microsoft Defender for Key Vault Understand Microsoft Defender for Resource Manager Understand Microsoft Defender for DNS Understand Microsoft Defender for Containers Understand Microsoft Defender additional protections 26 - Remediate security alerts using Microsoft Defender for Cloud Understand security alerts Remediate alerts and automate responses Suppress alerts from Defender for Cloud Generate threat intelligence reports Respond to alerts from Azure resources 27 - Construct KQL statements for Microsoft Sentinel Understand the Kusto Query Language statement structure Use the search operator Use the where operator Use the let statement Use the extend operator Use the order by operator Use the project operators 28 - Analyze query results using KQL Use the summarize operator Use the summarize operator to filter results Use the summarize operator to prepare data Use the render operator to create visualizations 29 - Build multi-table statements using KQL Use the union operator Use the join operator 30 - Work with data in Microsoft Sentinel using Kusto Query Language Extract data from unstructured string fields Extract data from structured string data Integrate external data Create parsers with functions 31 - Introduction to Microsoft Sentinel What is Microsoft Sentinel? How Microsoft Sentinel works When to use Microsoft Sentinel 32 - Create and manage Microsoft Sentinel workspaces Plan for the Microsoft Sentinel workspace Create a Microsoft Sentinel workspace Manage workspaces across tenants using Azure Lighthouse Understand Microsoft Sentinel permissions and roles Manage Microsoft Sentinel settings Configure logs 33 - Query logs in Microsoft Sentinel Query logs in the logs page Understand Microsoft Sentinel tables Understand common tables Understand Microsoft Defender XDR tables 34 - Use watchlists in Microsoft Sentinel Plan for watchlists Create a watchlist Manage watchlists 35 - Utilize threat intelligence in Microsoft Sentinel Define threat intelligence Manage your threat indicators View your threat indicators with KQL 36 - Connect data to Microsoft Sentinel using data connectors Ingest log data with data connectors Understand data connector providers View connected hosts 37 - Connect Microsoft services to Microsoft Sentinel Plan for Microsoft services connectors Connect the Microsoft Office 365 connector Connect the Microsoft Entra connector Connect the Microsoft Entra ID Protection connector Connect the Azure Activity connector 38 - Connect Microsoft Defender XDR to Microsoft Sentinel Plan for Microsoft Defender XDR connectors Connect the Microsoft Defender XDR connector Connect Microsoft Defender for Cloud connector Connect Microsoft Defender for IoT Connect Microsoft Defender legacy connectors 39 - Connect Windows hosts to Microsoft Sentinel Plan for Windows hosts security events connector Connect using the Windows Security Events via AMA Connector Connect using the Security Events via Legacy Agent Connector Collect Sysmon event logs 40 - Connect Common Event Format logs to Microsoft Sentinel Plan for Common Event Format connector Connect your external solution using the Common Event Format connector 41 - Connect syslog data sources to Microsoft Sentinel Plan for syslog data collection Collect data from Linux-based sources using syslog Configure the Data Collection Rule for Syslog Data Sources Parse syslog data with KQL 42 - Connect threat indicators to Microsoft Sentinel Plan for threat intelligence connectors Connect the threat intelligence TAXII connector Connect the threat intelligence platforms connector View your threat indicators with KQL 43 - Threat detection with Microsoft Sentinel analytics What is Microsoft Sentinel Analytics? Types of analytics rules Create an analytics rule from templates Create an analytics rule from wizard Manage analytics rules 44 - Automation in Microsoft Sentinel Understand automation options Create automation rules 45 - Threat response with Microsoft Sentinel playbooks What are Microsoft Sentinel playbooks? Trigger a playbook in real-time Run playbooks on demand 46 - Security incident management in Microsoft Sentinel Understand incidents Incident evidence and entities Incident management 47 - Identify threats with Behavioral Analytics Understand behavioral analytics Explore entities Display entity behavior information Use Anomaly detection analytical rule templates 48 - Data normalization in Microsoft Sentinel Understand data normalization Use ASIM Parsers Understand parameterized KQL functions Create an ASIM Parser Configure Azure Monitor Data Collection Rules 49 - Query, visualize, and monitor data in Microsoft Sentinel Monitor and visualize data Query data using Kusto Query Language Use default Microsoft Sentinel Workbooks Create a new Microsoft Sentinel Workbook 50 - Manage content in Microsoft Sentinel Use solutions from the content hub Use repositories for deployment 51 - Explain threat hunting concepts in Microsoft Sentinel Understand cybersecurity threat hunts Develop a hypothesis Explore MITRE ATT&CK 52 - Threat hunting with Microsoft Sentinel Explore creation and management of threat-hunting queries Save key findings with bookmarks Observe threats over time with livestream 53 - Use Search jobs in Microsoft Sentinel Hunt with a Search Job Restore historical data 54 - Hunt for threats using notebooks in Microsoft Sentinel Access Azure Sentinel data with external tools Hunt with notebooks Create a notebook Explore notebook code
Duration 5 Days 30 CPD hours This course is intended for This course is geared toward Windows system administrators, network administrators, and other system administrators who are interested in supplementing current skills or backstopping other team members, in addition to Linux system administrators who are responsible for these tasks: Configuring, installing, upgrading, and maintaining Linux systems using established standards and procedures, Providing operational support, Managing systems for monitoring system performance and availability, Writing and deploying scripts for task automation and system administration, You will be expected to already understand fundamental Linux computing concepts and be ready to practice the Red Hat Enterprise Linux methods for performing system administration tasks. Significant field experience working with Linux as a system administrator is recommended. If you do not have experience with fundamental Linux computer concepts, we advise you to start with the Red Hat System Administration I (RH124) course instead. Overview You should be able to demonstrate these skills: - Access the command line locally and remotely - Manage files from the command line - Manage local users and groups - Monitor and manage Linux processes - Control services, daemons, and the boot process - Manage tuning profiles for system performance - Control access to files with file system permissions - Analyze and store log files - Configure and secure the OpenSSH service - Install and update software packages and appstreams - Manage Linux file systems and volumes - Manage Linux networking and firewalls This course combines the foundations and applications established and covered in Red Hat System Administration I (RH124) and Red Hat System Administration II (RH134). The rapid pace of review and consolidated course timeline allow you to focus on practical application, making this offering best suited for you if you already have significant experience with Linux© administration. This course is based on Red Hat© Enterprise Linux 8. 1 - Accessing the command line Log in to a Linux system and run simple commands using the shell. 2 - Managing Files from the command line Work with files from the bash shell prompt. 3 - Managing local Linux users and groups Manage Linux users and groups and administer local password policies. 4 - Controlling access to files with Linux file system permissions Set access permissions on files and interpret the security effects of different permission settings. 5 - Managing SELinux security Use SELinux to manage access to files and interpret and troubleshoot SELinux security effects. 6 - Monitoring and managing Linux processes Monitor and control processes running on the system. 7 - Installing and updating software packages Download, install, update, and manage software packages from Red Hat and yum package repositories. 8 - Controlling services and daemons Control and monitor network services and system daemons using systemd. 9 - Managing Red Hat Enterprise Linux networking Configure basic IPv4 networking on Red Hat Enterprise Linux systems. 10 - Analyzing and storing logs Locate and interpret relevant system log files for troubleshooting purposes. 11 - Managing storage and file systems Create and use disk partitions, logical volumes, file systems, and swap spaces. 12 - Scheduling system tasks Schedule recurring system tasks using cron and systemd timer units. 13 - Mounting network file systems Mount network file system (NFS) exports and server message block (SMB) shares from network file servers. 14 - Limiting network communication with firewalld Configure a basic local firewall. Additional course details: Nexus Humans Red Hat RHCSA Rapid Track Course (RH199) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Red Hat RHCSA Rapid Track Course (RH199) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.