Duration 5 Days 30 CPD hours This course is intended for Typical candidates for this course are IT Professionals who deploy small-to-medium scale enterprise network solutions based on Aruba products and technologies Overview After you successfully complete this course, expect to be able to: Explain how Aruba's wireless networking solutions meet customers' requirements Explain fundamental WLAN technologies, RF concepts, and 802.11 Standards Learn to configure the Mobility Master and Mobility Controller to control access to the Employee and Guest WLAN Control secure access to the WLAN using Aruba Firewall Policies and Roles Recognize and explain Radio Frequency Bands and channels, and the standards used to regulate them Describe the concept of radio frequency coverage and interference and successful implementation and diagnosis of WLAN systems Identify and differentiate antenna technology options to ensure optimal coverage in various deployment scenarios Describe RF power technology including, signal strength, how it is measured and why it is critical in designing wireless networks Learn to configure and optimize Aruba ARM and Client Match features Learn how to perform network monitoring functions and troubleshooting AR-AMF teaches knowledge, skills & practical exp. to set up & config a basic AR WLAN utilizing OS 8.X architecture & features.using lecture & labs,AR-AMF provides tech. & hands-on exp. of config. a single Mobility Master with 1 controller & AP WLAN WLAN Fundamentals Describes the fundamentals of 802.11, RF frequencies and channels Explain RF Patterns and coverage including SNR Roaming Standards and QOS requirements Mobile First Architecture An introduction to Aruba Products including controller types and modes OS 8.X Architecture and features License types and distribution Mobility Master Mobility Controller Configuration Understanding Groups and Subgroups Different methods to join MC with MM Understanding Hierarchical Configuration Secure WLAN configuration Identifying WLAN requirements such as SSID name, encryption, authentication Explain AP groups structure and profiles Configuration of WLAN using the Mobility Master GUI AP Provisioning Describes the communication between AP and Mobility controller Explain the AP booting sequence and requirements Explores the APs controller discovery mechanisms Explains how to secure AP to controller communication using CPSec Describes AP provisioning and operations WLAN Security Describes the 802.11 discovery, authentication and association Explores the various authentication methods, 802.1x with WPA/WPA2, Mac auth Describes the authentication server communication Explains symmetric vs asymmetric Keys, encryption methods WIPS is described along with rogue discovery and protection Firewall Roles and Policies An introduction into Firewall Roles and policies Explains Aruba?s Identity based Firewall Configuration of Policies and Rules including aliases Explains how to assign Roles to users Dynamic RF Management Explain how ARM calibrates the network selecting channels and power settings Explores the new OS 8.X Airmatch to calibrate the network How Client Match and Client Insight match steers clients to better Aps Dynamic RF Management Explain how ARM calibrates the network selecting channels and power settings Explores the new OS 8.X Airmatch to calibrate the network How Client Match and Client Insight match steers clients to better Aps Guest Access Introduces Aruba?s solutions for Guest Access and the Captive portal process Configuration of secure guest access using the internal Captive portal The configuration of Captive portal using Clearpass and its benefits Creating a guest provisioning account Troubleshooting guest access Network Monitoring and Troubleshooting Using the MM dashboard to monitor and diagnose client, WLAN and AP issues Traffic analysis using APPrf with filtering capabilities A view of Airwaves capabilities for monitoring and diagnosing client, WLAN and AP issues
Duration 5 Days 30 CPD hours This course is intended for This course is designed for persons aspiring to the Microsoft 365 Administrator role and have completed at least one of the Microsoft 365 role-based administrator certification paths. This course covers the following key elements of Microsoft 365 administration: Microsoft 365 tenant management, Microsoft 365 identity synchronization, and Microsoft 365 security and compliance. In Microsoft 365 tenant management, you learn how to configure your Microsoft 365 tenant, including your organizational profile, tenant subscription options, component services, user accounts and licenses, security groups, and administrative roles. You then transition to configuring Microsoft 365, with a primary focus on configuring Office client connectivity. Finally, you explore how to manage user-driven client installations of Microsoft 365 Apps for enterprise deployments. The course then transitions to an in-depth examination of Microsoft 365 identity synchronization, with a focus on Microsoft Entra Connect and Connect Cloud Sync. You learn how to plan for and implement each of these directory synchronization options, how to manage synchronized identities, and how to implement password management in Microsoft 365 using multifactor authentication and self-service password management. In Microsoft 365 security management, you begin examining the common types of threat vectors and data breaches facing organizations today. You then learn how Microsoft 365?s security solutions address each of these threats. You are introduced to the Microsoft Secure Score, as well as to Microsoft Entra ID Protection. You then learn how to manage the Microsoft 365 security services, including Exchange Online Protection, Safe Attachments, and Safe Links. Finally, you are introduced to the various reports that monitor an organization?s security health. You then transition from security services to threat intelligence; specifically, using Microsoft 365 Defender, Microsoft Defender for Cloud Apps, and Microsoft Defender for Endpoint. Once you have this understanding of Microsoft 365?s security suite, you then examine the key components of Microsoft 365 compliance management. This begins with an overview of all key aspects of data governance, including data archiving and retention, Microsoft Purview message encryption, and data loss prevention (DLP). You then delve deeper into archiving and retention, paying particular attention to Microsoft Purview insider risk management, information barriers, and DLP policies. You then examine how to implement these compliance features by using data classification and sensitivity labels. Prerequisites Completed a role-based administrator course such as Messaging, Teamwork, Security, Compliance, or Collaboration. A proficient understanding of DNS and basic functional experience with Microsoft 365 services. A proficient understanding of general IT practices. A working knowledge of PowerShell. 1 - Configure your Microsoft 365 experience Explore your Microsoft 365 cloud environment Configure your Microsoft 365 organizational profile Manage your tenant subscriptions in Microsoft 365 Integrate Microsoft 365 with customer engagement apps Complete your tenant configuration in Microsoft 365 2 - Manage users, licenses, and mail contacts in Microsoft 365 Determine the user identity model for your organization Create user accounts in Microsoft 365 Manage user account settings in Microsoft 365 Manage user licenses in Microsoft 365 Recover deleted user accounts in Microsoft 365 Perform bulk user maintenance in Microsoft Entra ID Create and manage guest users Create and manage mail contacts 3 - Manage groups in Microsoft 365 Examine groups in Microsoft 365 Create and manage groups in Microsoft 365 Create dynamic groups using Azure rule builder Create a Microsoft 365 group naming policy Create groups in Exchange Online and SharePoint Online 4 - Add a custom domain in Microsoft 365 Plan a custom domain for your Microsoft 365 deployment Plan the DNS zones for a custom domain Plan the DNS record requirements for a custom domain Create a custom domain in Microsoft 365 5 - Configure client connectivity to Microsoft 365 Examine how automatic client configuration works Explore the DNS records required for client configuration Configure Outlook clients Troubleshoot client connectivity 6 - Configure administrative roles in Microsoft 365 Explore the Microsoft 365 permission model Explore the Microsoft 365 admin roles Assign admin roles to users in Microsoft 365 Delegate admin roles to partners Manage permissions using administrative units in Microsoft Entra ID Elevate privileges using Microsoft Entra Privileged Identity Management Examine best practices when configuring administrative roles 7 - Manage tenant health and services in Microsoft 365 Monitor the health of your Microsoft 365 services Monitor tenant health using Microsoft 365 Adoption Score Monitor tenant health using Microsoft 365 usage analytics Develop an incident response plan Request assistance from Microsoft 8 - Deploy Microsoft 365 Apps for enterprise Explore Microsoft 365 Apps for enterprise functionality Explore your app compatibility by using the Readiness Toolkit Complete a self-service installation of Microsoft 365 Apps for enterprise Deploy Microsoft 365 Apps for enterprise with Microsoft Configuration Manager Deploy Microsoft 365 Apps for enterprise from the cloud Deploy Microsoft 365 Apps for enterprise from a local source Manage updates to Microsoft 365 Apps for enterprise Explore the update channels for Microsoft 365 Apps for enterprise Manage your cloud apps using the Microsoft 365 Apps admin center 9 - Analyze your Microsoft 365 workplace data using Microsoft Viva Insights Examine the analytical features of Microsoft Viva Insights Explore Personal insights Explore Team insights Explore Organization insights Explore Advanced insights 10 - Explore identity synchronization Examine identity models for Microsoft 365 Examine authentication options for the hybrid identity model Explore directory synchronization 11 - Prepare for identity synchronization to Microsoft 365 Plan your Microsoft Entra deployment Prepare for directory synchronization Choose your directory synchronization tool Plan for directory synchronization using Microsoft Entra Connect Plan for directory synchronization using Microsoft Entra Connect cloud sync 12 - Implement directory synchronization tools Configure Microsoft Entra Connect prerequisites Configure Microsoft Entra Connect Monitor synchronization services using Microsoft Entra Connect Health Configure Microsoft Entra Connect cloud sync prerequisites Configure Microsoft Entra Connect cloud sync 13 - Manage synchronized identities Manage users with directory synchronization Manage groups with directory synchronization Use Microsoft Entra Connect Sync Security Groups to help maintain directory synchronization Configure object filters for directory synchronization Explore Microsoft Identity Manager Troubleshoot directory synchronization 14 - Manage secure user access in Microsoft 365 Manage user passwords Enable pass-through authentication Enable multifactor authentication Enable passwordless sign-in with Microsoft Authenticator Explore self-service password management Explore Windows Hello for Business Implement Microsoft Entra Smart Lockout Implement conditional access policies Explore Security Defaults in Microsoft Entra ID Investigate authentication issues using sign-in logs 15 - Examine threat vectors and data breaches Explore today's work and threat landscape Examine how phishing retrieves sensitive information Examine how spoofing deceives users and compromises data security Compare spam and malware Examine account breaches Examine elevation of privilege attacks Examine how data exfiltration moves data out of your tenant Examine how attackers delete data from your tenant Examine how data spillage exposes data outside your tenant Examine other types of attacks 16 - Explore the Zero Trust security model Examine the principles and components of the Zero Trust model Plan for a Zero Trust security model in your organization Examine Microsoft's strategy for Zero Trust networking Adopt a Zero Trust approach 17 - Explore security solutions in Microsoft 365 Defender Enhance your email security using Exchange Online Protection and Microsoft Defender for Office 365 Protect your organization's identities using Microsoft Defender for Identity Protect your enterprise network against advanced threats using Microsoft Defender for Endpoint Protect against cyber attacks using Microsoft 365 Threat Intelligence Provide insight into suspicious activity using Microsoft Cloud App Security Review the security reports in Microsoft 365 Defender 18 - Examine Microsoft Secure Score Explore Microsoft Secure Score Assess your security posture with Microsoft Secure Score Improve your secure score Track your Microsoft Secure Score history and meet your goals 19 - Examine Privileged Identity Management Explore Privileged Identity Management in Microsoft Entra ID Configure Privileged Identity Management Audit Privileged Identity Management Control privileged admin tasks using Privileged Access Management 20 - Examine Azure Identity Protection Explore Azure Identity Protection Enable the default protection policies in Azure Identity Protection Explore the vulnerabilities and risk events detected by Azure Identity Protection Plan your identity investigation 21 - Examine Exchange Online Protection Examine the anti-malware pipeline Detect messages with spam or malware using Zero-hour auto purge Explore anti-spoofing protection provided by Exchange Online Protection Explore other anti-spoofing protection Examine outbound spam filtering 22 - Examine Microsoft Defender for Office 365 Climb the security ladder from EOP to Microsoft Defender for Office 365 Expand EOP protections by using Safe Attachments and Safe Links Manage spoofed intelligence Configure outbound spam filtering policies Unblock users from sending email 23 - Manage Safe Attachments Protect users from malicious attachments by using Safe Attachments Create Safe Attachment policies using Microsoft Defender for Office 365 Create Safe Attachments policies using PowerShell Modify an existing Safe Attachments policy Create a transport rule to bypass a Safe Attachments policy Examine the end-user experience with Safe Attachments 24 - Manage Safe Links Protect users from malicious URLs by using Safe Links Create Safe Links policies using Microsoft 365 Defender Create Safe Links policies using PowerShell Modify an existing Safe Links policy Create a transport rule to bypass a Safe Links policy Examine the end-user experience with Safe Links 25 - Explore threat intelligence in Microsoft 365 Defender Explore Microsoft Intelligent Security Graph Explore alert policies in Microsoft 365 Run automated investigations and responses Explore threat hunting with Microsoft Threat Protection Explore advanced threat hunting in Microsoft 365 Defender Explore threat analytics in Microsoft 365 Identify threat issues using Microsoft Defender reports 26 - Implement app protection by using Microsoft Defender for Cloud Apps Explore Microsoft Defender Cloud Apps Deploy Microsoft Defender for Cloud Apps Configure file policies in Microsoft Defender for Cloud Apps Manage and respond to alerts in Microsoft Defender for Cloud Apps Configure Cloud Discovery in Microsoft Defender for Cloud Apps Troubleshoot Cloud Discovery in Microsoft Defender for Cloud Apps 27 - Implement endpoint protection by using Microsoft Defender for Endpoint Explore Microsoft Defender for Endpoint Configure Microsoft Defender for Endpoint in Microsoft Intune Onboard devices in Microsoft Defender for Endpoint Manage endpoint vulnerabilities with Microsoft Defender Vulnerability Management Manage device discovery and vulnerability assessment Reduce your threat and vulnerability exposure 28 - Implement threat protection by using Microsoft Defender for Office 365 Explore the Microsoft Defender for Office 365 protection stack Investigate security attacks by using Threat Explorer Identify cybersecurity issues by using Threat Trackers Prepare for attacks with Attack simulation training 29 - Examine data governance solutions in Microsoft Purview Explore data governance and compliance in Microsoft Purview Protect sensitive data with Microsoft Purview Information Protection Govern organizational data using Microsoft Purview Data Lifecycle Management Minimize internal risks with Microsoft Purview Insider Risk Management Explore Microsoft Purview eDiscovery solutions 30 - Explore archiving and records management in Microsoft 365 Explore archive mailboxes in Microsoft 365 Enable archive mailboxes in Microsoft 365 Explore Microsoft Purview Records Management Implement Microsoft Purview Records Management Restore deleted data in Exchange Online Restore deleted data in SharePoint Online 31 - Explore retention in Microsoft 365 Explore retention by using retention policies and retention labels Compare capabilities in retention policies and retention labels Define the scope of a retention policy Examine the principles of retention Implement retention using retention policies, retention labels, and eDiscovery holds Restrict retention changes by using Preservation Lock 32 - Explore Microsoft Purview Message Encryption Examine Microsoft Purview Message Encryption Configure Microsoft Purview Message Encryption Define mail flow rules to encrypt email messages Add organizational branding to encrypted email messages Explore Microsoft Purview Advanced Message Encryption 33 - Explore compliance in Microsoft 365 Plan for security and compliance in Microsoft 365 Plan your beginning compliance tasks in Microsoft Purview Manage your compliance requirements with Compliance Manager Examine the Compliance Manager dashboard Analyze the Microsoft Compliance score 34 - Implement Microsoft Purview Insider Risk Management Explore insider risk management Plan for insider risk management Explore insider risk management policies Create insider risk management policies Investigate insider risk management activities and alerts Explore insider risk management cases 35 - Implement Microsoft Purview Information Barriers Explore Microsoft Purview Information Barriers Configure information barriers in Microsoft Purview Examine information barriers in Microsoft Teams Examine information barriers in OneDrive Examine information barriers in SharePoint 36 - Explore Microsoft Purview Data Loss Prevention Examine Data Loss Prevention Explore Endpoint data loss prevention Examine DLP policies View DLP policy results Explore DLP reports 37 - Implement Microsoft Purview Data Loss Prevention Plan to implement Microsoft Purview Data Loss Protection Implement Microsoft Purview's default DLP policies Design a custom DLP policy Create a custom DLP policy from a template Configure email notifications for DLP policies Configure policy tips for DLP policies 38 - Implement data classification of sensitive information Explore data classification Implement data classification in Microsoft 365 Explore trainable classifiers Create and retrain a trainable classifier View sensitive data using Content explorer and Activity explorer Detect sensitive information documents using Document Fingerprinting 39 - Explore sensitivity labels Manage data protection using sensitivity labels Explore what sensitivity labels can do Determine a sensitivity label's scope Apply sensitivity labels automatically Explore sensitivity label policies 40 - Implement sensitivity labels Plan your deployment strategy for sensitivity labels Examine the requirements to create a sensitivity label Create sensitivity labels Publish sensitivity labels Remove and delete sensitivity labels Additional course details: Nexus Humans MS-102T00: Microsoft 365 Administrator training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the MS-102T00: Microsoft 365 Administrator course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Entry- to mid-level network engineers Network administrators Network support technicians Help desk technicians Overview After taking this training, you should be able to: Illustrate the hierarchical network design model and architecture using the access, distribution, and core layers Compare and contrast the various hardware and software switching mechanisms and operation while defining the Ternary Content Addressable Memory (TCAM) and Content Addressable Memory (CAM) along with process switching, fast switching, and Cisco Express Forwarding concepts Troubleshoot Layer 2 connectivity using VLANs and trunking Implement redundant switched networks using Spanning Tree Protocol Troubleshoot link aggregation using Etherchannel Describe the features, metrics, and path selection concepts of Enhanced Interior Gateway Routing Protocol (EIGRP) Implement and optimize Open Shortest Path First (OSPF)v2 and OSPFv3, including adjacencies, packet types and areas, summarization, and route filtering for IPv4 and IPv6 Implement External Border Gateway Protocol (EBGP) interdomain routing, path selection, and single and dual-homed networking Implement network redundancy using protocols such as Hot Standby Routing Protocol (HSRP) and Virtual Router Redundancy Protocol (VRRP) Implement internet connectivity within Enterprise using static and dynamic Network Address Translation (NAT) Describe the virtualization technology of servers, switches, and the various network devices and components Implement overlay technologies such as Virtual Routing and Forwarding (VRF), Generic Routing Encapsulation (GRE), VPN, and Location Identifier Separation Protocol (LISP) Describe the components and concepts of wireless networking, including Radio Frequency (RF) and antenna characteristics, and define the specific wireless standards Describe the various wireless deployment models available, including autonomous Access Point (AP) deployments and cloud-based designs within the centralized Cisco Wireless LAN Controller (WLC) architecture Describe wireless roaming and location services The Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR) v1.3 training gives you the knowledge and skills needed to install, configure, operate, and troubleshoot an enterprise network and introduces you to overlay network design by using SD-Access and SD-WAN solutions. You?ll also learn to understand and implement security principles and automation and programmability within an enterprise network. Course Outline Examining Cisco Enterprise Network Architecture Exploring Cisco Switching Paths Implementing Campus LAN Connectivity Building Redundant Switched Topology Implementing Layer 2 Port Aggregation Understanding EIGRP Implementing OSPF Optimizing OSPF Exploring EBGP Implementing Network Redundancy Implementing NAT Introducing Virtualization Protocols and Techniques Understanding Virtual Private Networks and Interfaces Understanding Wireless Principles Examining Wireless Deployment Options Understanding Wireless Roaming and Location Services Examining Wireless AP Operation Implementing Wireless Client Authentication Troubleshooting Wireless Client Connectivity Implementing Network Services Using Network Analysis Tools Implementing Infrastructure Security Implementing Secure Access Control Discovering the Basics of Python Programming Discovering Network Programmability Protocols Implementing Layer 2 Port Aggregation Discovering Multicast Protocols Understanding QoS Exploring Enterprise Network Security Architecture Exploring Automation and Assurance Using Cisco DNA Center Examining the Cisco SD-Access Solution Understanding the Working Principles of the Cisco SD-WAN Solution
Duration 5 Days 30 CPD hours This course is intended for Practiced Linux system administrators who currently manage Linux servers at the enterprise level - Skilled Linux system administrators who who want or are required to demonstrate competencies by earning the RHCSA This course is designed for experienced Linux System Administrators who want to harden their technical skill sets and become accredited with the RHCSA certification. Accessing the command line Log in to a Linux system and run simple commands using the shell. Managing Files from the command line Work with files from the bash shell prompt. Managing local Linux users and groups Manage Linux users and groups and administer local password policies. Controlling access to files with Linux file system permissions Set access permissions on files and interpret the security effects of different permission settings. Managing SELinux security Use SELinux to manage access to files and interpret and troubleshoot SELinux security effects. Monitoring and managing Linux processes Monitor and control processes running on the system. Installing and updating software packages Download, install, update, and manage software packages from Red Hat and yum package repositories. Controlling services and daemons Control and monitor network services and system daemons using systemd. Managing Red Hat Enterprise Linux networking Configure basic IPv4 networking on Red Hat Enterprise Linux systems. Analyzing and storing logs Locate and interpret relevant system log files for troubleshooting purposes. Managing storage and file systems Create and use disk partitions, logical volumes, file systems, and swap spaces. Scheduling system tasks Schedule recurring system tasks using cron and systemd timer units. Mounting network file systems Mount network file system (NFS) exports and server message block (SMB) shares from network file servers. Limiting network communication with firewalld Configure a basic local firewall. Additional course details: Nexus Humans Enterprise Linux System Admin Fast Track with Exam Prep training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Enterprise Linux System Admin Fast Track with Exam Prep course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Course Information Our comprehensive course is used as a gateway to those stepping into the world of auditing clinical studies. Tailored for those already acquainted with Good Clinical Practice (GCP) and those transitioning from other audit disciplines, this programme stands as a pivotal guide. Pre-existing knowledge of GCP will significantly enhance your learning experience in auditing against these guidelines. How is this course run? Engage in immersive workshops providing hands-on practice with auditing techniques in a GCP context. Our seasoned tutors, boasting extensive audit experience, intertwine theory with practical insights drawn from their own professional journeys. What will I learn? A comprehensive understanding of the historical backdrop and objectives driving Good Clinical Practice, incorporating the latest industry developments Solid grounding in quality assurance activities aligned with regulatory standards Insight into potential pitfalls within clinical trials and the pivotal role of auditors in addressing these issues Clarity on the roles and responsibilities inherent to clinical trials auditing Exposure to a diverse range of audit techniques complemented by illustrative examples and supportive documents A nuanced understanding of regulatory inspectors' activities Expanded professional networks to propel your auditing career forward. Benefits include: A clear understanding of the role of the auditor under Good Clinical Practice improved audits Improved Good Clinical Practice compliance for your clinical trials. This course is structured to encourage delegates to: Discuss and develop ideas Solve specific problems Examine particular aspects of Good Clinical Practice. Tutors Tutors will be comprised of (click the photos for biographies): Rosemarie Corrigan EVP Global Quality, Worldwide Clinical Trials Cathy Dove Director and Owner, Dove Quality Solutions Julie Kelly Associate Director, Clinical Quality Assurance, Corcept Therapeutics Susana Tavares Director of Research Quality Assurance, - Programme Please note timings may be subject to alteration. Day 1 12:30 Registration 13:00 Welcome and Objectives for the first day of the course 13:30 Laying the Foundations Introduction to the clinical development process, the concepts of quality assurance, quality control and audit. 14:30 Break 15:00 Patient Protection Requirements for informed consent and ethics committee. Access to source documentation. Including a patient protection exercise. 16:05 Workshop 1 - Case Study on Informed Consent 16:45 End of Day Questions and Answers 17:00 Close of Day Day 2 08:50 Questions and Answers from Day 1 09:00 Effective Site Audits The procedures involved in selecting and setting up audits at investigator sites. 09:40 Workshop 1 - Planning the Effective Audit 10:30 Break 10:45 Source Data Verification The need for and purpose of verifying data. 11:25 Workshop 2 - Source Data Verification 12:30 Lunch 13:30 IMP Management The requirements surrounding the distribution of investigational medicinal products. Accountability from release to destruction. 14:15 Critical Document Audits The conduct of other study specific audits including protocols, databases and reports. 15:00 Break 15:15 Non-compliance Determining the acceptability of data. 16:00 Fraud - Fact or Fiction? How to identify fraud and its consequences 16:45 End of Day Questions and Answers 17:00 Close of Day Day 3 08:50 Questions and Answers from Days 1 and 2 09:00 Auditing Third Parties A review of audits of contract research organisations. 10:00 System Audits The concept of auditing processes across many clinical trials, including a practical exercise in process mapping. 10:45 Break 11:00 Workshop 3 - Process Mapping 11:45 Effective Audits Where theory meets reality. 12:30 Lunch 13:20 Audit Reports - Closing the Loop An examination of the processes which follow the evidence gathering phase of the audit. 14:20 Workshop 4 - Audit Reports Audit reports, corrective and preventive action. 15:00 Break 15:10 Regulatory Inspection Auditors and regulatory inspections -how the QA team can help the organisation to perform during a regulatory inspection. 15:55 Final Questions and Answers 16:10 Close of Course Extra Information Face-to-face course Course Material Course material will be available in PDF format for delegates attending this course. The advantages of this include: Ability for delegates to keep material on a mobile device Ability to review material at any time pre and post course Environmental benefits – less paper being used per course. The material will be emailed in advance of the course and RQA will not be providing any printed copies of the course notes during the training itself. Delegates wishing to have a hard copy of the notes should print these in advance to bring with them. Alternatively delegates are welcome to bring along their own portable devices to view the material during the training sessions. Remote course Course Material This course will be run completely online. You will receive an email with a link to our online system, which will house your licensed course materials and access to the remote event. Please note this course will run in UK timezone. The advantages of this include: Ability for delegates to keep material on a mobile device Ability to review material at any time pre and post course Environmental benefits – less paper being used per course Access to an online course group to enhance networking. You will need a stable internet connection, a microphone and a webcam. CPD Points 17 Points Development Level Develop
Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course is as follows: IT Solution Architects Network Security Architects Networking Admin and Operations Networking Field Engineers In this workshop you will learn why we are implementing Assurance, and what does looks like and key features. We will also discuss the Cisco DNA center appliance and workflow and tasks associated with an implementation. Module 1: Introduction to Cisco DNA Center Assurance Introduction to DNA Center System Architecture Key Features and Use Cases Introduction to Cisco ISE and DNAC-ISE integration Module 2: Design Network design options Sites Creating Enterprise and Sites Hierarchy Configuring General Network Settings Loading maps into the GUI IP Address Management Software Image Management ? Lab on Day 5 Network Device Profiles AAA SNMP Syslog IP address pools Creating Enterprise and Guest SSIDs ? Lab on Day 2 Creating the wireless RF Profile Cresting the Guest Portal for the Guest SSIDs Network profiles ? Lab on Day 2 Authentication templates Module 3: Discovery and Provision Device Discovery and Protocols Devices Onboarding Assigning Devices to a site Provisioning device with profiles Plug and Play Templates Templates for Day-0 Templates for Day-N operations Module 4: Monitoring Device, Client, and Application Health DNAC Telemetry Monitoring Network Device Health and Performance Monitoring Wired and Wireless Client Health and Performance Monitoring Application Health and Performance Module 5: Application Visibility and DNAC Integration with Umbrella Monitoring Application Visibility in DNA Center Umbrella Introduction DNA Center Umbrella Integration and Use Cases Module 6: Troubleshooting Issues, Observing Insights and Trends Detect Issues, Insights, and Trends in the Network DNA Center Integration with other tools for Monitoring and Management Module 7: Troubleshooting using Cisco DNA Center Assurance Tools DNAC Assurance Troubleshooting Tools Using Sensor Tests Using Intelligent Capture Spectrum Analysis Module 8: DNAC and Thousand Eyes Introduction to ThousandEyes ThousandEyes Use Cases DNA Center and ThousandEyes Integration Module 9: AI Analytics and Machine Learning in DNA Center Overview of AI Analytics and ML (Machine Learning) DNA Center AI and ML Use Cases Module 10: DNA Center Maintenance DNA Center Reports DNA Center Backup and Restore
Course Information This highly interactive course will provide guidance on why and how to implement a quality system successfully into the research laboratory. By doing so, you will position your innovation for the success it deserves. But leave things as they are and there is a good chance that your science will not realise its full potential should success, and its consequences, come your way. A quality system in your research laboratory is the most effective and efficient way to: Help scientists work more efficiently Ensure discoveries can be defended Protect the value of intellectual property. This course is particularly aimed at those working in early phase research environments which are not constrained by the regulatory requirements of the Good Practice regulations but are producing intellectual property, testing and/or products for the therapeutic market. For organisational reasons, rather than regulatory ones, this is a place where you need to get it right. The programme is delivered by leaders in the field who, quite simply, ‘have done it’. Whether delegates are at senior management level seeking strategic direction, a laboratory head wishing to deliver science that will stand the test of time or a quality professional thrown in at the deep end, this course will provide key insight and practical guidance to underpin future success. Based on risk based systems, tried and tested over many years in the workplace, the programme will help delegates to define, train, implement and monitor the quality of their research, irrespective of field or discipline. Delegates will learn how to help position their organisation for success. Course content: Delegates will be guided thoughtfully through each key component of the process in a stimulating learning environment. The course probes all avenues of the research quality arena, from an initial understanding of the cultural aspects of the scientific discovery environment, to managing quality in outsourced research programmes. Computer systems and e-data security in the research environment will be discussed and pragmatic solutions described to help manage the ballooning cloud of e-data. In addition, the ever blurring boundary between the regulated and non-regulated research environments will be discussed and delegates given perspective on future developments in the field. With this knowledge, delegates will be able to get it ‘right first time’. Is this course for you? The course is designed for all those involved in the research laboratory quality arena and it has been tailored to meet the needs of scientific management, bench scientists and quality professionals alike. Delegates get immediate access to highly experienced tutors who will share their wisdom and insights in an area where few others have been successful. The course is linked with the RQA guidance which builds on years of experience and forms the foundation of the programme. Tutors Tutors will be comprised of (click the photos for biographies): Louise Handy Director, Handy Consulting Ltd Sandrine Bongiovanni Associate Director in Research and Quality Compliance, Novartis Programme Please note timings may be subject to alteration. Day 1 09:00 Registration 09:10 Welcome and Introductions 09:20 History and Overview of the Field Examples of business and regulatory risks and the consequences of low quality in research. A look at the standards and guidelines that exist. 10:00 The Culture, the Politics and the Scientist's Perspective Understanding research environments, the drivers and the challenges. 10:30 Break 10:45 Workshop - Risk Management Thinking about risk management and prioritisation. Looking at the critical factors for the implementations of a successful quality system. 12:15 Workshop - Feedback 12:45 Lunch 13:45 Personnel, Plans, Procedures, Facilities, Equipment, Materials and Reagents Looking at planning the work, defining procedures in a way which promotes robust science without compromising brilliance and ensuring that all these elements are demonstrably fit for their intended purpose. 14:30 Workshop - Assay Validation How much validation is required at what stage? What do we need to validate an assay? 15:00 Workshop - Feedback 15:15 Research, Work Records, Archives and Research Review Data and records which are accurate, attributable, legally attestable and safe to permit reconstruction experiments and studies. Looking at aspects of the work where there is a chance to review, correct or improve the science, the data and the processes. 16:15 Continual Improvement and Quality Systems Reviewing implementation of a quality system, finding opportunities for improvement, understanding culture change. 16:45 Questions and Answers 17:00 Close of Course Extra Information Course Material This course will be run completely online. You will receive an email with a link to our online system, which will house your licensed course materials and access to the remote event. Please note this course will run in UK timezone. The advantages of this include: Ability for delegates to keep material on a mobile device Ability to review material at any time pre and post course Environmental benefits – less paper being used per course Access to an online course group to enhance networking. You will need a stable internet connection, a microphone and a webcam. CPD Points 7 Points Development Level Develop
Duration 5 Days 30 CPD hours This course is intended for This course will help you: Configure, troubleshoot, and manage enterprise wired and wireless networks Implement security principles within an enterprise network Overview Upon completing this course, students will be able to meet these objectives: Illustrate the hierarchical network design model and architecture using the access, distribution, and core layers. Compare and contrast the various hardware and software switching mechanisms and operation, while defining the TCAM and CAM, along with process switching, fast switching, and Cisco Express Forwarding concepts. Troubleshoot layer 2 connectivity using VLANs, trunking. Implementation of redundant switched networks using spanning tree protocol. Troubleshooting link aggregation using Etherchannel. Describe the features, metrics, and path selection concepts of EIGRP. Implementation and optimization of OSPFv2 and OSPFv3, including adjacencies, packet types, and areas, summarization and route filtering for IPv4 and IPv6. Implementing EBGP interdomain routing, path selection and single and dual-homed networking. Implementing network redundacy using protocols like HSRP and VRRP. Implementing internet connectivity within Enterprise using static and dynamic NAT. Describe the virtualization technology of servers, switches, and the various network devices and components. Implementing overlay technologies like VRF, GRE, VPN and LISP. Describe the components and concepts of wireless networking including RF, antenna characteristics, and define the specific wireless standards. Describe the various wireless deployment models available, include autonomous AP deployments and cloud-based designs within the centralized Cisco WLC architecture. Describe wireless roaming and location services. Describe how APs communicate with WLCs to obtain software, configurations, and centralized management. Configure and verify EAP, WebAuth, and PSK wireless client authentication on a WLC. Troubleshoot wireless client connectivity issues using various tools available. Troubleshooting Enterprise networks using services like NTP, SNMP , Cisco IOS IP SLAs, NetFlow and Cisco IOS Embedded Event Manager. Explain the use of available network analysis and troubleshooting tools, which include show and debug commands, as well as best practices in troubleshooting The Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR) v1.2 course provides the knowledge and skills needed to configure, troubleshoot, and manage enterprise wired and wireless networks. You?ll learn to implement security principles within an enterprise network and how to overlay network design by using solutions such as SD-Access and SD-WAN Course Outline Examining Cisco Enterprise Network Architecture Understanding Cisco Switching Paths Implementing Campus Lan Connectivity Building Redundant Switched Topology Implementing Layer 2 Port Aggregation Understanding EIGRP Implementing OSPF Optimizing OSPF Exploring EBGP Implementing Network Redundancy Implementing NAT Introducing Virtualization Protocols And Techniques Understanding Virtual Private Networks And Interfaces Understanding Wireless Principles Examining Wireless Deployment Options Understanding Wireless Roaming And Location Services Examining Wireless AP Operation Understanding Wireless Client Authentication Troubleshooting Wireless Client Connectivity Introducing Multicast Protocols Introducing QoS Implementing Network Services Using Network Analysis Tools Implementing Infrastructure Security Implementing Secure Access Control Understanding Enterprise Network Security Architecture Exploring Automation and Assurance Using Cisco DNA Center Examining the Cisco SD-Access Solution Understanding the Working Principles of the Cisco SD-WAN Solution Understanding the Basics of Python Programming Introducing Network Programmability Protocols Introducing APIs in Cisco DNA Center and vManage
Duration 3 Days 18 CPD hours This course is intended for Experienced system administrators and network administrators Network and security professionals who work with enterprise and data center networks Overview By the end of the course, you should be able to meet the following objectives: Contrast NSX-T Data Center and NSX Data Center for vSphere architectures Understand the networking and security features of NSX-T Data Center Compare end-to-end and lift-and-shift migration approaches Identify common fixed network topologies supported in end-to-end migrations Perform end-to-end migrations for fixed and user-defined topologies Describe other migration modes supported by the migration coordinator Describe lift-and-shift migration techniques Troubleshoot common problems with end-to-end and lift-and-shift migrations Describe the steps to perform a cross-vCenter NSX to NSX Federation migration This three-day, hands-on training course provides you with the skills, techniques, and tools required to successfully migrate your current VMware NSX© Data Center for vSphere© environment to VMware NSX-T? Data Center. You will learn to choose between different migration approaches and how to perform the type of migration that best suits your current environment. In addition, you are presented with common migration problems and resolutions. Course Introduction Introduction and course logistics Course objectives Introduction to NSX-T Data Center Describe the motivation for migrating to NSX-T Data Center Contrast NSX-T Data Center and NSX Data Center for vSphere architectures Describe the logical switching components in NSX-T Data Center Describe the components and functions of NSX-T Data Center logical routing Describe the security features of NSX-T Data Center Explain the implementation of networking services in NSX-T Data Center Migration Approaches Describe the end-to-end migration approach Describe the lift-and-shift migration approach Compare the migration approaches Determine the best migration strategy based on customer requirements Fixed Topologies for Migration Identify the NSX Data Center for vSphere fixed network topologies that can be migrated to NSX-T Data Center without a user-defined topology Explain how network and security objects from the fixed topologies are translated from NSX Data Centerfor vSphere to NSX-T Data Center End-to-End Migration Describe the prerequisites for end-to-end migration Prepare the NSX Data Center for vSphere environment for migration Prepare the NSX-T Data Center environment for migration Migrate the NSX Data Center for vSphere environment with the migration coordinator using a fixed topology Migrate the NSX Data Center for vSphere environment with the migration coordinator using a user-defined topology Perform postmigration tasks Other Migration Modes Describe the steps to migrate NSX Data Center for vSphere when integrated with VMware vRealize Automation Describe the Edge Cutover migration mode Describe the Distributed Firewall migration mode Describe the Distributed Firewall, Host, and Workload migration mode Describe the vSphere Networking migration feature Lift-and-Shift Migration Describe the prerequisites for lift-and-shift migrations Configure L2 bridging in preparation for lift-and-shift migrations Migrate the network and security configuration Migrate workloads Describe the DFW-only migration mode Troubleshooting Migrations Troubleshoot migration problems Identify the log files used in troubleshooting Identify and resolve common issues related to migrations. Cross-vCenter NSX to NSX Federation Migration Contrast cross-vCenter NSX and NSX Federation architectures Describe the steps for a multisite migration Demonstrate how to perform a cross-vCenter NSX to NSX Federation migration Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Migration from VMware NSX for vSphere to NSX-T training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Migration from VMware NSX for vSphere to NSX-T course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Course Information This course aims to empower you with the expertise to proficiently navigate process mapping and master the art of crafting Standard Operating Procedures (SOPs) within regulated environments. Whether you're engaged in activities that demand process improvement, continual enhancement, or SOP creation, this course offers invaluable insights tailored to your needs. It caters to individuals tasked with managing, documenting, and implementing processes and SOPs, irrespective of prior experience or skills. Our curriculum does not focus on specific software or approaches, focusing instead on fundamental principles and adaptable concepts applicable across diverse organisational landscapes. Benefits include: Hands-on experience in mapping processes An understanding of how process maps can be used to define, communicate and continually improve complex processes An understanding of best practice for SOPs using of process maps/process flow diagrams and process mind maps to complement text An insight into the preparation of concise and user friendly SOPs. This course is structured to encourage delegates to: Discuss and develop ideas Develop a practical approach for creating process maps and writing SOPs Understand how to use process maps in SOPs effectively Discuss how process mapping for preparing SOPs can be applied to process improvement for SOPs. Is this course for you? The course is designed for all those with responsibility for managing, documenting and implementing processes and SOPs. It assumes no prior experience or skills. The course does not recommend any specific software or approach, but explores the principles and ideas that can be applied in any organisation. What will you learn? Hands-on experience in mapping processes An understanding of how process maps can be used to define, communicate and continually improve complex processes An understanding of best practice for SOPs using of process maps/process flow diagrams and process mind maps to complement text An insight into the preparation of concise and user friendly SOPs. By the end of the course you will be able to: Create process maps and write clearer more concise SOPs Understand how to use process maps in SOPs effectively Understand how process mapping can be applied to process improvement and better SOPs. Tutors Tutors will be comprised of (click the photos for biographies): Laura Brown Director, Laura Brown Training and Development David Butler VP of Quality, Resolian Programme Please note timings may be subject to alteration. Day 1 09:00 Welcome, Introductions and Course Objectives Why Companies manage by process. 10:00 Exercise 1 - First Steps Mechanisms for process mapping, levels at which it can be applied, and the roles and responsibilities of process owners. 10:30 Exercise 1 - Feedback 10:45 Break 11:00 Mapping Processes The stages involved in mapping processes including how to construct a SIPOC chart. 11:45 Exercise 2 - Mapping A Process A first opportunity to practice your new process mapping skills. 12:30 Exercise 2 - Feedback 13:00 Lunch 14:00 Exercise 3 - Discussion of Options for Format, Structure and Layout What Makes A Good SOP? Discussion of options for format, structure, level of detail of SOPs and the use of process maps for SOP writing. A case study example of a good SOP which uses a flow chart/process map. 14:45 Exercise 3 - Feedback 15:00 Break 15:15 A Case Study example of a good SOP that uses a flow chart / process map 15:30 Exercise 4 Discussion of the content of an SOP using a Process Map 15:35 Exercise 4 - Feedback 15:45 Key Writing Considerations 16:15 Exercise 5 16:45 Exercise 5 - Feedback 17:00 Close of Day Day 2 09:00 Review of Day 1 09:15 Using Metrics Selecting and using metrics to monitor and improve processes. 10:00 Exercise 6 - Practice in Process Mapping Creating Process Maps from multi-source information. 11:00 Break 11:15 Exercise 6 - Feedback 11:45 Common Pitfalls Common problems and tips for good Process Mapping. 12:15 Demonstration of Process Mapping on a PC 12:45 Lunch 13:30 Exercise 7 - Mind Mapping 14:30 Exercise 7 - Feedback 15:00 Break 15:15 Exercise 8 - Using Process Maps to Write an SOP Applying your process mapping skills as part of writing an SOP 15:30 Exercise 8 - Feedback 15:45 Course Review and Follow-up 16:00 Close of Course Extra Information Face-to-face course Course Material Course material will be available in PDF format for delegates attending this course. The advantages of this include: Ability for delegates to keep material on a mobile device Ability to review material at any time pre and post course Environmental benefits – less paper being used per course. The material will be emailed in advance of the course and RQA will not be providing any printed copies of the course notes during the training itself. Delegates wishing to have a hard copy of the notes should print these in advance to bring with them. Alternatively delegates are welcome to bring along their own portable devices to view the material during the training sessions. Remote course Course Material This course will be run completely online. You will receive an email with a link to our online system, which will house your licensed course materials and access to the remote event. Please note this course will run in UK timezone. The advantages of this include: Ability for delegates to keep material on a mobile device Ability to review material at any time pre and post course Environmental benefits – less paper being used per course Access to an online course group to enhance networking. You will need a stable internet connection, a microphone and a webcam. Development Level Learn