• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

89 Educators providing Object courses delivered Online

Stream2stream

stream2stream

Birmingham

We are a leading software development house involved in the OO mentoring sphere. Our aim is to develop software applications with you not for you. The team have a wealth of knowledge in OO software development using C++, Java, Delphi, CORBA, J2EE, EJBs, COM, UML and numerous database technologies such Oracle, Sybase, SQL Server and Interbase. We are run by technology gurus for none technology gurus who need unbiased views and objective strategies for their companies future software developments. We can boast an unprecedented 11 years of object oriented software development experience. Our team have worked with IBM, BP, British Airways, CTS, the Government, City banks, Primary Insurance companies and London Underground. Our team can bring architectural, business analysis, mentoring and software development skills to your company in a selective manner. stream2stream are currently engaged in developing streaming software applications for the growing mobile multimedia market. We expect to see fascinating products in the market by the end of 2003. Building Applications with you, not for you! Our world as we know it and understand it is changing at an ever increasing pace. There seems to be no end in sight to the learning that one has to do to be sure that the applications produced today will stand the trials of customers and time. A university professor once stated "that if you are learning computer science with the intention of graduating and then that's it, think again! You will be a part-time student forever". The requirements that are been driven down from clients to the suppliers of software systems are becoming more and more complex as we the purveyors of IT systems present more and more fascinating technology and our users/clients capture the vision of how these technologies can be used in their lives and corporations. stream2stream is here to help you build the applications of tomorrow. We are not a software house that you can outsource your work out to. We are not a training company concerned only with delivering high quality detailed training with no after-train support or consolidation. We are not a body shop supplying developers who will cut code and then run the fastest sprint ever seen. We are not consultants whose only intention is to give you the feel good factor even though time-scales and budgets have been breached! We are your conscious of bringing to you · Software development at your side. We work with you transferring the knowledge we have to your teams. We have been mentoring software developers and companies for the last four years guaranteeing that the systems that are built are scalable, maintainable, flexible and stable. · High quality training in UML, Architectures and Java. We don't just train you in these technologies, but we work with you in using these tools, transferring our knowledge and experience to your teams. · Professional software developers not hackers. They are all trained UML advocates, ensuring that all tasks are captured in document form. Each developer can confidently transfer the knowledge that they acquired and implemented to any of your teams through mentoring. · OO Mentoring. This means that you get the full development life cycle support. From the moment your project begins right through to deployment and then maintenance, we are there supporting you. Changes in technology will be brought to you as we become aware that the technology has become stable. Why continue developing software the way you have done. Join the technological revolution. Determine your future by creating it with us To see how we can further your software development projects contact us for more information

Clear View Training & Consultancy

clear view training & consultancy

London

We specialize in consultancy and training in OO analysis and design, UML modelling, BPMN, Metadata Management, Model Driven Architecture (MDA), requirements engineering and software engineering process design and implementation. New book - Interactive Computational Geometry in Python! Interactive Computational Geometry in Python, is now released. Click on the link in the sidebar for information and preview chapters. This book is an updated and expanded version of our popular “Interactive Computational Geometry - a taxonomic approach” ported from Mathematica to Python. It has some very useful extra material and greatly improved demonstrations and text. If you are not an experienced Mathematica programmer, you will find the Python code is much easier to undestand. In fact, when we made the port, we were delighted by just how simple and elegant the Python code turned out to be. We will no longer update the Mathematica version (although it will always remain available) and we consider “Interactive Computational Geometry in Python” to now be the definitive version of the text. Python is a great language for this sort of thing, and we hope and expect that moving to Python will make the book accessible to a much wider audience. We are very excited about this book! We have developed a complete process, including software, for creating long-form texts as interactive Jupyter notebooks and this book is the first result of our efforts. If you need help writing your own book in Jupyter, or just need help working with notebooks, please contact us for training and consultancy. Books Jim and Ila are authors of several best selling books on UML, BPMN and Model Driven Architecture. Our latest modeling book is “Secrets of Analysis”. This describes an approach to object oriented analysis called Generative Analysis. It tells you how to take unstructured, informal information, and, through a well-defined process of transformation, produce precise, structured information and ultimately UML models. If you ever wanted to learn the secrets of how experts perform great analysis and produce great UML analysis models, then this book is for you! We expect it will help re-establish OOA as a key discipline for the UML modeller/Business Analyst. Fed up with semantically weak user stories? Want to put some rigour back into your analysis process? This is the answer. Also be sure to check out our “Introduction to BPMN 2”. We believe that this is the first interactive modeling textbook ever produced. It is an enhanced ebook with animations and interactive figures for the iPad and Mac. Animations show you precisely how the various BPMN modeling element work. The interactive edition is available in Apple iBook Store. It is also available in a non interactive PDF version for all other readers from Amazon. Bespoke technical authoring We can help you author interactive texts in: - Apple iBooks - Jupyter - Wolfram Language Future books More or less as a hobby, Jim has been writing an interactive textbook on mathematics, music and musical set theory. There is a Wolfram Language version (which is rally just a scatch pad) and a version in Jupyter that will be published when Jim gets around to finishing it. If you are interested in these topics, contact us for details. Training courses Universities - we offer all of our training materials free to universities. All we ask in rerturn is that if there is a book associated with the materials, it is recommended as a course book. Commercial organizations - all of our training courses are available for delivery or licensing. Contact us for details. We offer: - UML 2 and the Unified Process (of course!) - Introduction to BPMN 2 - Miscellaneous OOAD/MDA/Metadata Management courses - Bespoke courses: if it is anything to do with modelling or UML we can do it! - Any of the advanced topics from “Secrets of Analysis" We have had very many satisfied clients including, JP Morgan, British Airways, Vodafone, AVIVA etc. etc.

Nexus Human

nexus human

London

Nexus Human, established over 20 years ago, stands as a pillar of excellence in the realm of IT and Business Skills Training and education in Ireland and the UK.  For over two decades, Nexus Human has been a steadfast source of reliable and high-quality training solutions, catering to a diverse range of professional and educational needs. With a strong reputation in the Training Industry, Nexus Human has consistently demonstrated its commitment to equipping individuals and organisations with the skills and knowledge required to thrive in today's dynamic world.  Our training programs span a wide spectrum, encompassing IT certifications, business skills, and much more.   What sets Nexus Human apart is our unwavering dedication to staying at the forefront of industry trends and technology advancements.  Our expert instructors, coupled with cutting-edge training resources, ensure that students receive the most up-to-date and relevant knowledge available. The impact of Nexus Human extends far and wide, helping individuals enhance their career prospects and aiding businesses in achieving their goals.  This 20-year journey has solidified our institution's standing as a trusted partner in personal and professional growth, offering reliable, excellent training that continues to shape the future.  Whether you seek to upskill, reskill, or simply stay ahead of the curve, Nexus Human is the place to turn for an educational experience marked by quality, reliability, and innovation.

Guidepost Montessori

guidepost montessori

Development takes the form of a drive toward an ever-greater independence. It is like an arrow released from the bow, which flies straight, swift and sure. The child’s conquest of independence begins with his first introduction to life. While he is developing, he perfects himself and overcomes every obstacle that he finds in his path.” MARIA MONTESSORI Founder of the Montessori Method of education The Montessori approach Montessori helps your child develop a fundamental, enduring love of learning and the deeply ingrained social, emotional, and academic skills they need to succeed as an adult. Montessori combines highly intentional learning materials, rich social development, and a joyous approach to practiced independence. Our mission Our singular mission at Guidepost is to guide and empower each child as she grows in her independence. In every child lives limitless human potential. For the child to realize that potential is to confidently grow and to joyously learn. It is to create and to love herself while gaining the knowledge to form a unique vision of her singular life. It is the security to live that vision, to dare greatly, to love others. The Montessori approach to human development is based on the belief in the potential of the child, and on the belief that it is only the child herself who can realize this potential. To grow up well is to grow up to be increasingly independent — to be increasingly capable, increasingly confident, increasingly secure, increasingly able to meet one’s own needs, forming one’s own values, and authoring one’s own life. Our job as caretakers is to understand and to love this process as it unfolds for children in our care, and to support the child in blazing her trail. The circumstances of children are as varied as children themselves. The specific needs, the precise resources available, the particular constraints faced by each child and each family are different. As times change, there is a need to keep step and to ensure that the application is timely. But the fundamental need is timeless: to help the child achieve her own development. So, too, is the fundamental method: to provide the child with material, environment, and guidance that is lovingly optimized to support her in that work. The support a child’s caretakers can provide for her burgeoning independence is multifaceted: We can provide materials and inspiration for her to do the work of growing and learning. Every child learns to walk, but not every child learns to walk in a way that feels like an exciting challenge, that redounds upon her confidence. So it is with all of human development and knowledge. The child achieves her own development by engagement and by practice. From grasping an object for the first time, to eating independently, to toileting, to putting her world to words—to the whole world of knowledge, of nature and quantity and life and culture—the effort that children put in can be magnified by thoughtful learning materials and guidance. We can carefully support a child’s environment, creating a wonderful world for her in which to grow up. Children are constantly interacting with and absorbing experiences from their environment. One of the best things we can do for a child is to set up a space where she can be maximally independent and efficacious, a space that is to her comprehensible and enticing, a space that is aesthetically and pedagogically rich. Whether it’s at school or at home, the principles are the same: a world that is accessible, orderly, and enticing is a world that is supportive of a child’s growth. We can prepare ourselves as caretakers of the child. Raising children is as demanding as it is rewarding. It requires that we spend ourselves in understanding and love, that we thoughtfully navigate the stages of a unique child’s development, and that have the self-awareness to manage our own lives, motivation, and energy as we do so. It is tremendously beneficial to both the child and her caretakers to elevate a teaching and parenting philosophy to consciousness, to take an integrated approach to the infinite texture of a child’s growth toward independence. Finally, we can connect with others, other parents, other teachers, other developmentalists and pedagogues, each of whom adds their own experience and wisdom to our accumulated knowledge about child development. Montessori is not just a philosophy of human development. It is also an applied pedagogy, one with over a century of validation, refinement, and grassroots international growth. Guidepost, and each member of our community, benefits tremendously by participating in that movement and history.

Institute of Computer Training Academy

institute of computer training academy

INSTITUTE of COMPUTER TRAINING ACADEMY (ICTA) is a national program of information technology education and development. ICTA Registered as Autonomous Body,under Govt of West Bengal based on central govt TR act,1882, Govt of India. ICTA Registered under Trade Mark Registry Act,1999, Govt of India. Registered under MHRD (CR Act), Govt of India. ICTA An ISO 9001-2015 Certified autonomous body. ICTA Registered under Department of Labour Govt of NCT (Delhi). ICTA Faculty ICTA Faculty are full time, qualified and friendly professional, always there to guide the students, specially trained to understand students psychology, internalise the knowledge uniformly and put accords difficult to understand concept with ease, thus making students learning ventures smooth and easy. The whole training time is equally divided into theory and practical sessions. A part from regular computer times. Student are allowed to utilize unlimited machine time to exercise their minds, boots their creativity and increase their level of curiosity. This build up there self confidence, allow them to explore the wide horizon of computer and gradually shapes them into confident professional. LIBRARY INFRASTRUCTURE The ICTA center have a huge stock library with a collection of around 500 volume comprising functional programming, parallel processing system database management system, client server computing, Network, operating system, multimedia, object oriented programming etc. COMPUTER LAB ICTA Center have a good computer lab.The computer lab contains high configuration computer networked with Wi-Fi. THE PLACEMENT CELL The placement cell of ICTA is responsible for coordinating the placement activities of the students of the institute. A placement coordinator from the faculty heads the placement cell with committee members representing the students. Almost all the placement activities are organized and coordinated by the students under the able guidance of faculty. PLACEMENT PROCESS An early information of the intended schedule would facility arrival at mutually convenient date. The company may deliver pre placement talk either earlier or before the campus requirements program itself. At the campus the company may conduct a written test and or interview etc. Job offer or response may be routed only through the placement coordinator. In some cases if a company wishes to conduct off campus requirements as well, they may provide the travelling allowance for such outstation selection. REGISTRATION PROCESS To get registered, students have to fill the application form provided along with information brochure. Student can buy the information brochure from any of our ICTA Authorize center. The registered center of ICTA name and code are mentioned in the Applications form. DOCUMENTS OF STUDENTS REGISTRATION Two recent passport size photo. Self attested copy of last educational qualification. Caste certificate (if sc/st/obc). COURSE STRUCTURE ICTA Course can be classified by Certificate Course. Diploma Course. Advanced Diploma Course. Vocational Course. ELEGIBILITY OF CERTIFICATE COURSE All certificate course students have must qualified class viii passed. ELEGIBILITY OF DIPLOMA COURSE All Diploma Course students have must qualified class X. ELEGIBILITY OF ADVANCED DIPLOMA COURSE All Advanced Diploma Course students have must qualified x+. EXAMINATION AND RESULTS The minimum qualifying marks for course are as follows. Practical 50 Theory 50 TOTAL. 100 Percentage Grade 80% A+ 70%-80% A 60%-70% B+ 50%-60% B 40%-50% C RE-EXAMINATION PROCESS A student at least 40%marks in each semester to qualify the exam. A students who does not clear the examination in one sitting will be allowed to re appear in the failed exam. Students failling to appear in the re examination with in the specific period of time shall not be entitled for the certificate or for further re examination.such students are to go through the complete registration procedure to get a re admission. EXAMINATION SYSTEM ICTA has only allowed OFFLINE examination system. EXAMINATION PROCEDUR The declear of exam date then students are filled by exam form our ICTA Register center and paid his/her exam fees. The pattern of questions will be the OBJECTIVE TYPES. The details of examination (date,time)will be announced by website notice board. The duration of examination will be of 1hour. Theory exam will comparison of 50 questions of 1marks and no negative marking.practical exam will carry total 50marks. STUDENT BENEFITS Quality education provide at very affordable charge. Off-line exam at your home center who is registered our Organization. Global accepted certificate after the complete of course. OUR AFFILIATION Registered as autonomous body, under Govt of west Bengal based on central Govt TR act,1882,Govt of India. Registered under trade mark registry act,1999, Govt of India. Registered under MHRD (CR Act), Govt of India. An iso 9001-2015 certified autonomous body. Registered under department of labor Govt of NCT(New Delhi). Registered under MSME(Govt of India). AFFILIATION PROSES Rules of our ICTA Authorize Centre. If any person's are interested to ICTA franchises, so the following rules are maintained You must have 5-10 computers. 1 theory and 1 practical rooms. 2 Bathrooms are required must .ladies and gents. Minimum theory rooms 200sqft. and practical rooms must be 200sqft. Must have internet connection. Good faculty. Good Electricity. Timings Maintenance. WHAT YOU WILL GET? Agreement paper. ICTA Authorized certificate. Student Registration form. Details of institute our official website www.ictaindia.com Flex 6*3 size. Sample Certificate Marksheet.

St Wilfrid's Catholic Primary School

st wilfrid's catholic primary school

Sheffield

We process personal data to provide public services. Personal data is information about living identifiable individuals. It can be a name, address, contact details, photograph, sound recording; it can be details of someone’s behaviour, lifestyle, physical or mental health needs; it can be a unique number, such as a vehicle registration plate, National Insurance number, etc. We decide what personal data we need and how to use it, so we are a Data Controller and registered as such on the Information Commissioner’s Register of Data Controllers. When we collect personal data, we are required to make sure you are clear what data we need and why, what we intend to do with it, what your individual rights are, and who you can contact for enquiries or concerns about the use of your personal data. This is called a privacy notice and we can do this verbally or in writing. This page is our general privacy notice and we have included specific privacy notices below for the services that process large amounts of personal data, for example council tax, planning, parking, elections, licensing, housing, etc. Why we collect and use personal data We collect and use personal information to: provide, plan and manage our services carry out our regulatory, licensing and enforcement roles carry out any other tasks which we have to do by law make and take payments and grants and spot fraud listen to your ideas about our services tell you about our services evaluate and improve services We might collect your personal data directly from yourself, from someone acting on your behalf, or from another third party. We might collect this data in person, over the telephone, in writing, or captured as an image, audio or film recording. We can only use your personal data if we have a lawful basis for doing so. The lawful basis will be recorded on the Council’s Record of Processing Activity and, where appropriate, on relevant service area privacy notices. If we rely on consent to process your data, you have the right to withdraw that consent at any time. To withdraw consent, either contact the Service that you provided the consent to or contact the information management team. Sharing your information We share personal data internally within the council and also with external third parties so we can carry out our work. Internal sharing might include checking your eligibility for a service (eg free school meals) or keeping accurate records, whereas external sharing might be to ensure you receive the right service (eg social care support). Who we share information with depends on the service we are providing and your circumstances, but may include: healthcare, social and welfare organisations and professionals providers of goods and services financial organisations, including debt collection, tracing and credit referencing agencies elected members local and central government ombudsman and regulatory authorities professional advisors and consultants police forces, other law enforcement and prosecuting authorities voluntary and charitable organisations Disclosure and Barring Service Courts and Tribunals utilities providers When personal data is shared, only the minimum amount is shared and relevant contracts and / or agreements will be in place. Fraud prevention and detection We are required by law to protect the use of public funds and for this reason we share information with internal services and other bodies responsible for auditing or administering of public funds to detect and prevent fraud. This sharing includes, but is not exclusive to the Council’s external auditor, Department for Work and Pensions, other local authorities, HM Revenue and Customs, the Police, credit reference agencies. We also share personal data with the Cabinet Office for the National Fraud Initiative. This is a national data matching exercise, which takes electronic data from the private and public sectors to identify potential fraudulent claims and payments. The Cabinet Office stipulates the data that they need and subsequently provides us with details of the cases where the matching indicates an inconsistency or potential for fraud, so that we can investigate further. This data matching is carried out under the Local Audit and Accountability Act (part 6, Schedule 9) and does not rely on your consent. How long we keep information for This varies depending on the type of information, as well as the legal requirements and reason we are keeping the information. In some instances the law sets the length of time information has to be kept. We also have retention and disposal schedules which give details about how long we need to keep different types of information. Your data rights You have the following rights in regard to your personal information, to: access copies of any records we hold about you have any information we hold about you corrected have any information we hold about you deleted or destroyed restrict how information we hold about you can be used or shared object to information about you being held have any information we hold about you transferred to a third party challenge decisions relating to you made using automated decision making and profiling (currently we have no services that use automated decision making or profiling for decision making) Please note there may be times that we cannot fulfil these rights fully because of legal reasons, for example we cannot delete your data if we still need it. If you want to exercise any of the above rights, please make a subject access request. Make a subject access request Who to contact about the way your personal data is handled If you have any queries, concerns or complaints about the way we process your personal data, including the way we handle information requests, you can contact our Customer Services or the Data Protection Officer. If you are not satisfied with our response or believe we are not processing your personal data in accordance with the law you have the right to contact the Information Commissioner’s Office.

Moderntronics

moderntronics

Harrow,

In these terms and conditions (“Conditions”) the following expressions shall have the following meanings: “Business Day” means any day other than Saturday, Sunday or a public holiday. “Business Hours” means the hours detailed in Condition 32 below. “Contact Hours” means Monday to Friday (inclusive) from 07:00 hours to 17:00 hours but excluding bank holidays. “Contract” means any contract between MT and the Customer for the supply of Hardware and/or Software (with the associated Licence) and/or services which is subject to these Conditions. “Customer” means any person, firm or company who enters into a Contract with MT to which these Conditions apply. “Force Majeure” means any event outside the reasonable control of either Party affecting its ability to perform any of its obligations (other than as to payment) under these Conditions. “Goods” means all or any tangible or intangible goods or intellectual property including but not limited to Hardware and Software which are provided to a Customer in accordance with these Conditions. “Hardware” means any hardware provided by MT to the Customer. “MT” means MODERNTRONICS Ltd. or its servants and agents as the case may be. “Insolvency Event” means any one of the following in relation to the Customer: (i) a notice being issued to propose a resolution for winding up or dissolution, or such a resolution being passed; (ii) a petition for a winding up or an administration or bankruptcy order being presented, or such an order made; (iii)any steps being taken with a view to a voluntary arrangement or other assignment, composition or arrangement with all or any creditors or any moratorium, readjustment, rescheduling, forgiveness or deferral of all or any indebtedness; (iv) suspension of payments to all or any creditors and/or ceasing business; (v)an encumbrancer taking possession of all or any assets; (vi) an administrator or receiver being appointed over the Customer or all or any of its assets; (vii)any action anywhere similar or analogous to any of the foregoing; or MT reasonably believing that any of the foregoing is imminent. “Licence” has the meaning attributed to it in Condition 23 below. “Minimum Term” means the term set out in Condition 17 below. “Party” means MT or the Customer and “Parties” means both of them. “Response Time” means two Working Hours from an initial call to the hotline under Condition 26 or 28 below. “Seminar” means any seminar provided by MT. “Service Operator” has the meaning given to that term in Condition 28 below. “Site” means https://www.moderntronics.com and all subdomains including (but without limitation) “Software” means software or software updates or upgrades provided by MT and licensed to the Customer under Condition 23 below. “Training Sessions” means any training session provided by MT. “Working Hours” means the hours between 9:00 to 17:00 on any Business Day 2. Interpretation In these Conditions, the following rules apply: A person includes a natural person, corporate or unincorporated body (whether or not having separate legal personality). A reference to a Party includes its personal representatives, successors or permitted assigns. A reference to a statute or statutory provision is a reference to such statute or provision as amended or re-enacted. A reference to a statute or statutory provision includes any subordinate legislation made under that statute or statutory provision, as amended or re-enacted. Any phrase introduced by the terms including, include, in particular or any similar expression shall be construed as illustrative and shall not limit the sense of the words preceding those terms. A reference to writing or written includes faxes and e-mails. 3. General Information These Conditions apply when MT: sells and delivers Hardware; sells and delivers Licences; sells and delivers Software; or provides repairs or any other services to the Customer. They will also apply to other business transactions unless MT agrees that alternative special conditions apply. These Conditions apply to the exclusion of any other conditions that may be proposed by a Customer or implied by law (insofar as such exclusion is lawful). Part II Specific Provisions for the Use of the Online Shop Customers purchasing Goods from the Site, must read all Parts of these Conditions, which apply to them in full. 4. Consumers The Goods and services provided by MT are designed only for sale to and use by businesses in the course of their business activities. MT does not knowingly sell to any person dealing as a consumer or supply anything for personal use. 5. Customer’s Status By placing an order on the Site, the Customer warrants that he or she is: legally capable of entering into binding contracts and, where the Customer is an individual, that he or she is at least 18 years old; and is dealing in a business capacity and purchasing Goods and/or services for the purpose of his business and not for personal use. Part III General Conditions for the Provision of Goods and Services 6. Formation of Contract Quotations provided by MT to the Customer are not binding on MT. The Customer’s order constitutes an offer to MT to buy the Goods or services. All orders are subject to acceptance by MT. The offer will be deemed accepted, and a Contract formed, when MT sends the Customer confirmation that the Goods have been dispatched (“Dispatch Confirmation”) or, in the absence of a Dispatch Confirmation, when the Goods are delivered. The Contract will only relate to those Goods whose dispatch is confirmed to the Customer by a Dispatch Confirmation or if no Dispatch Confirmation is sent, those Goods which are actually dispatched. MT is not obliged to supply any Goods which may have been part of the Customer’s order until the dispatch of such Goods has been confirmed in a separate Dispatch Confirmation. Subject to Condition 17 below, an order for services will be deemed to have been accepted, and a Contract formed, when MT sends the Customer confirmation that the services ordered will be provided (“Service Confirmation”) or, in the absence of a Service Confirmation, when the services begin to be provided. Oral representations will only be binding upon MT if they are expressly confirmed in writing by MT to the Customer. 7. Price Unless MT expressly specifies prices to the Customer, MT’s current list of prices applicable at the time of the acknowledgement of order will apply. Unless otherwise agreed in writing, all prices are exclusive of value added tax, postage, freight, insurance, forwarding fees, installation and commissioning, travelling expenses and subsistence, which will be added as appropriate. MT will charge overtime for work outside of their normal Business Hours at up to 150% of the hourly rate from time to time applicable during Business Hours. Subject to Condition 16 below, prices are liable to change at any time, but changes will not affect orders in respect of which MT has already sent the Customer a Dispatch Confirmation or a Service Confirmation as the case may be. The Site contains a large number of products and it is always possible that, despite MT’s efforts, some of the products listed may be incorrectly priced. MT will normally verify prices as part of dispatch procedures so that, where a product’s correct price is less than our stated price, MT will charge the lower amount when dispatching the product to you. If a product’s correct price is higher than the price stated on our site, MT will normally, at our discretion, either contact you for instructions before dispatching the product, or reject your order and notify you of such rejection. MT is under no obligation to provide any Goods or services to the Customer at an incorrect (lower) price, even after MT has sent a Dispatch Confirmation or a Service Confirmation in relation to those Goods or services if such incorrect price could reasonably have been expected to be recognised by the Customer as an error. 8. Delivery and Availability The Customer’s order for Goods will be fulfilled by the delivery date in the Dispatch Confirmation or, if no delivery date is specified, then within 30 days of the date the Customer made his order (where such an order leads to a Contract). The period for delivery or performance of the Contract will normally commence on MT’s acknowledgement of the order. However, if the Customer is required to do anything before MT can effect delivery, MT will, as soon as practicable, notify the Customer accordingly. The time within which MT must deliver any Goods will run from the date on which MT receives notice from the Customer that it has duly complied with such notification from MT. Unless otherwise agreed in writing, any periods mentioned in the acknowledgement of order for services and Software development are based on a preliminary estimate of the required workload and therefore are approximate only. Time of delivery and performance is not of the essence. If MT fails to meet any delivery or performance dates set out in the acknowledgement of order and is solely responsible for such failure, the Customer may terminate the Contract but only after MT has been given an opportunity to rectify the situation and subsequently fails to meet the revised set of delivery or performance dates provided by MT to the Customer in writing. Unless MT has been deliberately or grossly negligent, all further claims of the Customer on the basis of the delay in performance are excluded. If MT cannot deliver or perform its obligations under the Contract due to Force Majeure or a failure of the Customer to cooperate or any other act, default or omission of the Customer, then MT will be entitled to perform its obligations under the Contract once the issue has been resolved, provided the issue occurred while MT was still allowed to deliver or perform and MT shall have no liability whatsoever for any delay or its failure to perform its obligations. 9. Agreed Performance Unless specified otherwise in writing, the agreed performance in respect of any repairs provided by MT, at the Customer’s request will be to adjust the relevant unit(s) to MT’s applicable standard specifications for that unit. Where the relevant unit(s) cannot be repaired to MT’s applicable standard specification due to the Customer limiting the repairs required or the time and money to be invested MT may exceed the Customer’s request if MT considers, at its sole discretion, that such additional repairs are reasonable and will ensure the proper functionality of the unit in question. The agreed performance levels for MT’s maintenance and care services are as set out in Conditions 26 and 28 below; for all other services the agreed performance levels will be as set out in the acknowledgement of order. 10. Refunds Where the Customer returns Goods (at the Customer’s cost) because he or she claims that the Goods are defective, MT will examine the returned Goods and will notify the Customer of its findings within a reasonable period of time. If MT (in its sole discretion) deems that the Goods are defective, MT may at its option repair, replace or provide a refund in respect of such defective Goods. MT will process any repair, replacement or refund as soon as practicable and, in the case of any refund, within 30 days of the day MT confirmed to the Customer that the Customer was entitled to the same. Such refunds will be made in full, including a refund of any delivery charges for sending the item to the Customer. 11. Import Duty If the Customer orders Goods for delivery outside the UK, they may be subject to import duties and taxes which are levied when the delivery reaches the specified destination. The Customer will be responsible for payment of any such import duties and taxes. Please note that MT has no control over these charges and cannot predict their amount. Customers should contact their local customs office for further information before placing an order. Customers must comply with all applicable laws and regulations of the country for which the Goods are destined. The Customer will indemnify and keep indemnified MT in respect of all costs, proceedings, losses and liabilities resulting from any breach by the Customer of any such laws. 12. Retention of Title to Property The Goods will be at the Customer’s risk from the time of delivery. Property in and title to all Goods will remain with MT until MT has received payment for the full price of all the Goods (and/or all other goods and/or services supplied by MT to the Customer under any other contract whatsoever).. The Customer may sell or use Goods in which title is retained during the course of their normal business, but may not give such Goods by way of pledge or pledge these Goods as security. Until the property in and title to the Goods passes to the Customer: the Customer shall keep the Goods properly stored, protected and insured and separate from all or any other goods whether belonging to MT, the Customer or any third party; MT shall be entitled at any time forthwith to revoke the Customer’s power to deal with the Goods; and such power shall automatically cease if an Insolvency Event shall occur in respect of the Customer; and the Customer shall not make any modification to the Goods, the Software or their packaging or alter, remove or tamper with any marks, numbers or other means of identification used on or in relation to the Goods. Upon termination of the Customer’s power to deal with the Goods, the Customer shall place the Goods at the disposal of MT and MT are hereby irrevocably authorised without the need for consent of any third party but using only such force as may be necessary, to enter upon any premises of the Customer or any third party for the purpose of removing the Goods. If third parties claim title to Goods with retained title, the Customer will inform MT without delay, will notify the person making the claim of MT’s title and will support MT in enforcing its rights, including taking all the necessary steps required to preserve MT’s rights, including commencing litigation at the Customer’s own expense. If the Customer breaches the Contract, e. g. by delaying payment, the Customer will be obliged to return the Goods with retained title if requested by MT, in return for which MT will not terminate the Contract. 13. Payment Where services, maintenance or care are provided on an ongoing basis, MT will invoice the Customer for these at the beginning of the billing period or as soon as reasonably practicable thereafter. The Customer will pay MT’s invoices in full within 30 days from the date of the relevant invoice. Depending on the scope of an order, payments for such services, maintenance or care are due either upon placement of the order by the Customer or upon partial delivery of the same of between 40 to 50% of their respective order value. BACS or cheque are the only methods of payment accepted. Invoices for Seminars and Training Sessions will be issued at the beginning of the respective session and payment is due immediately and without deduction. 14. Delay of Payment Where a Customer fails to pay an invoice by the due date, MT will be entitled to charge the Customer interest on all monies outstanding from the due date until the actual date of payment (both before and after judgment) at a rate of 8% above the base rate of the Bank of England calculated on a daily basis. 15. Setting-Off and Refusal of Payment The Customer cannot exercise any right of set-off in respect of amounts owed to or by MT. 16. Change of Pricing by MT for Ongoing Maintenance or Care MT may increase its prices for maintenance and services by giving the Customer written notice 2 months prior to the end of the Minimum Term. The Customer has 4 weeks from the date of receipt of the written notice from MT to object to the change. Where the Customer so objects, the Customer will be entitled to give notice to MT to terminate the Contract as of the date of the proposed price increase. 17. Automatic Extension of Contract Where services, maintenance or care are performed on an ongoing basis the Contract will come into effect upon acceptance by MT of the first order from the Customer for Software maintenance. The Contract will initially run until the date specified at “Minimum Service Duration” as set out in the “MT Service Product List” or until the expiry date where an expiry date is stipulated in the Contract (“Minimum Term”). Subject to one of the Parties serving written notice of termination on the other at least three months prior to the expiry of the Minimum Term, the Contract will be extended automatically. In the case of Software Licences supplied without a time limit, the Contract will extend until December 31st of the current year. The subsequent extension periods will begin on January 1st and end on December 31st of the respective year. In the case of Software Licences supplied with limited validity (e.g. a licence for 1-year) the extension is based on the terms and conditions set out in the description of the respective licence (e.g. extension by one further year). Unless otherwise agreed in writing, any extension to a Contract will be on the basis of MT’s current price list as at the date of such extension. 18. Delivery Obligations and Shipping The conditions for EXW (ex works) (MT’s premises or such other place referred to in the relevant order) as set out in the Incoterms 2010 apply to delivery of any Goods. Claims for any transport damages and any replacement of damaged Goods, remain with the Customer who is responsible for adhering to the mode and period for the filing of any claims with carriers, shippers and insurers. 19. Scope of Warranty (Material Deficiencies and Deficiencies in Title) MT warrants that the Hardware is free from defects in workmanship and material as at the time of transfer of risk; and warrants that the Software does not contain any flaws which void or substantially reduce its value or suitability for the usual or contracted purpose. Where MT is not the author of the Software, MT does not warrant that such Software will run without interruptions or errors, nor that MT will be capable of resolving all Software errors, nor that the Customer will be capable of achieving all of the functions included in the Software in all of the combinations chosen by the Customer, nor that these will meet the Customer’s requirements. MT will only warrant the quality and/or durability of Goods if it has expressly agreed in writing with the Customer that it will do so. The warranty period is 1 year. Where MT is the author of the Software such Software is subject to MT’s standard warranty. 20. Obligation to Inspect and Serve Notice of Defects The Customer must inspect the Goods upon delivery or repair and must notify MT in writing of any failure by MT to meet the specification within 7 days of delivery or repair or (where the failure was not apparent on reasonable inspection) within a reasonable time being no more than 1 month after discovery of the failure. Where the Customer fails to provide such notice MT will have no liability under its warranty. 21. Liability Subject only to Condition 21 d), MT shall not be liable to the Customer in contract, tort (including without limitation negligence) and/or breach of statutory duty for any loss or damage which the Customer may suffer by reason of any act, omission, neglect or default (including negligence) in the performance of the Contract by MT, its servants or agents, in a sum which is greater than GBP 200,000 per incident or series of connected incidents. Subject only to Condition 21 d), MT shall not be liable to the Customer whether in contract or tort (including without limitation negligence and/or breach of statutory duty) for indirect loss of any kind resulting from these Conditions, its performance or any breach of its terms. Subject only to Condition 21 d), MT shall not be liable to the Customer whether in contract or tort (including without limitation negligence and/or breach of statutory duty) for indirect economic loss of any kind including (but without limitation) loss of business opportunity, reputation, goodwill resulting from these Conditions, its performance or any breach of its conditions. Notwithstanding any other provision herein, nothing in these Conditions shall operate so as to limit or exclude MT’s non-excludable liability in respect of death or personal injury caused by the negligence of MT to exclude the application of Section 12 of the Sale of Goods Act 1979 and to exclude liability for fraudulent misrepresentation. MT’s liability for loss of data is limited to the effort required to restore the data from proper backups provided by the Customer. 22. Third Party Rights If any third party claims or takes action against the Customer, because Goods delivered by MT, or their use in accordance with the instructions provided by MT, purportedly violate their commercial rights or proprietary rights, then the Customer will inform MT of the same. MT agrees that they will assist the Customer in defending such claims. Where the claim is made to the Customer within 12 months of the date of delivery, MT will indemnify the Customer against claims provided that the Customer: appoints MT to defend the claims or to settle the dispute, and promptly notifies MT of any such claim, keeps the Customer informed of all information received and provides such reasonable assistance to MT as it shall reasonably require, does not defend the action itself without coordinating such defence with MT, and does not at any time admit liability or otherwise settle or compromise or attempt to settle or compromise the said claim or action except upon the express instruction of MT, the alleged breach of rights is not based on alteration of the delivered item used by the Customer, and does not use the item delivered by MT in conjunction with other items and/or in a fashion that breaches any such rights, in a situation where the use of the item as delivered by MT would not have breached the rights of the person who has filed the claim. MT may at any time and at its own expense acquire on behalf of the Customer the right to continue to use the Goods, to replace the Goods or alter them in such a fashion that the rights of others are no longer breached. If this is not possible, the Customer shall return or destroy the Goods if required to do so by MT who will reimburse the purchasing price for the Goods less depreciation. If the Customer refuses to do so, MT will no longer defend the claim or provide the Customer with any further support. The Customer has no further rights in case of disputes over proprietary rights with third parties and MT shall have no liability therefore unless MT could be blamed for acting deliberately or with gross negligence. Part IV Special Conditions for Delivery of Software 23. Conditions of Use for Delivered Software In the case of delivery of Software to the Customer, MT hereby grants the Customer a simple, non exclusive and non-transferable, licence to use the Software (“Licence”) . The validity of the Licence is not time limited, unless otherwise specified to the contrary in the terms and conditions of the Licence. MT, grants the Customer the use of such Software in the form of the object code and the user documentation with the use being restricted to one electronic data processing system at any one time and only for the tasks for which it is intended. Unless permitted by law, the Customer will not decompile the Software or perform reverse engineering. The Customer may duplicate the Software but only to the extent that this is required for the permitted use, and in order to allow it to perform data backup. Upon delivery of any Software, including updates and upgrades, the Customer will immediately produce a backup copy. MT may terminate the Licence granted to the Customer pursuant to this Condition 23 with immediate effect if the Customer is in breach of the conditions for the use of the Software for a period of 30 days from the date of a written notice of such a breach from MT or any third party. On termination of this Contract howsoever arising, the Customer will return to MT within 30 days all Software together with any related materials owned and licensed by MT and shall delete all copies and partial copies of the Software however stored within 7 days of service of the notice. Proof of such deletion must be provided to MT without delay. On receipt of prior written consent from MT, the Customer may retain a copy of the Software for the purposes of archiving. 24. Delivery of Software MT will only install the Software if this has been expressly agreed in writing between the Customer and MT. MT is able to provide telephone consultancy and support concerning questions relating to the application of the respective Software products as well as the solution of problems that may occur as provided for in Condition 26 below. 25. Prerequisites for Running the Delivered Software The proper running of Software systems supplied will only be guaranteed if the Hardware and operating system components used correspond to the reference systems of the respective manufacturer(s), as well as having been approved and certified. Unless otherwise agreed in the Contract, the Customer shall ensure that the provisions in this Condition 25 are complied with. Part VMaintenance and Care Application Software 26. Scope of Performance of MT Services for Application Software For the Software products, unless otherwise expressly agreed in writing, MT will provide the following services, denoted by Service Level “SW-Service STANDARD” and Service Level “SW-Service E-STANDARD”: Right to use Software and documentation updates: MT grants the Customer a non-transferable, non-exclusive Licence to use the Software and any documentation or updates. The right of use is not limited in validity, unless otherwise specified in the terms and conditions of the Licence. Software and documentation updates: MT will supply the Customer with the current version of the Software as specified in the Contract. This will be done as specified by the manufacturer of the Software. The documentation will be supplied in the form determined by the manufacturer of the Software. The installation of Software updates will be performed by suitably qualified personnel of the Customer. Alternatively for an additional charge, MT may install the Software updates on behalf of the Customer. Where the Customer has adapted the Software, the Customer will be liable for the additional cost of performing the same adaptation to the new version of the Software or alternatively the Customer may perform the necessary adaptation himself. Hotline (Service Level “SW-Service STANDARD” only) MT is able to provide consultancy and support by telephone or by e-mail in relation to queries relating to the application of the respective Software products as well as the resolution of any problems (in so far as it is reasonably practicable to do so) which may occur. This service will be provided by MT during the Contact Hours: Wherever possible, qualified consultancy will be provided by MT within the Response Time. E-mail Hotline (Service Level “SW-Service E-STANDARD” only) MT is able to provide e-mail consultancy and support in relation to queries relating to the application of the respective Software products as well as the resolution of any problems (in so far as it is reasonably practicable to do so) which may occur. This service will be provided by MT during the Contact Hours Wherever possible, qualified consultancy will be provided by MT within the Response Time. MT Hotline: E-mail: hotline@MT.com Internet: http://www.MT.com/customersupport Software error messages Where Software problems occur which MT is unable, for whatever reason, to resolve, the Customer may send a written error message to MT. The purpose of such an error message is to identify the error in the Software and enable the manufacturer to resolve the error. MT shall liaise with the manufacturer(s) of the Software products to resolve any Software errors as promptly as possible. Restoration of any data, regardless of the cause of the data loss, is not the responsibility of MT. 27. Obligation of the Customer to Co-operate Pre-conditions for the provision of the services by MT to the Customer are that the Customer has legally acquired the Software and holds a corresponding Licence to use it. In addition, the Software must be in the same condition that it was in when it was delivered. The services exclusively relate to the current release and delivered version of the Software. If earlier Software versions are used, a one-time update service which will be independently invoiced and paid for by the Customer will be provided to update the Software to the latest version. Services will not be performed for Software adaptations made by the Customer (for example including but not limited to macros, programs, variants, user interfaces and database applications). If the operating system for the Hardware is not included in the Contract, the Customer must update the operating system to the most recent version (e. g. by purchasing updates) if this is required in order to use the new versions of the application Software. Hardware and Operating Systems 28. Scope of Performance of MT Maintenance and Care Services for Hardware and Operating System For Hardware products and the operating system, unless otherwise agreed in writing, MT will provide the following services, denoted by Service Level “HW-Service SPECIAL”: The scope of performance is briefly set out in the “Special Description” for each product listed in the attached “MT Service Product List”. The exact scope of performance will be determined in accordance with the attached description of performance issued by the respective MT service operator (“Service Operator” including but not limited to Hewlett-Packard, Fujitsu Siemens and Silicon Graphics). The following shall also apply: Hotline MT is able to provide consultancy and support by telephone or by e-mail in relation to queries relating to the application of the respective Hardware products and operating system, as well as the resolution, (in so far as it is reasonably practicable to do so) of any problems which may occur. This service will be performed by MT during the Contact Hours: Wherever possible, qualified consultancy will be provided by MT within the Response Time. Where queries arise outside of the Contact Hours, the Customer should address such queries directly to MT’s Service Operator Response time for Hardware failures MT will use reasonable endeavours to solve a query within the Response Time. The Response Time shall be deemed to have been initiated either as soon as the customer service personnel arrives on the relevant site, or as soon as remote diagnosis is started, where either is required to resolve the problem. The appropriate Response Time will be determined in accordance with the attached description of performance issued by the respective MT Service Operator. 29. Services Not Included Unless otherwise agreed in writing, the following services will not be provided by MT to the Customer: a) Repair/re-acquisition of devices that have been damaged as a result of: incidents of war of any type civil wars, nuclear energy, deliberate action of the Customer (not of his subcontractors) b) Repair/re-acquisition that is required because of repair work or alterations of devices carried out by the Customer or any third party without the prior written consent of MT. c) Work required due to interface problems between MT’s devices and those of other manufacturers and suppliers. d) Customer service which is required because a product that is not covered under this Contract has caused an error. e) Customer service that has become necessary because devices have been used under adverse conditions (e.g. including contaminations and deviations from recommended room temperature and relative humidity) or in conjunction with accessories or (device-specific) consumables (e.g. including foreign disks, disk stacks, cassettes, printer paper and print heads of any type) (“Device Specific Consumables”) which do not meet the manufacturer’s specifications. f) Replacement of Device-Specific Consumables. g) Data backup. h) Calibration work that is not related to repair. 30. Restoration of Data/Programs The restoration of data and programs upon repair or replacement of a defective hard disk is limited to starting the copying program (Restore) used to restore the last full data backup. 31. Obligation of the Customer to Cooperate a) Hardware service Pre-conditions for the provision of Hardware services by MT are that the Hardware has been acquired legally and has been installed properly at the Customer’s site. In addition the Hardware affected must correspond to the current revision and be in proper condition when including in the Contract. These pre-conditions shall be met immediately after the expiry of the warranty period specified in the Contract. If the Hardware is included in the Contract at a later date, these pre-conditions must first be confirmed by a takeover inspection of the Hardware by MT, which will be independently invoiced and paid for by the Customer, and if required the pre-conditions will be achieved by MT undertaking the required repair work. b) Operating System Service Pre-conditions for the provision of operating system services are that the Customer has legally acquired the Software and has been granted the necessary corresponding Licence to use it. In addition the Software must be in the same condition as when it was delivered to the Customer. The services exclusively relate to the current release and version of the Software. If earlier Software versions are used, a one-time “Update Service” which will be independently invoiced and paid for by the Customer will be provided to update the Software to the latest version. Operating System services will not be provided for Software adaptations made by the Customer (for example including but not limited to macros, programs, variants, user interfaces and database applications). Part VI Generally Applicable Conditions 32. Prices and Fees for Special Services The following items are not included in the payment for services under Conditions 26 and 28 above and will be invoiced separately in accordance with MT’s current price list: Services performed outside Working Hours on the express request of the Customer. Services to correct errors caused negligently by the Customer or by any unauthorised third party as a result of improper treatment, unsuitable operating media, unauthorised manipulations, Software manipulations, non-adherence to operating conditions or otherwise. ices required due to faulty handling, excessive vibration, chemical influence, excessive dust burden or non-adherence to the properties set forth in the unit specifications. Unreasonable wait times and delays in the performance of services which are caused by the Customer. Services to remedy failures caused by Force Majeure. 33. Backup of Customer Data Prior to the commencement of any service work undertaken by MT, the Customer will backup all data in such a way that it may easily be restored by MT in the event that it is lost in the service process. 34. Change of Installation/Application Site Where maintenance and care services are provided on an ongoing basis by MT, the Customer will immediately inform MT in writing of any change to the installation or application address. If such a change results in an increase in MT’s expenses. MT reserves the right to either increase the prices charged to recover the additional expense incurred or alternatively MT may serve notice on the Customer to terminate the Contract where the new address is outside United Kingdom. 35. Miscellaneous Service Conditions and Obligations of the Customer to Co-operate MT may appoint authorised third parties to provide services. The Customer may only transfer title to services to third parties with the prior written consent of MT. Where defective components or devices are replaced by MT, these will become the property of MT. Extension of the products included in the maintenance agreement may be included in this Contract with the consent of the Customer. On request, MT will offer to the Customer a corresponding extension of the Contract, provided maintenance for the respective product is available. Where MT has to perform any services, the Customer shall accurately and without delay provide MT with any/all information that is required to perform such services. The Customer will provide MT with the name of a competent and appropriately qualified contact person and will provide the name of an appropriate substitute in order for the Hardware and Software to be maintained. Any contact(s) will have participated in the respective Seminars and/or Training Sessions held from time to time by MT or alternatively will have acquired comparable knowledge. These contacts will be available to MT’s technicians on site or will have access to the MT’s hotline as applicable. Consumables and Auxiliaries (which shall include documentation, application programs, data, telephone lines for transmission of voice and data) are not included in the scope of performance and shall be provided by the Customer in the vicinity of the system, such consumables and auxiliaries will be provided during Working Hours or, with prior consultation, outside of these hours. Additionally, the Customer will provide to MT computing time and consumables as required. 36. Specifically Ordered Service Days If service days are ordered for call-off within a specified period, such orders are binding. The services will become due for payment once they have been performed or by the end of the defined time period at the latest. Specifically ordered service days to be called off within a defined time period, can still be called off during a time of three months beyond the expiry of such defined time period. Thereafter they are lost. The claim to payment is thereby unaffected. For users that register on our website (if any), we also store the personal information they provide in their user profile. All users can see, edit, or delete their personal information at any time (except they cannot change their username). Website administrators can also see and edit that information.

1...789

Courses matching "Object"

Show all 6131

VIRTUAL DENTAL NURSING DIPLOMA

4.4(67)

By London Waterloo Academy

Our Virtual (via Zoom) course provide the same high-quality tuition as our classroom-based sessions. Quarterly meetings will take place at the Academy Dental Nursing Diploma with National Examining Board for Dental Nurses (NEBDN) is an internationally recognised qualification that will allow you to work as a Dental Nurse in hospitals, NHS and private dental practices. Successful completion of Dental Nursing Diploma course will enable you to register as a Dental Care Professional with the General Dental Council (GDC) and practice as a qualified Dental Nurse. Discover the exciting world of dental nursing and be a part of a growing field that offers endless opportunities for growth and development. How will you learn? In addition to our traditional class-based tuition, we also offer Virtual (via Zoom) Learning courses to cater to different learning preferences. Our Virtual Learning courses provide the same high-quality tuition as our classroom-based sessions. To participate, you will need a laptop, PC, smart phone or tablet with a built-in or external camera and microphone. From the comfort of your own home, you will have the opportunity to communicate with your tutor and classmates through video chat, using your phone or computer camera. This allows for seamless interaction, discussions, and collaborative learning. Quarterly meetings at the Academy To ensure a well-rounded learning experience, you will be required to attend face-to-face lessons at the Academy on a quarterly basis, which means every three months. These sessions serve several important purposes: Practical Units: Some aspects of the course require hands-on practical training. The face-to-face lessons will cover these practical units, allowing you to gain valuable experience and apply the knowledge you have acquired during the virtual learning sessions. Tests and Mock Exams: These assessments are important for evaluating your progress, identifying areas for improvement, and preparing you for the final exams. The Academy will provide a controlled and supervised environment to ensure the integrity and fairness of these assessments. Attending quarterly face-to-face lessons provides a balanced approach to your learning journey. It combines the convenience and flexibility of virtual learning with the benefits of in-person interactions, practical training, and assessments. By participating in these sessions, you will have the opportunity to reinforce your knowledge, receive personalized feedback, and build a stronger connection with your tutor and classmates. The Academy is dedicated to supporting your growth and success in dental nursing field, and the face-to-face lessons are an integral part of that commitment. Being a Dental Nurse can be an exciting and fulfilling career that allows you to make a positive impact on people’s lives while enjoying a variety of work and opportunities to learn and grow. You’ll get to work with an amazing dental team and get to know patients, helping them to feel at ease and comfortable during their visit. You’ll be the one behind the scene making sure everything runs smoothly, and you’ll be the one that patients will turn to for assistance. You’ll also get to be a part of the latest advancements in dental technology and treatment. And on top of all that, you get to have a flexible schedule and a good earning potential, with the potential to advance in your career. All in all, being a dental nurse is one of the most exciting and fulfilling career that you can have, and you’ll get to leave work every day knowing you’ve made a real difference in the lives of others. The course is delivered by Team of Dental Professionals who are examiners, dentists and experienced Dental tutors with years of experience in teaching Dentistry. Dental Nurses are involved in a wide range of procedures, from routine check-ups to complex surgeries, which can make the job interesting and varied. Patient-centered care: Dental Nurses have a direct impact on the patient’s experience and can make a positive difference in people’s lives by providing them with quality care. Professional development: Dental Nurses have the opportunity to continue their education and expand their skills, leading to advancement and new opportunities in the field. No previous experience required – we will teach you from A to Z. Do you need a job? Yes, you will have 3 months’ time from the start of your course to find a placement. The Academy provides a list of Private and NHS Dental Surgeries, who are regularly contacting us when looking for more Trainee Dental Nurses, so you can contact them directly as a registered student at the Academy. This is a paid job, unless you would like to work voluntary for personal reasons. We also provide a reference letter to the employee in case you need it. The course is ideal for you if: You are looking for a qualification that leads to employment You intend to participate within dentistry and make a positive contribution to the dental health You wish to learn how to maintain high standards of hygiene, cleanliness, health & safety You enjoy interacting with multidisciplinary team and different people The curriculum is based on the GDC (General Dental Council) registration requirements for dental nurses. It sets out the knowledge, skills and behavioural requirements that should be developed and demonstrated. These are set out in terms of professional competencies, with the assessment method clearly outlined (e.g. how the skills and knowledge will be assessed in the final examinations – via written questions such as multiple choice (MCQ) or extended matching questions (EMQ) or via Objective Structured Clinical Examinations – OSCEs). We are proud to announce that our Dental Nursing students has the highest examination pass rate in OSCE examinations! Free services– workshops, mock exams, eRoE marking and internal moderation. Earn while you learn could be another benefit for doing this course. We provide a list of Private Surgeries who have been working with us for the last 14 years and looking to recruit more Trainee Dental Nurses. Working together – At our Dental Department, we prioritise working together with our learners every step of the way. We firmly believe in providing unwavering support, equipping you with the necessary tools, skills, and assistance to ensure your success. We take immense pride in the achievements of our students, with a long list of graduates boasting remarkable success stories. Our commitment to your success serves as the foundation for our own accomplishments What Can You Expect to Earn as a Dental Nurse? Compared to other caring professions, Dental Nursing is well paid and offers plenty of opportunity for continued training and development. This is great for those looking on a the long-term plan for their career and those who wish to work their way up the ladder through continued learning, experience & hard work. Trainee Dental Nurse salary for standard working week will be around £23,000 per annum. Average wage for a qualified Dental Nurses between £40,417 to £42,350 p.a. When are the exams? There are two exams: 1. Multiple choice theory exam. November and March. 2. Practical exam. January and June. Record of Experience (eROE) To be eligible to sit your first exam, you have to complete your electronic Record of Experience (eROE). The eROE has to be submitted to your tutor by 31st Jan for March exam, and 31st August for November exam. London Waterloo Academy supports Mouth Cancer Research Foundation and encouraging learners to raise the awareness and participate in annual 10k walk. Study mode – virtual (via Zoom) live stream lessons combined with a quarterly meetings Saturday/Sunday at the Academy Duration – 1 year (part time) Virtual (via Zoom) classes – once a week Quarterly meetings at the Academy – date are discussed with the group in advance Next Intake/start dates (please choose one for your course to start): 21 September 2024, Saturday classes from 9am to 11am Registration fee – £300 (includes: administration, workshops, mock exams, RoE marking, internal moderation of RoE) Tuition Fees – £1,400 (we offer payment plan, and accept instalments) Exam fee – £510 will be charged at the point of candidate registration with NEBDN One day introduction course – for those who are considering/not sure whether to step up into the Dental Industry £50.00 Call us +44 (0) 7484 014980 or email to info@waterlooacademy.co.uk or Facebook – London Waterloo Academy Office location: The Foundry, 156 Blackfriars Rd, London SE1 8EN (Southwark Station (2-3 min walk) and Waterloo/Blackfriars Station (10 min walk))

VIRTUAL DENTAL NURSING DIPLOMA
Delivered Online + more
£50 to £1,400

55337 Introduction to Programming

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for anyone who is new to software development and wants, or needs, to gain an understanding of programming fundamentals and object-oriented programming concepts. They will typically be high school students, post-secondary school students, or career changers, with no prior programming experience. They might want to gain an understanding of the core programming fundamentals before moving on to more advanced courses such as Programming in C#. Overview Explain core programming fundamentals such as computer storage and processing. Explain computer number systems such as binary. Create and use variables and constants in programs. Explain how to create and use functions in a program. Create and use decisions structures in a computer program. Create and use repetition (loops) in a computer program. Explain pseudocode and its role in programming. Explain the basic computer data structures such as arrays, lists, stacks, and queues. Implement object-oriented programming concepts. Create and use classes in a computer program. Implement encapsulation, inheritance, and polymorphism. Describe the base class library (BCL) in the .NET Framework. Explain the application security concepts. Implement simple I/O in a computer program. Identify application errors and explain how to debug an application and handle errors. Identify the performance considerations for applications. In this 5-day course, students will learn the basics of computer programming through the use of Microsoft Visual Studio 2022 and the Visual C# and Visual Basic programming languages. The course assumes no prior programming experience and introduces the concepts needed to progress to the intermediate courses on programming, Programming in C#. The focus will be on core programming concepts such as computer storage, data types, decision structures, and repetition by using loops. The course also covers an introduction to object-oriented programming covering classes, encapsulation, inheritance, and polymorphism. Coverage is also included around exception handling, application security, performance, and memory management. 1 - Introduction to Core Programming Concepts Computer Data Storage and Processing Application Types Application Lifecycle Code Compilation 2 - Core Programming Language Concepts Syntax Data Types Variables and Constants 3 - Program Flow Introduction to Structured Programming Concepts Introduction to Branching Using Functions Using Decision Structures Introducing Repetition 4 - Algorithms and Data Structures Understand How to Write Pseudocode Algorithm Examples Introduction to Data Structures 5 - Error Handling and Debugging Introduction to Program Errors Introduction to Structured Error Handling Introduction to Debugging 6 - Introduction to Object-Oriented Programming Introduction to Complex Structures Introduction to Structs Introduction to Classes Introducing Encapsulation 7 - More Object-Oriented Programming Introduction to Inheritance Introduction to Polymorphism Introduction to .NET and the Base Class Library 8 - Introduction to Application Security Authentication and Authorization Code Permissions on Computers Introducing Code Signing 9 - Core I/O Programming Using Console I/O Using File I/O 10 - Application Performance and Memory Management Value Types vs Reference Types Converting Types The Garbage Collector Additional course details: Nexus Humans 55337 Introduction to Programming training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the 55337 Introduction to Programming course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

55337 Introduction to Programming
Delivered Online
£2,975

DP-300T00 Administering Microsoft Azure SQL Solutions

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for The audience for this course is data professionals managing data and databases who want to learn about administering the data platform technologies that are available on Microsoft Azure. This course is also valuable for data architects and application developers who need to understand what technologies are available for the data platform with Azure and how to work with those technologies through applications. This course provides students with the knowledge and skills to administer a SQL Server database infrastructure for cloud, on-premises and hybrid relational databases and who work with the Microsoft PaaS relational database offerings. Additionally, it will be of use to individuals who develop applications that deliver content from SQL-based relational databases. Prerequisites In addition to their professional experience, students who take this training should have technical knowledge equivalent to the following courses: AZ-900T00 Microsoft Azure Fundamentals DP-900T00 Microsoft Azure Data Fundamentals 1 - Prepare to maintain SQL databases on Azure Describe Microsoft Intelligent Data Platform roles Understand SQL Server in an Azure virtual machine Design Azure SQL Database for cloud-native applications Explore Azure SQL Database Managed Instance 2 - Deploy IaaS solutions with Azure SQL Explain IaaS options to deploy SQL Server in Azure Understand hybrid scenarios Explore performance and security Explain high availability and disaster recovery options 3 - Deploy PaaS solutions with Azure SQL Explain PaaS options for deploying SQL Server in Azure Explore single SQL database Deploy SQL database elastic pool Understand SQL database hyperscale Examine SQL managed instance Describe SQL Edge 4 - Evaluate strategies for migrating to Azure SQL Understand compatibility level Understand Azure preview features Describe Azure database migration options 5 - Migrate SQL workloads to Azure SQL databases Choose the right SQL Server Instance option in Azure Migrate SQL Server to Azure SQL Database offline Migrate SQL Server to Azure SQL Database online Load and move data to Azure SQL Database 6 - Migrate SQL workloads to Azure Managed Instances Evaluate migration scenarios to SQL Database Managed Instance Migrate to SQL Database Managed Instance Load and Move data to SQL Database Managed Instance 7 - Configure database authentication and authorization Describe Active Directory and Azure Active Directory Describe authentication and identities Describe Security Principals Describe database and object permissions Identify authentication and authorization failures 8 - Protect data in-transit and at rest Explore Transparent Data Encryption Configure server and database firewall rules Explain object encryption and secure enclaves Enable encrypted connections Describe SQL injection Understand Azure Key Vault 9 - Implement compliance controls for sensitive data Explore data classification Explore server and database audit Implement Dynamic Data Masking Implement Row Level security Understand Microsoft Defender for SQL Explore Azure SQL Database Ledger Implement Azure Purview 10 - Describe performance monitoring Describe performance monitoring tools Describe critical performance metrics Establish baseline metrics Explore extended events Describe Azure SQL Insights Explore Query Performance Insight 11 - Configure SQL Server resources for optimal performance Explain how to optimize Azure storage for SQL Server virtual machines Describe virtual machine resizing Optimize database storage Control SQL Server resources 12 - Configure databases for optimal performance Explore database maintenance checks Describe database scoped configuration options Describe automatic tuning Describe intelligent query processing 13 - Explore query performance optimization Understand query plans Explain estimated and actual query plans Describe dynamic management views and functions Explore Query Store Identify problematic query plans Describe blocking and locking 14 - Evaluate performance improvements Describe wait statistics Tune and maintain indexes Understand query hints 15 - Explore performance-based design Describe normalization Choose appropriate data types Design indexes 16 - Automate deployment of database resources Describe deployment models in Azure Automate deployment by using Azure Resource Manager templates and Bicep Automate deployment by using PowerShell Automate deployment by using Azure CLI 17 - Create and manage SQL Agent jobs Create a SQL Server maintenance plan Describe task status notifications 18 - Manage Azure PaaS tasks using automation Explore Elastic jobs Understand Azure Automation Build an automation runbook Automate database workflows by using Logic Apps Monitor automated tasks 19 - Describe high availability and disaster recovery strategies Describe recovery time objective and recovery point objective Explore high availability and disaster recovery options Describe Azure high availability and disaster recovery features for Azure Virtual Machines Describe high availability and disaster recovery options for PaaS deployments Explore an IaaS high availability and disaster recovery solution Describe hybrid solutions 20 - Explore IaaS and PaaS solutions for high availability and disaster recovery Describe failover clusters in Windows Server Configure Always-on availability groups Describe temporal tables in Azure SQL Database Describe active geo-replication for Azure SQL Database Explore auto-failover groups for Azure SQL Database and Azure SQL Managed Instance 21 - Back up and restore databases Back up and restore SQL Server running on Azure virtual machines Back up a SQL Server virtual machine Back up and restore a database using Azure SQL Database Additional course details: Nexus Humans DP-300T00: Administering Microsoft Azure SQL Solutions training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the DP-300T00: Administering Microsoft Azure SQL Solutions course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

DP-300T00 Administering Microsoft Azure SQL Solutions
Delivered Online
£2,380

AZ-204T00 Developing Solutions for Microsoft Azure

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Students in this course are interested in Azure development or in passing the Microsoft Azure Developer Associate certification exam. This course teaches developers how to create end-to-end solutions in Microsoft Azure. Students will learn how to implement Azure compute solutions, create Azure Functions, implement and manage web apps, develop solutions utilizing Azure storage, implement authentication and authorization, and secure their solutions by using KeyVault and Managed Identities. Students will also learn how to connect to and consume Azure services and third-party services, and include event- and message-based models in their solutions. The course also covers monitoring, troubleshooting, and optimizing Azure solutions. Prerequisites To be successful in this course, learners should have the following: Hands-on experience with Azure IaaS and PaaS solutions, and the Azure Portal. Experience writing in an Azure supported language at the intermediate level. (C#, JavaScript, Python, or Java) Ability to write code to connect and perform operations on, a SQL or NoSQL database product. (SQL Server, Oracle, MongoDB, Cassandra or similar) Experience writing code to handle authentication, authorization, and other security principles at the intermediate level. A general understanding of HTML, the HTTP protocol and REST API interfaces. 1 - Explore Azure App Service Examine Azure App Service Examine Azure App Service plans Deploy to App Service Explore authentication and authorization in App Service Discover App Service networking features 2 - Configure web app settings Configure application settings Configure general settings Configure path mappings Enable diagnostic logging Configure security certificates 3 - Scale apps in Azure App Service Examine autoscale factors Identify autoscale factors Enable autoscale in App Service Explore autoscale best practices 4 - Explore Azure App Service deployment slots Explore staging environments Examine slot swapping Swap deployment slots Route traffic in App Service 5 - Explore Azure Functions Discover Azure Functions Compare Azure Functions hosting options Scale Azure Functions 6 - Develop Azure Functions Explore Azure Functions development Create triggers and bindings Connect functions to Azure services 7 - Explore Azure Blob storage Explore Azure Blob storage Discover Azure Blob storage resource types Explore Azure Storage security features Discover static website hosting in Azure Storage 8 - Manage the Azure Blob storage lifecycle Explore the Azure Blob storage lifecycle Discover Blob storage lifecycle policies Implement Blob storage lifecycle policies Rehydrate blob data from the archive tier 9 - Work with Azure Blob storage Explore Azure Blob storage client library Create a client object Manage container properties and metadata by using .NET Set and retrieve properties and metadata for blob resources by using REST 10 - Explore Azure Cosmos DB Identify key benefits of Azure Cosmos DB Explore the resource hierarchy Explore consistency levels Choose the right consistency level Explore supported APIs Discover request units 11 - Work with Azure Cosmos DB Explore Microsoft .NET SDK v3 for Azure Cosmos DB Create stored procedures Create triggers and user-defined functions Explore change feed in Azure Cosmos DB 12 - Manage container images in Azure Container Registry Discover the Azure Container Registry Explore storage capabilities Build and manage containers with tasks Explore elements of a Dockerfile 13 - Run container images in Azure Container Instances Explore Azure Container Instances Run containerized tasks with restart policies Set environment variables in container instances Mount an Azure file share in Azure Container Instances 14 - Implement Azure Container Apps Explore Azure Container Apps Explore containers in Azure Container Apps Implement authentication and authorization in Azure Container Apps Manage revisions and secrets in Azure Container Apps Explore Dapr integration with Azure Container Apps 15 - Explore the Microsoft identity platform Explore the Microsoft identity platform Explore service principals Discover permissions and consent Discover conditional access 16 - Implement authentication by using the Microsoft Authentication Library Explore the Microsoft Authentication Library Initialize client applications 17 - Implement shared access signatures Discover shared access signatures Choose when to use shared access signatures Explore stored access policies 18 - Explore Microsoft Graph Discover Microsoft Graph Query Microsoft Graph by using REST Query Microsoft Graph by using SDKs Apply best practices to Microsoft Graph 19 - Implement Azure Key Vault Explore Azure Key Vault Discover Azure Key Vault best practices Authenticate to Azure Key Vault 20 - Implement managed identities Explore managed identities Discover the managed identities authentication flow Configure managed identities Acquire an access token 21 - Implement Azure App Configuration Explore the Azure App Configuration service Create paired keys and values Manage application features Secure app configuration data 22 - Explore API Management Discover the API Management service Explore API gateways Explore API Management policies Create advanced policies Secure APIs by using subscriptions Secure APIs by using certificates 23 - Explore Azure Event Grid Explore Azure Event Grid Discover event schemas Explore event delivery durability Control access to events Receive events by using webhooks Filter events 24 - Explore Azure Event Hubs Discover Azure Event Hubs Explore Event Hubs Capture Scale your processing application Control access to events Perform common operations with the Event Hubs client library 25 - Discover Azure message queues Choose a message queue solution Explore Azure Service Bus Discover Service Bus queues, topics, and subscriptions Explore Service Bus message payloads and serialization Explore Azure Queue Storage Create and manage Azure Queue Storage and messages by using .NET 26 - Monitor app performance Explore Application Insights Discover log-based metrics Instrument an app for monitoring Select an availability test Troubleshoot app performance by using Application Map 27 - Develop for Azure Cache for Redis Explore Azure Cache for Redis Configure Azure Cache for Redis Interact with Azure Cache for Redis by using .NET 28 - Develop for storage on CDNs Explore Azure Content Delivery Networks Control cache behavior on Azure Content Delivery Networks Interact with Azure Content Delivery Networks by using .NET

AZ-204T00 Developing Solutions for Microsoft Azure
Delivered Online
£2,975

AZ-040T00 Automating Administration with Powershell

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for IT Professionals who are already experienced in general Windows Server, Windows client, Azure, and Microsoft 365 administration, and who want to learn more about using Windows PowerShell for administration. No prior experience with any version of PowerShell or any scripting language is assumed. This course is also suitable for IT Professionals already experienced in server administration, including Microsoft Exchange Server, Microsoft SharePoint Server, and Microsoft SQL Server. This course provides students with the fundamental knowledge and skills to use PowerShell for administering and automating administration of Windows servers. This course provides students the skills to identify and build the command they require to perform a specific task. In addition, students learn how to build scripts to accomplish advanced tasks such as automating repetitive tasks and generating reports. This course provides prerequisite skills supporting a broad range of Microsoft products, including Windows Server, Windows Client, Microsoft Azure, and Microsoft 365. In keeping with that goal, this course will not focus on any one of those products, although Windows Server, which is the common platform for all of those products, will serve as the example for the techniques this course teaches. Prerequisites Before attending this course, students must have: -Experience with Windows networking technologies and implementation. - Experience with Windows Server administration, maintenance, and troubleshooting. 1 - Review Windows PowerShell Learn about Windows PowerShell Get familiar with Windows PowerShell applications Identify factors to install and use Windows PowerShell Configure the Windows PowerShell console Configure the Windows PowerShell Integrated Scripting Environment (ISE) Use Visual Studio Code with PowerShell 2 - Understand the command syntax in Windows PowerShell Discover the structure of PowerShell cmdlets Discover the parameters for using PowerShell cmdlets Review the tab completion feature in PowerShell Display the About files content in PowerShell 3 - Find commands and Get-Help in Windows PowerShell Define modules in PowerShell Find cmdlets in PowerShell Use command aliases in PowerShell Use Show-Command and Get-Help in PowerShell Interpret the help file contents and update the local help content in PowerShell 4 - Manage Active Directory Domain Services using PowerShell cmdlets Manage user accounts in PowerShell Manage groups and group memberships in PowerShell Manage computer accounts in PowerShell Manage organizational units and Active Directory objects in PowerShell 5 - Manage network service settings for Windows devices using PowerShell cmdlets Manage IP addresses in PowerShell Manage IP routing in PowerShell Manage DNS clients in PowerShell Manage Windows Firewall settings in PowerShell 6 - Manage Windows Server settings using PowerShell cmdlets Automate management tasks using the Group Policy management cmdlets Manage server roles and services using PowerShell cmdlets Manage Hyper-V Virtual Machines using PowerShell cmdlets Manage Internet Information Services using PowerShell cmdlets 7 - Manage settings for a local Windows machine using PowerShell cmdlets Manage Windows 10 using PowerShell Manage permissions with PowerShell 8 - Understand the Windows PowerShell pipeline Review Windows PowerShell pipeline and its output Discover object members in PowerShell Control the formatting of pipeline output 9 - Select, sort, and measure objects using the pipeline Sort and group objects by property in the pipeline Measure objects in the pipeline Select a set of objects in the pipeline Select object properties in the pipeline Create and format calculated properties in the pipeline 10 - Filter objects out of the pipeline Learn about the comparison operators in PowerShell Review basic filter syntax in the pipeline Review advanced filter syntax in the pipeline Optimize the filter performance in the pipeline 11 - Enumerate objects in the pipeline Learn about enumerations in the pipeline Review basic syntax to enumerate objects in the pipeline Review advanced syntax to enumerate objects in the pipeline 12 - Send and pass data as output from the pipeline Write pipeline data to a file Convert pipeline objects to other forms of data representation in PowerShell Control additional output options in PowerShell 13 - Pass pipeline objects Pipeline parameter binding Identify ByValue parameters Pass data by using ByValue Pass data by using ByPropertyName Identify ByPropertyName parameters Use manual parameters to override the pipeline Use parenthetical commands Expand property values 14 - Connect with data stores using PowerShell providers Define Windows PowerShell providers Review the built-in providers in PowerShell Access provider help in PowerShell 15 - Use PowerShell drives in PowerShell Explain PowerShell drives in PowerShell Use PowerShell drive cmdlets in PowerShell Manage the file system in PowerShell Manage the registry in PowerShell Work with certificates in PowerShell Work with other PowerShell drives in PowerShell 16 - Review CIM and WMI Review architecture of CIM and WMI Review repositories in CIM and WMI Locate online class documentation by using CIM and WMI cmdlets 17 - Query configuration information by using CIM and WMI List local repository namespaces and classes by using CIM and WMI Query instances by using commands and WMI Query Language Connect to remote computers by using CIM and WMI cmdlets Query repository classes from remote computers by using CIMSession objects 18 - Query and manipulate repository objects by using CIM and WMI methods Discover methods of repository objects by using CIM and WMI Locate class methods and documentation by using CIM and WMI Invoke methods of repository objects by using CIM and WMI 19 - Manage variables in Windows PowerShell scripts Define variables in Windows PowerShell scripts Create variable names in Windows PowerShell scripts Assign values and types to variables in Windows PowerShell scripts Identify the methods and properties of variables in Windows PowerShell scripts Use string variables and methods in Windows PowerShell scripts Use date variables and methods in Windows PowerShell scripts 20 - Work with arrays and hash tables in Windows PowerShell scripts Define an array in Windows PowerShell scripts Work with array lists in Windows PowerShell scripts Define hash tables in Windows PowerShell Scripts Work with hash tables in Windows PowerShell scripts 21 - Create and run scripts by using Windows PowerShell Review Windows PowerShell scripts Modify scripts in the PowerShell Gallery Create scripts using Windows PowerShell Review the PowerShellGet module in Windows PowerShell Run scripts and set the execution policy in Windows PowerShell Review Windows PowerShell and AppLocker Sign the scripts digitally in Windows PowerShell 22 - Work with scripting constructs in Windows PowerShell Review and use the ForEach loop in Windows PowerShell scripts Review and use the If construct in Windows PowerShell scripts Review and use the Switch construct in Windows PowerShell scripts Review the For construct in Windows PowerShell scripts Review other loop constructs in Windows PowerShell scripts Review Break and Continue in Windows PowerShell scripts 23 - Import data in different formats for use in scripts by using Windows PowerShell cmdlets Use the Get-Content command in Windows PowerShell scripts Use the Import-Csv cmdlet in Windows PowerShell scripts Use the Import-Clixml cmdlet in Windows PowerShell scripts Use the ConvertFrom-Json cmdlet in Windows PowerShell scripts 24 - Use methods to accept user inputs in Windows PowerShell scripts Identify values that might change in Windows PowerShell scripts Use the Read-Host cmdlet in Windows PowerShell scripts Use the Get-Credential cmdlet in Windows PowerShell scripts Use the Out-GridView cmdlet in Windows PowerShell scripts Pass parameters to a Windows PowerShell script 25 - Troubleshoot scripts and handle errors in Windows PowerShell Interpret error messages generated for Windows PowerShell commands Add output to Windows PowerShell scripts Use breakpoints in Windows PowerShell scripts Interpret error actions for Windows PowerShell commands 26 - Use functions and modules in Windows PowerShell scripts Review functions in Windows PowerShell scripts Use variable scope in Windows PowerShell scripts Create modules in Windows PowerShell scripts Use the dot sourcing feature in Windows PowerShell 27 - Manage single and multiple computers by using Windows PowerShell remoting Review the remoting feature of Windows PowerShell Compare remoting with remote connectivity Review the remoting security feature of Windows PowerShell Enable remoting by using Windows PowerShell Use one-to-one remoting by using Windows PowerShell Use one-to-many remoting by using Windows PowerShell Compare remoting output with local output 28 - Use advanced Windows PowerShell remoting techniques Review common remoting techniques of Windows PowerShell Send parameters to remote computers in Windows PowerShell Set access protection to variables, aliases, and functions by using the scope modifier Enable multi-hop remoting in Windows PowerShell 29 - Manage persistent connections to remote computers by using Windows PowerShell sessions Review persistent connections in Windows PowerShell Create and manage persistent PSSessions by using Windows PowerShell Disconnect PSSessions by using Windows PowerShell Review the feature of implicit remoting in Windows PowerShell 30 - Review Azure PowerShell module Review Azure PowerShell Review the benefits of the Azure PowerShell module Install the Azure PowerShell module Migrate Azure PowerShell from AzureRM to Azure Review Microsoft Azure Active Directory module for Windows PowerShell and Azure Active Directory PowerShell for Graph modules 31 - Review the features and tools for Azure Cloud Shell Review the characteristics of Azure Cloud Shell Review the features and tools of Azure Cloud Shell Configure and experiment with Azure Cloud Shell 32 - Manage Azure resources with Windows PowerShell Create a new Azure virtual machine by using Windows PowerShell commands Manage Azure virtual machines by using Windows PowerShell commands Manage Azure related storage by using Azure PowerShell Manage Azure subscriptions by using Azure PowerShell 33 - Manage users, groups, and licenses in Microsoft Entra ID by using Windows PowerShell Review benefits to manage Microsoft 365 services by using Windows PowerShell Connect to the Microsoft 365 tenant by using Windows PowerShell Manage users in Microsoft 365 by using Windows PowerShell Manage groups in Microsoft 365 by using Windows PowerShell Manage roles in Microsoft 365 by using Windows PowerShell Manage licenses in Microsoft 365 by using Windows PowerShell 34 - Manage Exchange Online by using Windows PowerShell Connect to Exchange Online by using Windows PowerShell Manage mailboxes in Exchange Online by using Windows PowerShell Manage resources in Exchange Online by using Windows PowerShell Manage admin roles in Exchange Online by using Windows PowerShell 35 - Manage SharePoint Online by using Windows PowerShell Install and connect to SharePoint Online Management Shell by using Windows PowerShell Manage SharePoint Online users and groups by using Windows PowerShell Manage SharePoint sites by using Windows PowerShell Manage SharePoint Online external user sharing by using Windows PowerShell 36 - Manage Microsoft Teams by using Windows PowerShell Review Microsoft Teams PowerShell module Install the Microsoft Teams PowerShell module Manage teams with Microsoft Teams PowerShell module 37 - Create and manage background jobs using Windows PowerShell Define the types of background jobs in Windows PowerShell Start remote jobs and CIM/WMI jobs in Windows PowerShell Monitor jobs in Windows PowerShell Retrieve results for running jobs in Windows PowerShell 38 - Create and manage scheduled jobs using Windows PowerShell Create and run Windows PowerShell scripts as scheduled tasks Define scheduled jobs in Windows PowerShell Create job option and job trigger objects in Windows PowerShell Create and register a scheduled job in Windows PowerShell Retrieve the results from a scheduled job in Windows PowerShell

AZ-040T00 Automating Administration with Powershell
Delivered Online
£2,975

MS-102T00 Microsoft 365 Administrator Essentials

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for persons aspiring to the Microsoft 365 Administrator role and have completed at least one of the Microsoft 365 role-based administrator certification paths. This course covers the following key elements of Microsoft 365 administration: Microsoft 365 tenant management, Microsoft 365 identity synchronization, and Microsoft 365 security and compliance. In Microsoft 365 tenant management, you learn how to configure your Microsoft 365 tenant, including your organizational profile, tenant subscription options, component services, user accounts and licenses, security groups, and administrative roles. You then transition to configuring Microsoft 365, with a primary focus on configuring Office client connectivity. Finally, you explore how to manage user-driven client installations of Microsoft 365 Apps for enterprise deployments. The course then transitions to an in-depth examination of Microsoft 365 identity synchronization, with a focus on Microsoft Entra Connect and Connect Cloud Sync. You learn how to plan for and implement each of these directory synchronization options, how to manage synchronized identities, and how to implement password management in Microsoft 365 using multifactor authentication and self-service password management. In Microsoft 365 security management, you begin examining the common types of threat vectors and data breaches facing organizations today. You then learn how Microsoft 365?s security solutions address each of these threats. You are introduced to the Microsoft Secure Score, as well as to Microsoft Entra ID Protection. You then learn how to manage the Microsoft 365 security services, including Exchange Online Protection, Safe Attachments, and Safe Links. Finally, you are introduced to the various reports that monitor an organization?s security health. You then transition from security services to threat intelligence; specifically, using Microsoft 365 Defender, Microsoft Defender for Cloud Apps, and Microsoft Defender for Endpoint. Once you have this understanding of Microsoft 365?s security suite, you then examine the key components of Microsoft 365 compliance management. This begins with an overview of all key aspects of data governance, including data archiving and retention, Microsoft Purview message encryption, and data loss prevention (DLP). You then delve deeper into archiving and retention, paying particular attention to Microsoft Purview insider risk management, information barriers, and DLP policies. You then examine how to implement these compliance features by using data classification and sensitivity labels. Prerequisites Completed a role-based administrator course such as Messaging, Teamwork, Security, Compliance, or Collaboration. A proficient understanding of DNS and basic functional experience with Microsoft 365 services. A proficient understanding of general IT practices. A working knowledge of PowerShell. 1 - Configure your Microsoft 365 experience Explore your Microsoft 365 cloud environment Configure your Microsoft 365 organizational profile Manage your tenant subscriptions in Microsoft 365 Integrate Microsoft 365 with customer engagement apps Complete your tenant configuration in Microsoft 365 2 - Manage users, licenses, and mail contacts in Microsoft 365 Determine the user identity model for your organization Create user accounts in Microsoft 365 Manage user account settings in Microsoft 365 Manage user licenses in Microsoft 365 Recover deleted user accounts in Microsoft 365 Perform bulk user maintenance in Microsoft Entra ID Create and manage guest users Create and manage mail contacts 3 - Manage groups in Microsoft 365 Examine groups in Microsoft 365 Create and manage groups in Microsoft 365 Create dynamic groups using Azure rule builder Create a Microsoft 365 group naming policy Create groups in Exchange Online and SharePoint Online 4 - Add a custom domain in Microsoft 365 Plan a custom domain for your Microsoft 365 deployment Plan the DNS zones for a custom domain Plan the DNS record requirements for a custom domain Create a custom domain in Microsoft 365 5 - Configure client connectivity to Microsoft 365 Examine how automatic client configuration works Explore the DNS records required for client configuration Configure Outlook clients Troubleshoot client connectivity 6 - Configure administrative roles in Microsoft 365 Explore the Microsoft 365 permission model Explore the Microsoft 365 admin roles Assign admin roles to users in Microsoft 365 Delegate admin roles to partners Manage permissions using administrative units in Microsoft Entra ID Elevate privileges using Microsoft Entra Privileged Identity Management Examine best practices when configuring administrative roles 7 - Manage tenant health and services in Microsoft 365 Monitor the health of your Microsoft 365 services Monitor tenant health using Microsoft 365 Adoption Score Monitor tenant health using Microsoft 365 usage analytics Develop an incident response plan Request assistance from Microsoft 8 - Deploy Microsoft 365 Apps for enterprise Explore Microsoft 365 Apps for enterprise functionality Explore your app compatibility by using the Readiness Toolkit Complete a self-service installation of Microsoft 365 Apps for enterprise Deploy Microsoft 365 Apps for enterprise with Microsoft Configuration Manager Deploy Microsoft 365 Apps for enterprise from the cloud Deploy Microsoft 365 Apps for enterprise from a local source Manage updates to Microsoft 365 Apps for enterprise Explore the update channels for Microsoft 365 Apps for enterprise Manage your cloud apps using the Microsoft 365 Apps admin center 9 - Analyze your Microsoft 365 workplace data using Microsoft Viva Insights Examine the analytical features of Microsoft Viva Insights Explore Personal insights Explore Team insights Explore Organization insights Explore Advanced insights 10 - Explore identity synchronization Examine identity models for Microsoft 365 Examine authentication options for the hybrid identity model Explore directory synchronization 11 - Prepare for identity synchronization to Microsoft 365 Plan your Microsoft Entra deployment Prepare for directory synchronization Choose your directory synchronization tool Plan for directory synchronization using Microsoft Entra Connect Plan for directory synchronization using Microsoft Entra Connect cloud sync 12 - Implement directory synchronization tools Configure Microsoft Entra Connect prerequisites Configure Microsoft Entra Connect Monitor synchronization services using Microsoft Entra Connect Health Configure Microsoft Entra Connect cloud sync prerequisites Configure Microsoft Entra Connect cloud sync 13 - Manage synchronized identities Manage users with directory synchronization Manage groups with directory synchronization Use Microsoft Entra Connect Sync Security Groups to help maintain directory synchronization Configure object filters for directory synchronization Explore Microsoft Identity Manager Troubleshoot directory synchronization 14 - Manage secure user access in Microsoft 365 Manage user passwords Enable pass-through authentication Enable multifactor authentication Enable passwordless sign-in with Microsoft Authenticator Explore self-service password management Explore Windows Hello for Business Implement Microsoft Entra Smart Lockout Implement conditional access policies Explore Security Defaults in Microsoft Entra ID Investigate authentication issues using sign-in logs 15 - Examine threat vectors and data breaches Explore today's work and threat landscape Examine how phishing retrieves sensitive information Examine how spoofing deceives users and compromises data security Compare spam and malware Examine account breaches Examine elevation of privilege attacks Examine how data exfiltration moves data out of your tenant Examine how attackers delete data from your tenant Examine how data spillage exposes data outside your tenant Examine other types of attacks 16 - Explore the Zero Trust security model Examine the principles and components of the Zero Trust model Plan for a Zero Trust security model in your organization Examine Microsoft's strategy for Zero Trust networking Adopt a Zero Trust approach 17 - Explore security solutions in Microsoft 365 Defender Enhance your email security using Exchange Online Protection and Microsoft Defender for Office 365 Protect your organization's identities using Microsoft Defender for Identity Protect your enterprise network against advanced threats using Microsoft Defender for Endpoint Protect against cyber attacks using Microsoft 365 Threat Intelligence Provide insight into suspicious activity using Microsoft Cloud App Security Review the security reports in Microsoft 365 Defender 18 - Examine Microsoft Secure Score Explore Microsoft Secure Score Assess your security posture with Microsoft Secure Score Improve your secure score Track your Microsoft Secure Score history and meet your goals 19 - Examine Privileged Identity Management Explore Privileged Identity Management in Microsoft Entra ID Configure Privileged Identity Management Audit Privileged Identity Management Control privileged admin tasks using Privileged Access Management 20 - Examine Azure Identity Protection Explore Azure Identity Protection Enable the default protection policies in Azure Identity Protection Explore the vulnerabilities and risk events detected by Azure Identity Protection Plan your identity investigation 21 - Examine Exchange Online Protection Examine the anti-malware pipeline Detect messages with spam or malware using Zero-hour auto purge Explore anti-spoofing protection provided by Exchange Online Protection Explore other anti-spoofing protection Examine outbound spam filtering 22 - Examine Microsoft Defender for Office 365 Climb the security ladder from EOP to Microsoft Defender for Office 365 Expand EOP protections by using Safe Attachments and Safe Links Manage spoofed intelligence Configure outbound spam filtering policies Unblock users from sending email 23 - Manage Safe Attachments Protect users from malicious attachments by using Safe Attachments Create Safe Attachment policies using Microsoft Defender for Office 365 Create Safe Attachments policies using PowerShell Modify an existing Safe Attachments policy Create a transport rule to bypass a Safe Attachments policy Examine the end-user experience with Safe Attachments 24 - Manage Safe Links Protect users from malicious URLs by using Safe Links Create Safe Links policies using Microsoft 365 Defender Create Safe Links policies using PowerShell Modify an existing Safe Links policy Create a transport rule to bypass a Safe Links policy Examine the end-user experience with Safe Links 25 - Explore threat intelligence in Microsoft 365 Defender Explore Microsoft Intelligent Security Graph Explore alert policies in Microsoft 365 Run automated investigations and responses Explore threat hunting with Microsoft Threat Protection Explore advanced threat hunting in Microsoft 365 Defender Explore threat analytics in Microsoft 365 Identify threat issues using Microsoft Defender reports 26 - Implement app protection by using Microsoft Defender for Cloud Apps Explore Microsoft Defender Cloud Apps Deploy Microsoft Defender for Cloud Apps Configure file policies in Microsoft Defender for Cloud Apps Manage and respond to alerts in Microsoft Defender for Cloud Apps Configure Cloud Discovery in Microsoft Defender for Cloud Apps Troubleshoot Cloud Discovery in Microsoft Defender for Cloud Apps 27 - Implement endpoint protection by using Microsoft Defender for Endpoint Explore Microsoft Defender for Endpoint Configure Microsoft Defender for Endpoint in Microsoft Intune Onboard devices in Microsoft Defender for Endpoint Manage endpoint vulnerabilities with Microsoft Defender Vulnerability Management Manage device discovery and vulnerability assessment Reduce your threat and vulnerability exposure 28 - Implement threat protection by using Microsoft Defender for Office 365 Explore the Microsoft Defender for Office 365 protection stack Investigate security attacks by using Threat Explorer Identify cybersecurity issues by using Threat Trackers Prepare for attacks with Attack simulation training 29 - Examine data governance solutions in Microsoft Purview Explore data governance and compliance in Microsoft Purview Protect sensitive data with Microsoft Purview Information Protection Govern organizational data using Microsoft Purview Data Lifecycle Management Minimize internal risks with Microsoft Purview Insider Risk Management Explore Microsoft Purview eDiscovery solutions 30 - Explore archiving and records management in Microsoft 365 Explore archive mailboxes in Microsoft 365 Enable archive mailboxes in Microsoft 365 Explore Microsoft Purview Records Management Implement Microsoft Purview Records Management Restore deleted data in Exchange Online Restore deleted data in SharePoint Online 31 - Explore retention in Microsoft 365 Explore retention by using retention policies and retention labels Compare capabilities in retention policies and retention labels Define the scope of a retention policy Examine the principles of retention Implement retention using retention policies, retention labels, and eDiscovery holds Restrict retention changes by using Preservation Lock 32 - Explore Microsoft Purview Message Encryption Examine Microsoft Purview Message Encryption Configure Microsoft Purview Message Encryption Define mail flow rules to encrypt email messages Add organizational branding to encrypted email messages Explore Microsoft Purview Advanced Message Encryption 33 - Explore compliance in Microsoft 365 Plan for security and compliance in Microsoft 365 Plan your beginning compliance tasks in Microsoft Purview Manage your compliance requirements with Compliance Manager Examine the Compliance Manager dashboard Analyze the Microsoft Compliance score 34 - Implement Microsoft Purview Insider Risk Management Explore insider risk management Plan for insider risk management Explore insider risk management policies Create insider risk management policies Investigate insider risk management activities and alerts Explore insider risk management cases 35 - Implement Microsoft Purview Information Barriers Explore Microsoft Purview Information Barriers Configure information barriers in Microsoft Purview Examine information barriers in Microsoft Teams Examine information barriers in OneDrive Examine information barriers in SharePoint 36 - Explore Microsoft Purview Data Loss Prevention Examine Data Loss Prevention Explore Endpoint data loss prevention Examine DLP policies View DLP policy results Explore DLP reports 37 - Implement Microsoft Purview Data Loss Prevention Plan to implement Microsoft Purview Data Loss Protection Implement Microsoft Purview's default DLP policies Design a custom DLP policy Create a custom DLP policy from a template Configure email notifications for DLP policies Configure policy tips for DLP policies 38 - Implement data classification of sensitive information Explore data classification Implement data classification in Microsoft 365 Explore trainable classifiers Create and retrain a trainable classifier View sensitive data using Content explorer and Activity explorer Detect sensitive information documents using Document Fingerprinting 39 - Explore sensitivity labels Manage data protection using sensitivity labels Explore what sensitivity labels can do Determine a sensitivity label's scope Apply sensitivity labels automatically Explore sensitivity label policies 40 - Implement sensitivity labels Plan your deployment strategy for sensitivity labels Examine the requirements to create a sensitivity label Create sensitivity labels Publish sensitivity labels Remove and delete sensitivity labels Additional course details: Nexus Humans MS-102T00: Microsoft 365 Administrator training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the MS-102T00: Microsoft 365 Administrator course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

MS-102T00 Microsoft 365 Administrator Essentials
Delivered Online
£2,975

C++ Bootcamp Course, 2-Months

4.6(12)

By PCWorkshops

C++ Bootcamp is for coding beginners: You want all the basic stuff, all the advanced stuff and practical experience and get a fantastic job in C++

C++ Bootcamp Course, 2-Months
Delivered Online + more
£2,000

MD-102T00 Microsoft 365 Endpoint Administrator

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The Microsoft 365 Endpoint Administrator is responsible for deploying, configuring, securing, managing, and monitoring devices and client applications in a corporate setting. Their duties include managing identity, access, policies, updates, and apps. They work alongside the M365 Enterprise Administrator to develop and execute a device strategy that aligns with the requirements of a modern organization. Microsoft 365 Endpoint Administrators should be well-versed in M365 workloads and possess extensive skills and experience in deploying, configuring, and maintaining Windows 11 and later, as well as non-Windows devices. Their role emphasizes cloud services over on-premises management technologies. In this course, students will learn to plan and execute an endpoint deployment strategy using contemporary deployment techniques and implementing update strategies. The course introduces essential elements of modern management, co-management approaches, and Microsoft Intune integration. It covers app deployment, management of browser-based applications, and key security concepts such as authentication, identities, access, and compliance policies. Technologies like Microsoft Entra ID, Azure Information Protection, and Microsoft Defender for Endpoint are explored to protect devices and data. Prerequisites The Modern Desktop Administrator must be familiar with M365 workloads and must have strong skills and experience of deploying, configuring, and maintaining Windows 11 and later, and non-Windows devices. 1 - Explore the Enterprise Desktop Examine benefits of modern management Examine the enterprise desktop life-cycle model Examine planning and purchasing Examine desktop deployment Plan an application deployment Plan for upgrades and retirement 2 - Explore Windows Editions Examine Windows client editions and capabilities Select client edition Examine hardware requirements 3 - Understand Microsoft Entra ID Examine Microsoft Entra ID Compare Microsoft Entra ID and Active Directory Domain Services Examine Microsoft Entra ID as a directory service for cloud apps Compare Microsoft Entra ID P1 and P2 plans Examine Microsoft Entra Domain Services 4 - Manage Microsoft Entra identities Examine RBAC and user roles in Microsoft Entra ID Create and manage users in Microsoft Entra ID Create and manage groups in Microsoft Entra ID Manage Microsoft Entra objects with PowerShell Synchronize objects from AD DS to Microsoft Entra ID 5 - Manage device authentication Describe Microsoft Entra join Examine Microsoft Entra join prerequisites limitations and benefits Join devices to Microsoft Entra ID Manage devices joined to Microsoft Entra ID 6 - Enroll devices using Microsoft Configuration Manager Deploy the Microsoft Configuration Manager client Monitor the Microsoft Configuration Manager client Manage the Microsoft Configuration Manager client 7 - Enroll devices using Microsoft Intune Manage mobile devices with Intune Enable mobile device management Explain considerations for device enrollment Manage corporate enrollment policy Enroll Windows devices in Intune Enroll Android devices in Intune Enroll iOS devices in Intune Explore device enrollment manager Monitor device enrollment Manage devices remotely 8 - Execute device profiles Explore Intune device profiles Create device profiles Create a custom device profile 9 - Oversee device profiles Monitor device profiles in Intune Manage device sync in Intune Manage devices in Intune using scripts 10 - Maintain user profiles Examine user profile Explore user profile types Examine options for minimizing user profile size Deploy and configure folder redirection Sync user state with Enterprise State Roaming Configure Enterprise State Roaming in Azure 11 - Execute mobile application management Examine mobile application management Examine considerations for mobile application management Prepare line-of-business apps for app protection policies Implement mobile application management policies in Intune Manage mobile application management policies in Intune 12 - Deploy and update applications Deploy applications with Intune Add apps to Intune Manage Win32 apps with Intune Deploy applications with Configuration Manager Deploying applications with Group Policy Assign and publish software Explore Microsoft Store for Business Implement Microsoft Store Apps Update Microsoft Store Apps with Intune Assign apps to company employees 13 - Administer endpoint applications Manage apps with Intune Manage Apps on non-enrolled devices Deploy Microsoft 365 Apps with Intune Additional Microsoft 365 Apps Deployment Tools Configure Microsoft Edge Internet Explorer mode App Inventory Review 14 - Protect identities in Microsoft Entra ID Explore Windows Hello for Business Deploy Windows Hello Manage Windows Hello for Business Explore Microsoft Entra ID Protection Manage self-service password reset in Microsoft Entra ID Implement multi-factor authentication 15 - Enable organizational access Enable access to organization resources Explore VPN types and configuration Explore Always On VPN Deploy Always On VPN 16 - Implement device compliance Protect access to resources using Intune Explore device compliance policy Deploy a device compliance policy Explore conditional access Create conditional access policies 17 - Generate inventory and compliance reports Report enrolled devices inventory in Intune Monitor and report device compliance Build custom Intune inventory reports Access Intune using Microsoft Graph API 18 - Deploy device data protection Explore Windows Information Protection Plan Windows Information Protection Implement and use Windows Information Protection Explore Encrypting File System in Windows client Explore BitLocker 19 - Manage Microsoft Defender for Endpoint Explore Microsoft Defender for Endpoint Examine key capabilities of Microsoft Defender for Endpoint Explore Windows Defender Application Control and Device Guard Explore Microsoft Defender Application Guard Examine Windows Defender Exploit Guard Explore Windows Defender System Guard 20 - Manage Microsoft Defender in Windows client Explore Windows Security Center Explore Windows Defender Credential Guard Manage Microsoft Defender Antivirus Manage Windows Defender Firewall Explore Windows Defender Firewall with Advanced Security 21 - Manage Microsoft Defender for Cloud Apps Explore Microsoft Defender for Cloud Apps Planning Microsoft Defender for Cloud Apps Implement Microsoft Defender for Cloud Apps 22 - Assess deployment readiness Examine deployment guidelines Explore readiness tools Assess application compatibility Explore tools for application compatibility mitigation Prepare network and directory for deployment Plan a pilot 23 - Deploy using the Microsoft Deployment Toolkit Evaluate traditional deployment methods Set up the Microsoft Deployment Toolkit for client deployment Manage and deploy images using the Microsoft Deployment Toolkit 24 - Deploy using Microsoft Configuration Manager Explore client deployment using Configuration Manager Examine deployment components of Configuration Manager Manage client deployment using Configuration Manager Plan in-place upgrades using Configuration Manager 25 - Deploy Devices using Windows Autopilot Use Autopilot for modern deployment Examine requirements for Windows Autopilot Prepare device IDs for Autopilot Implement device registration and out-of-the-box customization Examine Autopilot scenarios Troubleshoot Windows Autopilot 26 - Implement dynamic deployment methods Examine subscription activation Deploy using provisioning packages Use Windows Configuration Designer Use Microsoft Entra join with automatic MDM enrollment 27 - Plan a transition to modern endpoint management Explore using co-management to transition to modern endpoint management Examine prerequisites for co-management Evaluate modern management considerations Evaluate upgrades and migrations in modern transitioning Migrate data when modern transitioning Migrate workloads when modern transitioning 28 - Manage Windows 365 Explore Windows 365 Configure Windows 365 Administer Windows 365 29 - Manage Azure Virtual Desktop Examine Azure Virtual Desktop Explore Azure Virtual Desktop Configure Azure Virtual Desktop Administer Azure Virtual Desktop Additional course details: Nexus Humans MD-102T00 : Microsoft 365 Endpoint Administrator training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the MD-102T00 : Microsoft 365 Endpoint Administrator course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

MD-102T00 Microsoft 365 Endpoint Administrator
Delivered Online + more
£2,975

ITIL© 4 Strategist - Direct Plan and Improve (DPI)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Delegates attending this course must have successfully achieved the ITIL 4 Foundation Qualification; your certificate must be presented as documentary evidence to gain admission to this course. Although there is no mandatory requirement, ideally candidates should have at least two years professional experience working in IT Service Management. The ITIL 4 DPI Qualification would most likely suit the following delegates: Individuals continuing of their journey in service management ITSM managers and aspiring ITSM managers Managers of all levels involved in shaping direction and strategy or developing a continually improving team Existing ITIL qualification holders wishing to develop their knowledge The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs. Overview The purpose of the ITIL 4 Direct Plan and Improve Qualification is: To provide the candidate with the practical skills necessary to create a ?learning and improving? IT organization, with a strong and effective strategic direction To provide practitioners with a practical and strategic method for planning and delivering continual improvement with the necessary agility The objectives of this course are to: Understand the Key Concepts of Direct, Plan & Improve Understand the scope of what is to be directed and/or planned, and know how to use key principles and methods of direction and planning in that context Understand the role of GRC (Governance, Risk & Compliance) and know how to integrate the principles and methods into the service value system Understand and know how to use the key principles and methods of continual improvement for all types of improvements Understand and know how to use the key principles and methods of Organizational Change Management to direction, planning and improvement Understand and know how to use the key principles and methods of measurement and reporting in directing, planning and improvement Understand and know how to direct, plan and improve value streams and practices This unique and central course covers requirements in both the ITIL Managing Professional and ITIL Strategic Leader designations. As such, this course is a must-have in any ITIL 4 professional development plan. You will gain the practical skills needed to establish a ?learning and improving? IT organization that possess a strong and targeted strategic direction. This class includes an exam voucher. Prerequisites ITIL© 4 Foundation 1 - KEY CONCEPTS OF DIRECT, PLAN AND IMPROVE Knowing key terms Differentiating between principle concepts Defining the relationship of Values, Outcomes, Costs and Risks 2 - SCOPING WHAT IS TO BE DIRECTED Cascading goals and requirements Deciphering effective policies, controls and guidelines Placing decision-making authority at the correct level 3 - THE ROLE OF GRC IN THE SERVICE VALUE SYSTEM The role of risk management How governance impacts DPI Ensuring that controls are sufficient but not excessive 4 - PRINCIPLES AND METHODS FOR CONTINUAL IMPROVEMENT Leverage the ITIL CI model Identify assessment objectives and outputs Select the appropriate assessment method Prioritize desired outcomes Build, justify and advocate your business case Conduct improvement reviews and lessons learned sessions Embed CI at all levels of the service value stream 5 - APPLYING COMMUNICATION AND ORGANIZATIONAL CHANGE MANAGEMENT The nature and benefits of OCM Manage, communicate effectively, and influence stakeholders Establish valuable interfaces across the value chain 6 - EFFECTIVE MEASURING AND REPORTING Defining indicators and metrics to support objectives 7 - DIRECT, PLAN AND IMPROVE VALUE STREAMS Recognizing the differences between value streams and practices Choosing the right methods and techniques to direct, plan and improve value streams Additional course details:Notes New Horizons is an Authorised Training Organisation (ATO) for Peoplecert for ITIL4 Nexus Humans ITIL 4 Strategist Direct Plan and Improve (DPI) with Exam training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the ITIL 4 Strategist Direct Plan and Improve (DPI) with Exam course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

ITIL© 4 Strategist - Direct Plan and Improve (DPI)
Delivered Online
£2,385

AZ-800T00 Administering Windows Server Hybrid Core Infrastructure

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This four-day course is intended for Windows Server Hybrid Administrators who have experience working with Windows Server and want to extend the capabilities of their on-premises environments by combining on-premises and hybrid technologies. Windows Server Hybrid Administrators implement and manage on-premises and hybrid solutions such as identity, management, compute, networking, and storage in a Windows Server hybrid environment. This course teaches IT Professionals how to manage core Windows Server workloads and services using on-premises, hybrid, and cloud technologies. The course teaches IT Professionals how to implement and manage on-premises and hybrid solutions such as identity, management, compute, networking, and storage in a Windows Server hybrid environment. Prerequisites Experience with managing Windows Server operating system and Windows Server workloads in on-premises scenarios, including AD DS, DNS, DFS, Hyper-V, and File and Storage Services Experience with common Windows Server management tools (implied in the first prerequisite). Basic knowledge of core Microsoft compute, storage, networking, and virtualization technologies (implied in the first prerequisite). Experience and an understanding of core networking technologies such as IP addressing, name resolution, and Dynamic Host Configuration Protocol (DHCP) Experience working with and an understanding of Microsoft Hyper-V and basic server virtualization concepts Basic experience with implementing and managing IaaS services in Microsoft Azure Basic knowledge of Azure Active Directory Experience working hands-on with Windows client operating systems such as Windows 10 or Windows 11 Basic experience with Windows PowerShell 1 - Introduction to AD DS Define AD DS Define users, groups, and computers Define AD DS forests and domains Define OUs Manage objects and their properties in AD DS 2 - Manage AD DS domain controllers and FSMO roles Deploy AD DS domain controllers Maintain AD DS domain controllers Manage the AD DS Global Catalog role Manage AD DS operations masters Manage AD DS schema 3 - Implement Group Policy Objects Define GPOs Implement GPO scope and inheritance Define domain-based GPOs Create and configure a domain-based GPO Define GPO storage Define administrative templates 4 - Manage advanced features of AD DS Create trust relationships Implement ESAE forests Monitor and troubleshoot AD DS Create custom AD DS partitions 5 - Implement hybrid identity with Windows Server Select a Microsoft Entra integration model Plan for Microsoft Entra integration Prepare on-premises Active Directory for directory synchronization Install and configure directory synchronization with Microsoft Entra Connect Implement Seamless Single Sign-On Enable Microsoft Entra login in for Windows VM in Azure Describe Microsoft Entra Domain Services Implement and configure Microsoft Entra Domain Services Manage Windows Server 2019 in a Microsoft Entra Domain Services environment Create and configure a Microsoft Entra Domain Services instance Join a Windows Server VM to a managed domain 6 - Deploy and manage Azure IaaS Active Directory domain controllers in Azure Select an option to implement directory and identity services using Active Directory Domain Services in Azure Deploy and configure Active Directory Domain Services domain controllers in Azure VMs Install a replica Active Directory domain controller in an Azure VM Install a new Active Directory forest on an Azure VNet 7 - Perform Windows Server secure administration Define least privilege administration Implement delegated privileges Use privileged access workstations Use jump servers 8 - Describe Windows Server administration tools Explore Windows Admin Center Use Server Manager List Remote Server Administration Tools Use Windows PowerShell Use Windows PowerShell to remotely administer a server 9 - Perform post-installation configuration of Windows Server List the available post-installation configuration tools Configure Server Core using Sconfig Use DSC to configure Windows Server Perform post-installation configuration with Windows Admin Center Configure a server with answer files 10 - Just Enough Administration in Windows Server Explain the concept of Just Enough Administration (JEA) Define role capabilities for a JEA endpoint Create a session configuration file to register a JEA endpoint Describe how JEA endpoints work to limit access to a PowerShell session Create and connect to a JEA endpoint Demonstration: Connect to a JEA endpoint 11 - Administer and manage Windows Server IaaS Virtual Machine remotely Select the appropriate remote administration tool Manage Windows Virtual Machines with Azure Bastion Create an Azure Bastion host Configure just-in-time administration 12 - Manage hybrid workloads with Azure Arc Describe Azure Arc Onboard Windows Server instances Connect hybrid machines to Azure from the Azure portal Use Azure Arc to manage Windows Server instances Restrict access with RBAC 13 - Configure and manage Hyper-V Define Hyper-V Define Hyper-V Manager Configure Hyper-V hosts using best practices Configure Hyper-V networking Assess advanced Hyper-V networking features Define nested virtualization 14 - Configure and manage Hyper-V virtual machines List the virtual machine configuration versions List the virtual machine generation versions List available VHD formats and types Create and configure VMs Determine storage options for VMs Define shared VHDs and VHD Sets Implement guest clusters using shared VHDX 15 - Secure Hyper-V workloads Define guarded fabric Define the Host Guardian Service Explore TPM-trusted attestation Define KPS Determine key features of shielded VMs Compare encryption-supported and shielded VMs in a guarded fabric Implement a shielded VM 16 - Run containers on Windows Server Define containers List the differences between containers and VMs Define Windows Server and Hyper-V containers and isolation modes Explore Docker Prepare a Windows Server 2019 host for container deployment Security, Storage, and Networking with Windows containers 17 - Orchestrate containers on Windows Server using Kubernetes Define orchestration Define Kubernetes Deploy Kubernetes resources Create a Kubernetes cluster on Windows Define Azure Arc Connect an Azure Arc-enabled Kubernetes cluster to Azure Arc 18 - Plan and deploy Windows Server IaaS Virtual Machines Describe Azure compute Describe Virtual Machine storage Deploy Azure Virtual Machines Create a windows Virtual Machine using the portal Create a windows Virtual Machine using Azure CLI Deploy Azure Virtual Machines using templates Describe additional management optimization options 19 - Customize Windows Server IaaS Virtual Machine images Create a generalized image Create a new Virtual Machine from a managed image Create a managed image of a generalized virtual machine in Azure Create a Virtual Machine from a managed image Implement Azure Image Builder Create a windows Virtual Machine using Azure Image Builder template Create a Windows Virtual Machine with Azure Image Builder using PowerShell 20 - Automate the configuration of Windows Server IaaS Virtual Machines Describe Azure Automation Implement Azure Automation with DSC Remediate noncompliant servers Describe Custom Script Extensions Configure a Virtual Machine by using DSC 21 - Deploy and manage DHCP Use DHCP to simplify IP configuration Install and configure the DHCP role Configure DHCP options Configure DHCP scopes Select DHCP high availability options Implement DHCP Failover 22 - Implement Windows Server DNS Explore the DNS architecture Work with DNS zones and records Install and configure the DNS role Implement DNS forwarding 23 - Implement IP Address Management Define IP Address Management Deploy IP Address Management Administer IP Address Management Configure IP Address Management options Manage DNS zones with IP Address Management Manage DHCP servers with IP Address Management Use IP Address Management to manage IP addressing 24 - Implement remote access Examine the remote access options in Windows Server Select and set up VPNs Use NPS to create and enforce network access policies Plan and implement NPS Deploy a PKI for remote access Use WAP as a reverse web proxy 25 - Implement hybrid network infrastructure Describe Azure network topologies Implement Azure VPN options Create a route-based VPN gateway using the Azure portal Implement Azure ExpressRoute Configure Azure Virtual WAN Implement DNS in hybrid environments 26 - Implement DNS for Windows Server IaaS VMs Understand Azure DNS Implement Azure DNS Create an Azure DNS zone and record using the Azure portal Implement DNS with Azure IaaS virtual machines Implement split-horizon DNS in Azure Troubleshoot DNS 27 - Implement Windows Server IaaS VM IP addressing and routing Implement a virtual network Implement IaaS VM IP addressing Assign and manage IP addresses Configure a private IP address for a virtual machine using the Azure portal Create a virtual machine with a static public IP address using the Azure portal Implement IaaS virtual machine IP routing Implement IPv6 for Windows Server IaaS virtual machines 28 - Manage Windows Server file servers Define the Windows Server file system List the benefits and uses of File Server Resource Manager Define SMB and its security considerations Configure SMB protocol Define Volume Shadow Copy Service 29 - Implement Storage Spaces and Storage Spaces Direct Define the Storage Spaces architecture and its components List the functionalities, benefits, and use cases of Storage Spaces Implement Storage Spaces List the functionalities, components, benefits, and use cases of Storage Spaces Direct Implement Storage Spaces Direct 30 - Implement Windows Server Data Deduplication Define the architecture, components, and functionality of Data Deduplication Define the use cases and interoperability of Data Deduplication Implement Data Deduplication Manage and maintain Data Deduplication 31 - Implement Windows Server iSCSI List the functionalities, components, and use cases of iSCSI List the considerations for implementing iSCSI Implement iSCSI Configure high availability for iSCSI 32 - Implement Windows Server Storage Replica List the functionalities and components of Storage Replica Examine the prerequisites for implementing Storage Replica Implement Storage Replica by using Windows Admin Center Implement Storage Replica by using Windows PowerShell 33 - Implement a hybrid file server infrastructure Describe Azure File services Configure Azure Files Configure connectivity to Azure Files Describe Azure File Sync Implement Azure File Sync Deploy Azure File Sync Deploy Azure File Sync 2 Manage cloud tiering Migrate from DFSR to Azure File Sync

AZ-800T00 Administering Windows Server Hybrid Core Infrastructure
Delivered Online
£2,380