Duration 4 Days 24 CPD hours This course is intended for This course is for IT Professionals with expertise in designing and implementing solutions running on Microsoft Azure. They should have broad knowledge of IT operations, including networking, virtualization, identity, security, business continuity, disaster recovery, data platform, budgeting, and governance. Azure Solution Architects use the Azure Portal and as they become more adept they use the Command Line Interface. Candidates must have expert-level skills in Azure administration and have experience with Azure development processes and DevOps processes. Overview Recommend solutions to minimize costs Recommend a solution for Conditional Access, including multi-factor authentication Recommend a solution for a hybrid identity including Azure AD Connect and Azure AD Connect Recommend a solution for using Azure Policy Recommend a solution that includes KeyVault Recommend a solution that includes Azure AD Managed Identities Recommend a storage access solution Design an Azure Site Recovery solution Recommend a solution for autoscaling Recommend a solution for containers Recommend a solution for network security Recommend a solution for migrating applications and VMs Recommend a solution for migration of databases This course teaches Solutions Architects how to translate business requirements into secure, scalable, and reliable solutions. Lessons include design considerations related to logging, cost analysis, authentication and authorization, governance, security, storage, high availability, and migration. This role requires decisions in multiple areas that affect an overall design solution. Design a Compute Solution Recommend a Solution for Compute Provisioning Determine Appropriate Compute Technologies Recommend a Solution for Containers Recommend a Solution for Automating Compute Management Design a Network Solution Recommend a Solution for Network Addressing and Name Resolution Recommend a Solution for Network Provisioning Recommend a Solution for Network Security Recommend a Solution for iInternete Connectivity and On-Premises Networks Recommend a Solution for Automating Network Management Recommend a Solution for Load Balancing and Rraffic Routing Design for Migration Assess and On-Premises Servers and Applications for Migration Recommend a Solution for Migrating Applications and VMs Recommend a Solution for Migration of Databases Design Authentication and Authorization Tips for Identity and Access Management Recommend a Solution for Multi-Factor Authentication Five Steps for Securing Identity Infrastructure Recommend a Solution for Single-Sign On (SSO) Recommend a Solution for a Hybrid Identity Recommend a Solution for B2B Integration Recommend a Hierarchical Structure for Management Groups Design Governance Recommend a Solution for using Azure Policy Recommend a Solution for using Azure Blueprint Design a Solution for Databases Select an Appropriate Data Platform Based on Requirements Overview of Azure Data Storage Recommend Database Service Tier Sizing Dynamically Scale Azure SQL Database and Azure SQL Managed Instances Recommend a Solution for Encrypting Data at Rest, Transmission, and In Use Select an Appropriate Storage Account Understanding Storage Tiers Recommend a Storage Access Solution Recommend Storage Management Tools Design Data Integration Recommend a Data Flow Recommend a Solution for Data Integration Design a Solution for Logging and Monitoring Azure Monitoring Services Azure Monitor Design a Solution for Backup and Recovery Recommend a Recovery Solution for Hybrid and On-Premises Workloads Design and Azure Site Recovery Solution Recommend a Solution for Recovery in Different Regions Recommend a Solution for Azure Backup Management Design a Solution for Data Archiving and Retention Design for High Availability Recommend a Solution for Application and Workload Redundancy Recommend a Solution for Autoscaling Identify Resources that Require High Availability Identify Storage Tpes for High Availability Recommend a Solution for Geo-Redundancy of Workloads Design for Cost Optimization Recommend Solutions for Cost Management Recommended Viewpoints for Minimizing Costs Design an Application Architecture Recommend a Microservices Architecture Recommend an Orchestration Solution for Deployment of Applications Recommend a Solution for API Integration Design Security for Applications Security for Applications and Services Recommend a Solution using Key Vault Recommend Solutions using Azure AD Managed Identities
Duration 4.125 Days 24.75 CPD hours This course is intended for The job roles best suited to the material in this course are: Project managers and consultants involved in business continuity Expert advisors seeking to master the implementation of the business continuity management system Individuals responsible to maintain conformity with BCMS requirements within an organization Members of the BCMS team Overview Understand the concepts, approaches, methods, and techniques used for the implementation and effective management of a BCMS. Learn how to interpret and implement the requirements of ISO 22301 in the specific context of an organization. Understand the operation of the business continuity management system and its processes based on ISO 22301. Learn how to interpret and implement the requirements of ISO 22301 in the specific context of an organization. No two disasters in the world cause equal damage. Between the unpredictability of natural disasters, information security breaches, and incidents of different nature, preparedness can make you stand out in the crowd and predict the future of your business. In light of this, proper planning is essential to mitigating risks, avoiding consequences, coping with the negative effects of disasters and incidents, but at the same time, continuing your daily operations so that customer needs do not remain unfulfilled.This training course will prepare its participants to implement a business continuity management system (BCMS) in compliance with the requirements of ISO 22301. Attending this training course allows you to gain a comprehensive understanding of the best practices of the business continuity management system and to be able to establish a framework that allows the organization to continue operating efficiently during disruptive events Introduction to ISO 22301 and initiation of a BCMS Training course objectives and structure Standards and regulatory frameworks Business continuity management system (BCMS) Fundamental business continuity concepts and principles Initiation of the BCMS implementation Understanding the organization and its context BCMS scope Implementation plan of a BCMS Leadership and commitment Business continuity policy Risks, opportunities, and business continuity objectives Support for the BCMS Business impact analysis Risk assessment Implementation of a BCMS Business continuity strategies and solutions Business continuity plans and procedures Incident response and emergency response Crisis management Exercise programs Monitoring, measurement, analysis, and evaluation Internal audit BCMS monitoring, continual improvement, and preparation for the certification audi Management review Treatment of nonconformities Continual improvement Preparation for the certification audit Closing of the training course
Duration 3.5 Days 21 CPD hours This course is intended for This course is for AWS Cloud Architects with expertise in designing and implementing solutions running on AWS who now want to design for Microsoft Azure. Overview After completing this course, students will be able to: Secure identities with Azure Active Directory and users and groups. Implement identity solutions spanning on-premises and cloud-based capabilities Apply monitoring solutions for collecting, combining, and analyzing data from different sources. Manage subscriptions, accounts, Azure policies, and Role-Based Access Control. Administer Azure using the Resource Manager, Azure portal, Cloud Shell, and CLI. Configure intersite connectivity solutions like VNet Peering, and virtual network gateways. Administer Azure App Service, Azure Container Instances, and Kubernetes. This course teaches Solutions Architects who have previously designed for Amazon Web Services how to translate business requirements into secure, scalable, and reliable solutions for Azure. Introduction to Azure Subscriptions and accounts Resource groups and templates in Azure Resource Manager Azure global infrastructure Azure regions Azure Availability Zones Comparison with AWS Implement Azure Active Directory Introduction to Azure Active Directory Domains and custom domains Safety features Guest users in Azure Active Directory Manage multiple directories Comparison with AWS Implement and manage hybrid identities Introduction to Azure AD Connect Comparison with AWS Implement virtual networking Azure Virtual Network and VNet peering VPN and ExpressRoute connections Comparison with AWS Implement VMs for Windows and Linux Configure high availability Comparison with AWS Implement load balancing and network security Implement Azure Load Balancer Implement an Azure Application Gateway Implement Azure Firewall Implement network security groups and application security groups Comparison with AWS Implement container-based applications Configure Azure Kubernetes Service Publish a solution on an Azure Container Instance Comparison with AWS Implement an application infrastructure Create an App Service plan Create and configure Azure App Service Configure networking for an App Service Introduction to Logic Apps and Azure Functions Comparison with AWS Implement storage accounts Azure Storage core concepts Managing the Azure Blob storage lifecycle Working with Azure Blob storage Comparison with AWS Implement NoSQL databases Introduction to Azure Cosmos DB Consistency Select appropriate CosmosDB APIs Set up replicas in CosmosDB Comparison with AWS DynamoDB Implement Azure SQL databases Configure Azure SQL database settings Implement Azure SQL Database managed instances Configure high availability for an Azure SQL database Comparison with AWS Implement cloud infrastructure monitoring Monitor security Monitor cost Configure a Log Analytics workspace Comparison with AWS Implement and manage Azure governance solutions Assign RBAC roles Configure management access to Azure Implement and configure an Azure Policy Comparison with AWS Manage security for applications Implement Azure Key Vault Implement and configure Azure AD Managed Identities Register and manage applications in Azure AD Comparison with AWS Migration, backup, and disaster recovery management Migrate workloads Implement Azure Backup for VMs Implement disaster recovery Comparison with AWS
Duration 2 Days 12 CPD hours This course is intended for This is an advanced course for DBAs and technical individuals who plan, implement, and maintain Db2 11.1 databases Overview Please refer to course overview This course is designed to teach you how to:Perform advanced monitoring using the Db2 administrative views and routines in SQL queries.Manage the disk space assigned in Database Managed Storage (DMS) and Automatic Storage table spaces, including the activities of the rebalancer.Use SQL queries and Db2 commands to check the high water mark on table spaces and to monitor the rebalance operation.Utilize the REBUILD option of RESTORE, which can build a database copy with a subset of the tablespaces using database or tablespace backup images.Plan and execute the TRANSPORT option of RESTORE to copy schemas of objects between two Db2 databases.Create incremental database or tablespace level backups to reduce backup processing and backup image storage requirements.Implement automatic storage management for table spaces and storage groups or enable automatic resize options for DMS managed table spaces to reduce administration requirements and complexity.Describe the various types of database memory including buffer pools, sort memory, lock memory and utility processing memory.Adjust database or Db2 instance configuration options to improve application performance or processing efficiency.Implement Db2 Self Tuning Memory management for specific database memory areas. Advanced MonitoringDb2 Table Space ManagementDb2 Database Memory ManagementDatabase rebuild supportDb2 database and tablespace relocationDb2 Incremental Backup
Course Overview This Criminal Law course provides an in-depth exploration of the fundamental principles and practices within criminal law. Covering key areas such as the elements of a crime, the role of law enforcement, the trial process, and various criminal offences, this course offers learners a comprehensive understanding of the subject. Learners will gain a solid foundation in criminal law, preparing them for further study or careers within the legal and law enforcement sectors. By the end of the course, participants will have developed a critical understanding of how criminal law operates in the UK, the procedures followed in law enforcement, and the nuances of different criminal offences. Course Description This course delves deeper into the various elements that make up criminal law, covering both theoretical and practical aspects. Topics include the definition and classification of crimes, the process of prosecution, the role of the police, and the broader concepts surrounding sentencing and trials. Learners will explore areas such as youth justice, white-collar crime, terrorism, cybercrime, and the workings of prisons and the probation service. Throughout, learners will acquire knowledge of the law's evolution, the principles of justice, and the importance of ethical considerations in criminal cases. The course offers a structured learning experience with a clear progression, ensuring learners build knowledge step-by-step. Course Modules: Criminal Law Module 1: Introduction to Criminal Law Criminal Law Module 2: Elements of a Crime Criminal Law Module 3: Incitement, Conspiracy and Attempt Criminal Law Module 4: Accomplice Criminal Law Module 5: Crime Prevention Criminal Law Module 6: The Police Criminal Law Module 7: Prosecution, Caution and Diversion Criminal Law Module 8: Youth Justice Criminal Law Module 9: The Trial Criminal Law Module 10: Sentencing Process Criminal Law Module 11: Homicide Criminal Law Module 12: Offences against Person Criminal Law Module 13: Sexual Offences Criminal Law Module 14: Theft Criminal Law Module 15: Blackmail, Robbery & Burglary Criminal Law Module 16: White-Collar Crime Criminal Law Module 17: Terrorism & Law Criminal Law Module 18: Property Offences Criminal Law Module 19: Cybercrime & Piracy Criminal Law Module 20: Prisons Criminal Law Module 21: Probation Service Criminal Law Module 22: War Crimes (See full curriculum) Who is this course for? Individuals seeking to understand the key principles of criminal law. Professionals aiming to expand their legal knowledge and expertise. Beginners with an interest in pursuing a career in law or criminal justice. Those interested in understanding the framework of crime and justice systems. Career Path Criminal lawyer Legal assistant or paralegal Police officer or law enforcement personnel Public prosecutor Correctional officer Compliance officer in corporate law Victim support services Researcher in criminal justice
Course Overview This comprehensive course is designed to provide a well-rounded understanding of GDPR compliance, data protection frameworks, and key cyber security legislation in the UK and beyond. Covering topics from legal obligations under the General Data Protection Regulation to the implications of cyber crime on modern business, this programme equips learners with the knowledge needed to navigate the increasingly regulated digital landscape. Whether you are responsible for handling sensitive data or advising on compliance procedures, this course offers vital insight into maintaining data integrity and organisational transparency. Upon completion, learners will be able to interpret key legal requirements, identify risk areas, and support best practices within their professional setting. Course Description The GDPR Compliance, Data Protection & Cyber Security Law course explores a range of essential subjects that influence today’s data-driven industries. Learners will gain a strong foundation in legal and regulatory aspects of data handling, including the principles of GDPR, cyber law, and anti-money laundering frameworks. The course also includes modules on commercial and business law to deepen understanding of corporate responsibilities in data management. Ideal for legal assistants, compliance officers, or business managers, this course helps learners enhance their ability to assess data security measures and ensure alignment with current regulations. With a structured curriculum and accessible learning materials, this programme supports learners in achieving a robust legal and regulatory understanding. Course Modules: Module 01: GDPR Module 02: Data Protection Module 03: Paralegal Training Module 04: Commercial Law Module 05: Cyber Law Online Course Module 06: Business Law Module 07: Cyber Security Awareness Training Module 08: Anti-Money Laundering (AML) Training (See full curriculum) Who is this course for? Individuals seeking to understand GDPR and data security regulations. Professionals aiming to improve compliance and data governance within their roles. Beginners with an interest in legal and cyber regulatory frameworks. Business owners, managers, or HR personnel responsible for policy implementation. Career Path Data Protection Officer (DPO) Compliance Consultant Cyber Security Policy Advisor Paralegal in Commercial or Cyber Law Information Governance Analyst Risk and Compliance Coordinator Legal and Regulatory Affairs Assistant
Course Overview This comprehensive Workplace Safety – Asbestos & COSHH Training course is designed to equip learners with essential knowledge of hazardous substances, safety regulations, and risk assessment procedures. It covers critical subjects such as asbestos awareness, COSHH regulations, fire safety, and chemical spill response, empowering individuals to uphold safety standards in any professional environment. Whether you're new to workplace safety or looking to reinforce your compliance knowledge, this course ensures you understand how to identify, report, and manage potential hazards in line with UK health and safety legislation. By completing this training, learners will gain the confidence to support a safer workplace, meet employer and legal requirements, and contribute to a healthier work culture across sectors such as construction, manufacturing, education, and care. This course is also valuable for those pursuing roles with responsibility for safety assessments or compliance monitoring within their organisation. Course Description The Workplace Safety – Asbestos & COSHH Training course offers in-depth guidance on handling hazardous materials and navigating high-risk scenarios. Topics include the dangers and regulations surrounding asbestos, COSHH assessments, confined space awareness, chemical spill response, and essential workplace first aid. Additionally, learners will study broader workplace health and safety practices, ensuring a well-rounded understanding of legislative duties, hazard control, and preventative measures. Throughout the course, learners will develop the ability to interpret health and safety protocols, implement best practices, and support regulatory compliance. The training is aligned with UK industry requirements, offering insights into effective safety planning and emergency procedures. This course suits both those with responsibilities in health and safety and those looking to improve their knowledge to support safe operational standards in various workplace settings. Course Modules: Module 01: Asbestos Awareness & Safety Module 02: COSHH Training for Assessors Module 03: Working in Confined Spaces Module 04: Chemical Spill Module 05: Spill Management Training Module 06: Fire Safety Module 07: Workplace Health and Safety Diploma Module 08: First Aid at Work (See full curriculum) Who is this course for? Individuals seeking to understand health and safety obligations in the workplace. Professionals aiming to improve compliance knowledge and safety awareness. Beginners with an interest in occupational health and safety practices. Supervisors, HR personnel, and compliance officers responsible for workplace risk. Career Path Health and Safety Officer Compliance Coordinator Site Supervisor Risk Assessor Facilities Manager Warehouse or Construction Safety Personnel HR and Operations Manager
Duration 2 Days 12 CPD hours This course is intended for System Engineers/Administrators; Backup/Virtualization Administrators; Solution Architects/Consultants Overview By the end of the course, students should be able to:Maximize your expertise on consulting/professional services for the Veeam Availability Suite solutionAim for the VMCA title and comply with some of the certifications requirements for Platinum ProPartners and Veeam Accredited Service Partners (VASPs)Gain professional advantage with the highest level of Veeam technical certification This course covers Veeam Availability Suite? design and optimization and is based on best practices from Veeam solutions architects. IntroductionDesign & Sizing DNS and name resolution Veeam backup server Backup and replication database Proxy server Transport modes Repository server WAN accelerator Interaction with hypervisors Infrastructure Stages of Proof of Concept Assessment using Veeam ONE? Important data to collect (Veeam ONE + infrastructure accounts) Security Permissions Design Scenario: Part 1 Discovery Create a design based on the customer environment Optimizations Backup and replication database Proxy server Repository server WAN accelerator Tape Veeam Backup Enterprise Manager Indexing Antivirus on Veeam servers and guest VM (if VSS is used) Protecting Veeam Backup & Replication? configuration Design Scenario: Part 2 Create a design based on the customer?s evolving environment Automation Veeam backup server VMware vSphere tags Audit & Compliance Auditing Compliance SureBackup© and SureReplica Troubleshooting Deep dive into reading log files Common issues Troubleshooting mode (SureBackup/SureReplica)
Duration 2 Days 12 CPD hours This course is intended for This basic course is for persons needing an introductory knowledge of DB2, and persons preparing for advanced and specialized DB2 education. Overview List and describe the major components of IBM's relational database, DB2 Explain the characteristics of a DB2 table Relate the basic concepts of data modeling Comprehend the processing instructions given to DB2 via simple SQL statements List and describe several ways to build (write) and execute SQL statements List and describe steps needed to imbed SQL statements in an application program Explain some of the functions performed by, and the responsibilities of, database and system administrators Establish a base for more specialized DB2 education This course provides information about the functions of IBM's DB2, a relational database manager which may be installed under a variety of operating systems on many hardware platforms (e.g., z/OS, VM, Linux, UNIX, Windows, etc.) Understanding a Table Identify the advantages of a relational database Define a relation Name the language used to talk to a relational database manager (RDBM) List three characteristics assigned to each column Define the tasks performed by DB2 when running an application Defi Data Modeling and Database Design State the purpose of a business model Identify an Entity-Relational Diagram (ERD) model List several DB2 column data types Identify non-standard column and table names Identify the characteristics of a primary key and a foreign key State the purpose of re How does a User use DB2? List several ways to talk to DB2 List multiple ways to generate an SQL statement List several ways to ADD, REMOVE, or CHANGE table rows List several ways to READ data and produce reports How does a Programmer use DB2? List the steps needed to create a test environment List the necessary steps to coding SQL in a program Describe the purpose of SQL delimiters Describe the purpose of an SQLCA List the steps involved in preparing a program for execution State the differenc What does an Administrator do in DB2? List some of the tasks performed by a DB2 System Administrator: Identifying the DB2 product, Installing DB2, Creating subsystems/instances, databases and table spaces, Authorizing, and Monitoring List some of the tasks performed by a DB2 Database Administ Information Management with DB2 List several planning considerations for distributing data List some of the skills required to successfully distribute data Differentiate between remote unit of work, distributed unit of work, and distributed request List some of the security concerns whe
Course Overview: This Dyslexia Awareness course provides a comprehensive understanding of dyslexia, focusing on its impact, challenges, and effective support strategies. Designed for individuals and professionals alike, this course addresses dyslexia from multiple angles, including educational settings and cognitive theories. By the end of the course, learners will be equipped with essential knowledge to support those with dyslexia, identify potential barriers, and create inclusive learning environments. This course is ideal for anyone seeking to expand their understanding of dyslexia and its implications in various sectors. Course Description: The course covers a broad range of topics, including the definition of dyslexia, its connection with other learning difficulties, and its presence in educational contexts. Learners will explore cognitive theories, such as the phonological processing difficulties that underpin dyslexia, and delve into legal rights and accommodations for dyslexics. The modules guide learners through effective approaches for identifying and supporting individuals with dyslexia in both academic and professional settings. Upon completion, participants will gain valuable insights into enhancing accessibility and inclusion for dyslexic individuals in various environments. Course Modules: Module 01: Introduction to Dyslexia Module 02: Dyslexia and Learning Difficulties Module 03: Dyslexia in the School Module 04: Cognitive Approaches in Dyslexia Module 05: The Legal Rights of Dyslexics (See full curriculum) Who is this course for? Individuals seeking to understand dyslexia and its impact Professionals aiming to enhance their knowledge in supporting dyslexic individuals Beginners with an interest in inclusive education and learning difficulties Anyone working with individuals affected by learning differences Career Path: Special Education Teacher Educational Psychologist Learning Support Assistant Disability Support Coordinator Inclusion Officer Education Consultant