• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

4196 Operations courses delivered Online

Complete Practical LINQ Tutorial in C#

By Packt

Master LINQ to entities, LINQ to objects, LINQ to XML, functional programming relying on LINQ

Complete Practical LINQ Tutorial in C#
Delivered Online On Demand4 hours
£93.99

Hotel Management Course

By Compliance Central

Are you looking to enhance your Hotel Management skills? If yes, then you have come to the right place. Our comprehensive course on Hotel Management will assist you in producing the best possible outcome by mastering the Hotel Management skills. The Hotel Management course is for those who want to be successful. In the Hotel Management course, you will learn the essential knowledge needed to become well versed in Hotel Management. Our Hotel Management course starts with the basics of Hotel Management and gradually progresses towards advanced topics. Therefore, each lesson of this Hotel Management course is intuitive and easy to understand. Why would you choose the Hotel Management course from Compliance Central: Lifetime access to Hotel Management course materials Full tutor support is available from Monday to Friday with the Hotel Management course Learn Hotel Management skills at your own pace from the comfort of your home Gain a complete understanding of Hotel Management course Accessible, informative Hotel Management learning modules designed by expert instructors Get 24/7 help or advice from our email and live chat teams with the Hotel Management bundle Study Hotel Management in your own time through your computer, tablet or mobile device A 100% learning satisfaction guarantee with your Hotel Management course Curriculum Breakdown of the Hotel Management Course Module 01: Introduction to Hospitality Management Module 02: An Overview of Hotel Industry Module 03: The Process of Selection and Recruitment in the Hospitality Industry Module 04: The Process of Development and Training in the Hospitality Industry Module 05: Management of Front Office Operations Module 06: Management of Housekeeping, Engineering and Security Operations Module 07: Management of Food and Beverage Operations Module 08: Management of Service Quality in the Hospitality Industry Module 09: Marketing in Travel and Tourism Business Module 10: Accounting in the Hospitality Industry Module 11: Customer Satisfaction Module 12: E-Hospitality and Technology CPD 10 CPD hours / points Accredited by CPD Quality Standards Who is this course for? The Hotel Management course helps aspiring professionals who want to obtain the knowledge and familiarise themselves with the skillsets to pursue a career in Hotel Management. It is also great for professionals who are already working in Hotel Management and want to get promoted at work. Requirements To enrol in this Hotel Management course, all you need is a basic understanding of the English Language and an internet connection. Career path The Hotel Management course will enhance your knowledge and improve your confidence in exploring opportunities in various sectors related to Hotel Management. Certificates CPD Accredited PDF Certificate Digital certificate - Included CPD Accredited PDF Certificate CPD Accredited Hard Copy Certificate Hard copy certificate - £10.79 CPD Accredited Hard Copy Certificate Delivery Charge: Inside the UK: Free Outside of the UK: £9.99 each

Hotel Management Course
Delivered Online On Demand4 hours
£12

KYC, AML, and Data Privacy Regulations Course

4.3(43)

By John Academy

Course Overview The success of a product or service can be amplified or ruined based on the demand of that product. Learn how you can understand what your customers want from this KYC, AML, and Data Privacy Regulations Course.  This KYC, AML, and Data Privacy Regulations Course will give you a clear understanding of customer demand and needs. You will also learn the importance of data privacy. This course will prepare you to handle money laundering cases and protect you from fraud. This course is for everyone. You don't need any prior knowledge or certification to understand this course. The course lessons are designed so that you can understand the topics easily. This course is especially helpful for those who come into contact with the customers for their work and need to understand them. Learning Outcomes Get to know about KYC principles Learn about the customer due diligence Familiarize with anti-money laundering and AML procedures Know the data privacy regulations for business operations in the United Kingdom Be able to maintain these regulations in your industry Learn different methods for carrying out KYC and AML Get a clear understanding of the future of KYC compliance Who is this course for? This KYC, AML, and Data Privacy Regulations Course is ideal for those who want to understand the customers requirement and establish their business. You will get a clear idea about customer requirements and data privacy from this course. Entry Requirement This course is available to all learners, of all academic backgrounds. Learners should be aged 16 or over to undertake the qualification. Good understanding of English language, numeracy and ICT are required to attend this course. Certification After you have successfully completed the course, you will be able to obtain an Accredited Certificate of Achievement. You can however also obtain a Course Completion Certificate following the course completion without sitting for the test. Certificates can be obtained either in hardcopy at the cost of £39 or in PDF format at the cost of £24. PDF certificate's turnaround time is 24 hours, and for the hardcopy certificate, it is 3-9 working days. Why choose us? Affordable, engaging & high-quality e-learning study materials; Tutorial videos/materials from the industry-leading experts; Study in a user-friendly, advanced online learning platform; Efficient exam systems for the assessment and instant result; The UK & internationally recognized accredited qualification; Access to course content on mobile, tablet or desktop from anywhere anytime; The benefit of career advancement opportunities; 24/7 student support via email. Career Path KYC, AML, and Data Privacy Regulations Course is a useful qualification to possess and would be beneficial for any related profession or industry such as: Data Security Professionals Sales Executives Managers Managing Directors Business Owners Entrepreneurs Marketing Executives Product Designers Module 01: Introduction to KYC Introduction to KYC 00:33:00 Module 02: Customer Due Diligence Customer Due Diligence 00:23:00 Module 03: AML (Anti-Money Laundering) AML (Anti-Money Laundering) 00:31:00 Module 04: KYC, AML, and Data Privacy Regulations for Businesses Operations in the United Kingdom KYC, AML, and Data Privacy Regulations for Businesses Operations in the United Kingdom 00:23:00 Module 05: Regulations to be Complied by Industries Regulations to be Complied by Industries 00:22:00 Module 06: Methods for carrying out KYC and AML and the Future of KYC Compliance Methods for carrying out KYC and AML and the Future of KYC Compliance 00:15:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

KYC, AML, and Data Privacy Regulations Course
Delivered Online On Demand2 hours 27 minutes
£18

Spring Boot Essentials

By Packt

This is a course that empowers you by unlocking the complexities of how Spring Boot works so that you understand what's going on. In this way, you get an excellent foundational basis of Spring Boot that allows you to stand in good stead, so you'll feel at ease exploring further and tapping into the amazing power that this versatile and powerful platform offers.

Spring Boot Essentials
Delivered Online On Demand2 hours 18 minutes
£35.99

Private Security Industry Approved Online Training

By Twig Services Ltd

Private Security Industry Approved Online Training

Private Security Industry Approved Online Training
Delivered Online On Demand1 hour 30 minutes
£29

QUALIFI Level 3 Integrated Diploma in Business and Management

By School of Business and Technology London

Getting Started The QUALIFI Level 3 Integrated Diploma in Business & Management, aims to provide a specialist work-related programme of study that includes breadth and depth of knowledge, understanding, and practical skills required in the business sector.  Alternative to access to a Higher Education Diploma or A Level, the Level 3 Integrated Diploma in Business and Management programme provides a career path for learners who wish to develop their core capabilities within the business sector. The qualification's outcome, a recognised UK Qualification, is for learners to develop the skills required by organisations globally. The Level 3 Integrated Diploma in Business and Management offers comprehensive training in essential business and management skills, equipping learners with the knowledge and expertise to excel in today's competitive business landscape. By enrolling in the Level 3 Integrated Diploma in Business and Management, students will enhance their employability and open doors to various career opportunities across industries Key Benefits The programme aims to develop proactive decision-makers, managers and leaders for various careers in business sectors in a global context. Develop comprehensive skills in leadership, marketing, finance, and more. This course proposes a holistic approach to business education, enhancing the learner's employability and preparing for success. Engage in practical learning, real-world projects, and expert guidance Key Highlights Remember! The assessment for the qualification is done based on assignments only, and you do not need to worry about writing any exam. With the School of Business and Technology London, you can complete the qualification at your own pace, choosing online or blended learning from the comfort of your home. Learning and pathway materials and study guides developed by our QUALIFI-approved tutors will be available around the clock in our cutting-edge learning management system. Most importantly, at the School of Business and Technology London, we will provide comprehensive tutor support through our dedicated support desk. If you choose your course with blended learning, you will also enjoy live sessions with an assigned tutor, which you can book at your convenience. Career Pathways The QUALIFI 3 Integrated Diploma in Business Management can open many career pathways including, but not limited to: Operations Manager with an estimated average salary of £28,000 per annum Office Manager with an estimated average salary of £30,000 per annum Financial Planner with an estimated average salary of £22,000 per annum Program Manager with an estimated average salary of £25,000 per annum Junior Manager with an estimated average salary of £22,000 per annum Business Analyst with an estimated average salary of £30,000 per annum Fleet Manager, with an estimated average salary of £25,000 per annum About Awarding Body QUALIFI, recognised by Ofqual awarding organisation has assembled a reputation for maintaining significant skills in a wide range of job roles and industries which comprises Leadership, Hospitality & Catering, Health and Social Care, Enterprise and Management, Process Outsourcing and Public Services. They are liable for awarding organisations and thereby ensuring quality assurance in Wales and Northern Ireland. What is included? Outstanding tutor support that gives you supportive guidance all through the course accomplishment through the SBTL Support Desk Portal. Access our cutting-edge learning management platform to access vital learning resources and communicate with the support desk team. Quality learning materials such as structured lecture notes, study guides, and practical applications, which include real-world examples and case studies, will enable you to apply your knowledge. Learning materials are provided in one of the three formats: PDF, PowerPoint, or Interactive Text Content on the learning portal. The tutors will provide Formative assessment feedback to improve the learners' achievements. Assessment materials are accessible through our online learning platform. Supervision for all modules. Multiplatform accessibility through an online learning platform facilitates SBTL in providing learners with course materials directly through smartphones, laptops, tablets or desktops, allowing students to study at their convenience. Live Classes (for Blended Learning Students only) Entry Requirements Entry to the qualification will be through a centre interview, and learners will be expected to hold the following:  qualifications at Level 2 or; work experience in a business environment and demonstrate ambition with clear career goals; Level 3 qualification in another discipline and want to develop their careers in management. Progression Learners completing the QUALIFI Level 3 Integrated Diploma in Business and Management can progress to:  A QUALIFI Level 4 qualification Directly into employment in an associated profession. Why gain a QUALIFI Qualification? This suite of qualifications provides enormous opportunities to learners seeking career and professional development. The highlighting factor of this qualification is that: The learners attain career path support who wish to pursue their career in their denominated sectors; It helps provide a deep understanding of the health and social care sector and managing the organisations, which will, in turn, help enhance the learner's insight into their chosen sector. The qualification provides a real combination of disciplines and skills development opportunities. The Learners attain in-depth awareness concerning the organisation's functioning, aims and processes. They can also explore ways to respond positively to this challenging and complex health and social care environment. The learners will be introduced to managing the wide range of health and social care functions using theory, practice sessions and models that provide valuable knowledge. As a part of this suite of qualifications, the learners will be able to explore and attain hands-on training and experience in this field. Learners also acquire the ability to face and solve issues then and there by exposure to all the Units. The qualification will also help to Apply scientific and evaluative methods to develop those skills. Find out threats and opportunities. Develop knowledge in managerial, organisational and environmental issues. Develop and empower critical thinking and innovativeness to handle problems and difficulties. Practice judgement, own and take responsibility for decisions and actions. Develop the capacity to perceive and reflect on individual learning and improve their social and other transferable aptitudes and skills. Learners must request before enrolment to interchange unit(s) other than the preselected units shown in the SBTL website because we need to make sure the availability of learning materials for the requested unit(s). SBTL will reject an application if the learning materials for the requested interchange unit(s) are unavailable. Learners are not allowed to make any request to interchange unit(s) once enrolment is complete. UNIT1- An Introduction to the Business Environment Reference No : A/615/5045 Credit : 10 || TQT : 100 This unit will explain different types of businesses and their ownership in an economy. Learners will understand the owner and stakeholders' role in fulfilling the business's purpose. The unit will help learners to understand how companies are organised to achieve their targets. This unit will also help to know how the economic, political, legal and social environment can impact businesses, giving the learner an understanding of the range of companies. UNIT2- Business Resources Reference No : F/615/5046 Credit : 10 || TQT : 100 The unit will explain how a range of human, physical, technological and financial resources are used and managed within a business. This unit will help the learner understand how human resources are managed and the employability and personal skills required of personnel in an organisation. Learners will understand the purpose of managing resources effectively, not only concerning human resources but also in terms of physical and technological resources. Learners will also understand how an organisation can gain access to sources of finance, both internally and externally and be able to interpret financial statements. UNIT3- An Introduction to Marketing Reference No : J/615/5047 Credit : 10 || TQT : 100 Learners will gain a basic understanding of the role of the marketing function, with particular emphasis on the role of marketing research and how it contributes to marketing planning and the development of a marketing mix for a target group of customers. Learners can develop, analyse and evaluate key marketing techniques to understand them better. UNIT4- Human Resource Management Reference No : L/615/5048 Credit : 10 || TQT : 100 The unit provides an overview of some key areas that fall within the remit of the human resources function. The learners will also learn how organisations gain employee motivation and employee commitment. Finally, learners will know about how employee performance is measured and managed and the benefits of doing so. This knowledge will help learners understand the working environment and the nature of Human Resource Management when seeking or engaging in employment. UNIT5- Business Communication Reference No : R/615/5049 Credit : 10 || TQT : 100 Effective communication is a key area in terms of its contribution to business success. When studying this unit, learners will thoroughly understand the types of business information used internally and externally by organisations and the methods used to communicate information to different audiences. In this unit, learners will be able to develop, analyse and evaluate various techniques used to display multiple types of business information. They will understand the purpose of such communication. They will also produce and consider different types of business communication of their own. UNIT6- Understanding Health and Safety in the Business Workplace Reference No : J/615/5050 Credit : 10 || TQT : 100 This unit will help to prepare learners for the world of work, where health and safety are a vital part of the modern workplace, whatever sector is chosen. There is a level of myth surrounding Health and safety requirements. This unit will help dispel these and promote good health and safety practices as a productive working environment. Learners will understand health and safety legislation, regulations and requirements that form the basis of all workplaces in the UK. UNIT7- Managing Business Operations Reference No : A/617/5537 Credit : 10 || TQT : 100 This unit aims to familiarise learners with the essential aspects of businesses and their operations in both external and internal business environments. The unit emphasises that operational control and sound policies and best practices lead to organisational excellence. UNIT8- An Introduction to Finance Reference No : F/617/5538 Credit : 10 || TQT : 100 This unit introduces learners to practical accounting and financial reporting techniques managers in business organisations use. Learners will gain an understanding of the budgetary control process. UNIT9- Working in Teams Reference No : J/617/5539 Credit : 10 || TQT : 100 To understand units' role within organisations and how the human elements interact. The unit also examines the value of unit and group working and how these are formed and work together. UNIT10- An Introduction to Leadership Skills Reference No : A/617/5540 Credit : 10 || TQT : 100 This unit aims to provide the learner with an introduction to leadership skills, how they can be identified and developed, and to show the importance of motivating others. UNIT11- Organisational Culture Reference No : F/617/5541 Credit : 10 || TQT : 100 To understand aspects of an organisation's culture, its effects on its activities and management, and the significance of an ethical business approach. UNIT12- Workplace Welfare Reference No : J/617/5542 Credit : 10 || TQT : 100 To understand that workforce welfare ensures that everybody employed within the organisation is valued. To comprehend health and safety responsibilities and benefits gained from being part of the organisation. Delivery Methods School of Business & Technology London provides various flexible delivery methods to its learners, including online learning and blended learning. Thus, learners can choose the mode of study as per their choice and convenience. The program is self-paced and accomplished through our cutting-edge Learning Management System. Learners can interact with tutors by messaging through the SBTL Support Desk Portal System to discuss the course materials, get guidance and assistance and request assessment feedbacks on assignments. We at SBTL offer outstanding support and infrastructure for both online and blended learning. We indeed pursue an innovative learning approach where traditional regular classroom-based learning is replaced by web-based learning and incredibly high support level. Learners enrolled at SBTL are allocated a dedicated tutor, whether online or blended learning, who provide learners with comprehensive guidance and support from start to finish. The significant difference between blended learning and online learning methods at SBTL is the Block Delivery of Online Live Sessions. Learners enrolled at SBTL on blended learning are offered a block delivery of online live sessions, which can be booked in advance on their convenience at additional cost. These live sessions are relevant to the learners' program of study and aim to enhance the student's comprehension of research, methodology and other essential study skills. We try to make these live sessions as communicating as possible by providing interactive activities and presentations. Resources and Support School of Business & Technology London is dedicated to offering excellent support on every step of your learning journey. School of Business & Technology London occupies a centralised tutor support desk portal. Our support team liaises with both tutors and learners to provide guidance, assessment feedback, and any other study support adequately and promptly. Once a learner raises a support request through the support desk portal (Be it for guidance, assessment feedback or any additional assistance), one of the support team members assign the relevant to request to an allocated tutor. As soon as the support receives a response from the allocated tutor, it will be made available to the learner in the portal. The support desk system is in place to assist the learners adequately and streamline all the support processes efficiently. Quality learning materials made by industry experts is a significant competitive edge of the School of Business & Technology London. Quality learning materials comprised of structured lecture notes, study guides, practical applications which includes real-world examples, and case studies that will enable you to apply your knowledge. Learning materials are provided in one of the three formats, such as PDF, PowerPoint, or Interactive Text Content on the learning portal. How does the Online Learning work at SBTL? We at SBTL follow a unique approach which differentiates us from other institutions. Indeed, we have taken distance education to a new phase where the support level is incredibly high.Now a days, convenience, flexibility and user-friendliness outweigh demands. Today, the transition from traditional classroom-based learning to online platforms is a significant result of these specifications. In this context, a crucial role played by online learning by leveraging the opportunities for convenience and easier access. It benefits the people who want to enhance their career, life and education in parallel streams. SBTL's simplified online learning facilitates an individual to progress towards the accomplishment of higher career growth without stress and dilemmas. How will you study online? With the School of Business & Technology London, you can study wherever you are. You finish your program with the utmost flexibility. You will be provided with comprehensive tutor support online through SBTL Support Desk portal. How will I get tutor support online? School of Business & Technology London occupies a centralised tutor support desk portal, through which our support team liaise with both tutors and learners to provide guidance, assessment feedback, and any other study support adequately and promptly. Once a learner raises a support request through the support desk portal (Be it for guidance, assessment feedback or any additional assistance), one of the support team members assign the relevant to request to an allocated tutor. As soon as the support receive a response from the allocated tutor, it will be made available to the learner in the portal. The support desk system is in place to assist the learners adequately and to streamline all the support process efficiently. Learners should expect to receive a response on queries like guidance and assistance within 1 - 2 working days. However, if the support request is for assessment feedback, learners will receive the reply with feedback as per the time frame outlined in the Assessment Feedback Policy.

QUALIFI Level 3 Integrated Diploma in Business and Management
Delivered Online On Demand11 months
£780.35

VMware Telco Cloud Automation: Install, Configure, Manage [V2.2]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Telco cloud system administrators and telco network operations engineers Professionals who work with telco or enterprise and data center networks Designers and operations engineers who manage telco workloads Overview By the end of the course, you should be able to meet the following objectives: List VMware Telco Cloud Automation deployment options and procedures Define Infrastructure Automation and describe infrastructure deployment Describe the VMware Telco Cloud Automation infrastructure settings Configure containers as a service functionality Describe partner integration options and procedures Instantiate network services and network functions Describe the authorization model of VMware Telco Cloud Automation Define platform life cycle management (LCM) for VMware Telco Cloud Automation Enumerate troubleshooting concepts and day two operations for VMware Telco Cloud Automation Describe the use of APIs within VMware Telco Cloud Automation List examples of how VMware Telco Cloud Automation can be used in a CICD environment This five-day, hands-on training course provides you with the advanced knowledge, skills, and tools to achieve competency in operating and troubleshooting the VMware Telco Cloud Automation environment. In this course, you are introduced to VMware Telco Cloud Automation infrastructure settings, deployment options and procedures. You will explore containers as a service and understand the workflow details of partner integration processes. You will learn about infrastructure automation and its importance in VMware Telco Cloud Automation. You will onboard and instantiate network functions and network services using hands-on lab exercises.In addition, this course teaches life cycle management workflows as well as several types of technical problems in VMware Telco Cloud Automation, which you will identify, analyze, and solve through a systematic process. Course Introduction Introductions and course logistics Course objectives VMware Telco Cloud Automation Installation Describe day zero operations for VMware Telco Cloud Automation Describe the VMware Telco Cloud Automation architecture List the steps to perform VMware Telco Cloud Automation deployment List the steps to perform VMware Telco Cloud Automation control plane integration Describe VMware Telco Cloud Automation control plane scaling Describe the requirements for other applications such as vRealize Orchestrator and Harbor Describe where, when, and how to use VMware Telco Cloud Automation tagging Day 1 Operations: Infrastructure Automation Describe infrastructure automation List the use cases of infrastructure automation List the benefits of infrastructure automation Describe the infrastructure requirements of infrastructure automation Describe the infrastructure automation domains List the steps to deploy an infrastructure using infrastructure automation Day 1 Operations: Infrastructure Settings Describe the VMware Telco Cloud Automation infrastructure options Describe VMware Telco Cloud Automation infrastructure requirements Outline the role of virtual infrastructure and VMware Telco Cloud Automation Identify the benefits of public and private infrastructures List the steps to integrate a VM-based virtual infrastructure List the steps to integrate a container-based virtual infrastructure Describe private infrastructure requirements Day 1 Operations: Containers as a Service Define containers as a service (CaaS) List the challenges of CNF deployment without automation Describe the Kubernetes and Tanzu Kubernetes Grid architectures List steps to create a Kubernetes cluster template Describe the process for deploying node pools and groups List the steps to support anti-affinity of workload cluster nodes Describe cluster monitoring List CaaS scale options Day 1 Operations: Partner Integration Describe partner integration and the types of partners Describe Harbor and the various Harbor platforms List the steps to interface with a Harbor platform Compare and contrast specialized VNF managers (S-VNFMs) and generic VNF managers (G-VNFMs) Explain how to add an S-VNFM Define S-VNFM use cases List the benefits and challenges of using Airgap Day 1 Operations: Network Functions ad Network Services Describe the roles of network services and network functions List the types of descriptors Describe the role of TOSCA Describe the role of onboarding List the steps to onboard network functions and network services Examine the results of the onboarding process List the steps to instantiate network functions and network services Examine the results of the instantiation process Day 2 Operations: Authorization Model Explain the resources that can be accessed in vSphere Define the role of a vCenter Server system in credential management Define the role of Keycloak in credential management Describe the procedures to create, delete, and modify rules using vCenter Server Explain how to control and verify access to vSphere resources List the roles in VMware Telco Cloud Automation Explain the tasks and list the levels of permissions needed in VMware Telco Cloud Automation List all the permissions and filters that can be implemented in VMware Telco Cloud Automation Day 2 Operations: Life Cycle Management Explain the life cycle stages in VMware Telco Cloud Automation control plane Explain the life cycle stages in VMware Telco Cloud Automation Define an upgrade schedule Apply an upgrade schedule for life cycle management of the VMware Telco Cloud Automation control plane Apply an upgrade schedule for life cycle management in VMware Telco Cloud Automation Describe network function and network service life cycle management events Execute network function and network service healing Perform network function and network service termination Day 2 Operations: Troubleshooting List the components of the VMware Telco Cloud Automation dashboard Explain the features of fault management in VMware Telco Cloud Automation Explain the features of performance management in VMware Telco Cloud Automation Describe the use of fault management of VMware Telco Cloud Automation for VNFs and CNFs Describe the use of performance management of VMware Telco Cloud Automation for VNFs and CNFs Describe the use of CCLI for troubleshooting Define the procedures to integrate vRealize Operations Manager with VMware Telco Cloud Automation Describe how to use vRealize Operations Day Two Operations: API Management Define the VMware Telco Cloud Automation API Explain the API architecture Describe VMware Telco Cloud Automation API use cases Describe how to request security tokens for implementation Explain how to implement commands through external systems using APIs Day Two Operations: Continuous Integration and Continuous Delivery Describe continuous integration and continuous delivery (CICD) List the benefits and challenges of CICD Describe how VMware Telco Cloud Automation can be used in a CICD environment Explore VMware Telco Cloud Automation CICD examples

VMware Telco Cloud Automation: Install, Configure, Manage [V2.2]
Delivered OnlineFlexible Dates
Price on Enquiry

VMware Telco Cloud Automation: Install, Configure, Manage [v1.8]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Telco cloud system administrators and telco network operations engineers Professionals who work with telco or enterprise and data center networks Designers and operations engineers who manage telco workloads Overview By the end of the course, you should be able to meet the following objectives: List VMware Telco Cloud Automation deployment options and procedures Describe the VMware Telco Cloud Automation infrastructure settings Configure Containers as a Service (CaaS) functionality Describe partner integration options and procedures Define zero-touch provisioning and describe infrastructure deployment Instantiate network services and network functions Describe the authorization model of VMware Telco Cloud Automation Define platform life cycle management (LCM) for VMware Telco Cloud Automation Enumerate troubleshooting concepts and day-two operations for VMware Telco Cloud Automation Describe the use of APIs within VMware Telco Cloud Automation List examples of how VMware Telco Cloud Automation can be used in a CICD environment This five-day, hands-on training course provides you with the advanced knowledge, skills, and tools to achieve competency in operating and troubleshooting the VMware Telco Cloud AutomationTM environment. In this course, you are introduced to VMware Telco Cloud Automation infrastructure settings, deployment options, and procedures. You explore Containers as a Service and understand the workflow details of Partner Integration processes. You are introduced to zero-touch provisioning and its importance in VMware Telco Cloud Automation. You onboard and instantiate network functions and network services using hands-on lab exercises. Course Introduction Introductions and course logistics Course objectives VMware Telco Cloud Automation Installation Describe day-zero operations for VMware Telco Cloud Automation Describe the VMware Telco Cloud Automation architecture List the steps to perform VMware Telco Cloud Automation deployment List the steps to perform VMware Telco Cloud Automation control plane integration Describe VMware Telco Cloud Automation control plane scaling Describe the requirements on other applications such as VMware vRealize© Orchestrator? and Harbor Describe where, when, and how to use VMware Telco Cloud Automation tagging Day One Operations: Infrastructure Settings Describe the VMware Telco Cloud Automation infrastructure options Describe VMware Telco Cloud Automation infrastructure requirements Outline the role of virtual infrastructure and TCA Identify the benefits of public versus private infrastructure List the steps to integrate a VM-based virtual infrastructure List the steps to integrate a container-based virtual infrastructure Describe private infrastructure requirements Day One Operations: Containers as a Service Define Containers as a Service (CaaS) List the challenges of CNF deployment without automation Describe the Kubernetes and VMware Tanzu? Kubernetes Grid? architectures Describe supporting technologies like Cluster API List steps to create a Kubernetes cluster template Describe the process for deploying node pools and groups Describe cluster monitoring List CaaS scale options Day One Operations: Partner Integration Describe partner integration and the types of partners Describe Harbor and the various Harbor platforms List the steps to interface with a Harbor platform Compare and contrast specialized VNF managers (S-VNFMs) and generic VNF managers (G-VNFMs) Explain how to add an S-VNFM Define S-VNFM use cases Day One Operations: Zero Touch Provisioning and Infrastructure Deployment Describe zero-touch provisioning List the use cases of zero-touch provisioning List the benefits of zero-touch provisioning Describe the infrastructure requirements of zero-touch provisioning Describe the zero-touch provisioning domains List the steps to deploy an infrastructure using zero-touch provisioning Day One Operations: Network Functions ad Network Services Describe the roles of network services and network functions List the types of descriptors Describe the role of TOSCA Describe the role of onboarding List the steps to onboard network functions and network services Examine the results of the onboarding process List the steps to instantiate network functions and network services Examine the results of the instantiation process Day Two Operations: Authorization Model Explain the resources that can be accessed in vSphere Define the role of a VMware vCenter Server© system in credential management Describe the procedures to create, delete, and modify rules using vCenter Server Explain how to control and verify access to vSphere resources List roles in VMware Telco Cloud Automation Explain the tasks and list the levels of permissions needed in VMware Telco Cloud Automation List all the permissions and filters that can be implemented in VMware Telco Cloud Automation Summarize the role-based access control model of VMware Telco Cloud Automation Day Two Operations: Platform Life Cycle Management Explain the life cycle stages in VMware Telco Cloud Automation control plane Explain the life cycle stages in VMware Telco Cloud Automation Define an upgrade schedule Apply an upgrade schedule to manage life cycle management of the VMware Telco Cloud Automation control plane Apply an upgrade schedule to manage life cycle management of VMware Telco Cloud Automation Describe network function and network service life cycle management events Execute network function and network service healing Set up Network Function and Network Service monitoring Perform Network Function and Network Service termination Day Two Operations: Troubleshooting List the components of the VMware Telco Cloud Automation dashboard Explain the features of fault management in VMware Telco Cloud Automation Explain the features of performance management in VMware Telco Cloud Automation Describe the use of fault management of VMware Telco Cloud Automation for VNFs and CNFs Describe the use of performance management of VMware Telco Cloud Automation for VNFs and CNFs Troubleshoot using tcf_manager, app.log, and web.log Define the procedures to integrate VMware vRealize© Operations Manager? with VMware Telco Cloud Automation Usage of VMware vRealize© Operations? Day Two Operations: API Management Define the VMware Telco Cloud Automation API Explain the API architecture Describe VMware Telco Cloud Automation API use cases Explain how to configure an external REST API Describe how to request security tokens for implementation Explain how to implement commands through external systems using APIs Day Two Operations: Continuous Integration and Continuous Delivery Describe continuous integration and continuous delivery (CICD) List the benefits and challenges of CICD Describe how VMware Telco Cloud Automation can be used in a CICD environment Explore VMware Telco Cloud Automation CICD examples

VMware Telco Cloud Automation: Install, Configure, Manage [v1.8]
Delivered OnlineFlexible Dates
Price on Enquiry

AZ-500T00 Microsoft Azure Security Technologies

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is for Azure Security Engineers who are planning to take the associated certification exam, or who are performing security tasks in their day-to-day job. This course would also be helpful to an engineer that wants to specialize in providing security for Azure-based digital platforms and play an integral role in protecting an organization's data. This course provides IT Security Professionals with the knowledge and skills needed to implement security controls, maintain an organization?s security posture, and identify and remediate security vulnerabilities. This course includes security for identity and access, platform protection, data and applications, and security operations. Prerequisites AZ-104T00 - Microsoft Azure Administrator Security best practices and industry security requirements such as defense in depth, least privileged access, role-based access control, multi-factor authentication, shared responsibility, and zero trust model. Be familiar with security protocols such as Virtual Private Networks (VPN), Internet Security Protocol (IPSec), Secure Socket Layer (SSL), disk and data encryption methods. Have some experience deploying Azure workloads. This course does not cover the basics of Azure administration, instead the course content builds on that knowledge by adding security specific information. Have experience with Windows and Linux operating systems and scripting languages. Course labs may use PowerShell and the CLI. 1 - Manage identities in Microsoft Entra ID Secure users in Microsoft Entra ID Secure groups in Microsoft Entra ID Recommend when to use external identities Secure external identities Implement Microsoft Entra Identity protection 2 - Manage authentication by using Microsoft Entra ID Configure Microsoft Entra Verified ID Implement multifactor authentication (MFA) Implement passwordless authentication Implement password protection Implement single sign-on (SSO) Integrate single sign-on (SSO) and identity providers Recommend and enforce modern authentication protocols 3 - Manage authorization by using Microsoft Entra ID Configure Azure role permissions for management groups, subscriptions, resource groups, and resources Assign built-in roles in Microsoft Entra ID Assign built-in roles in Azure Create and assign a custom role in Microsoft Entra ID Implement and manage Microsoft Entra Permissions Management Configure Microsoft Entra Privileged Identity Management Configure role management and access reviews by using Microsoft Entra Identity Governance Implement Conditional Access policies 4 - Manage application access in Microsoft Entra ID Manage access to enterprise applications in Microsoft Entra ID, including OAuth permission grants Manage app registrations in Microsoft Entra ID Configure app registration permission scopes Manage app registration permission consent Manage and use service principals Manage managed identities for Azure resources Recommend when to use and configure a Microsoft Entra Application Proxy, including authentication 5 - Plan and implement security for virtual networks Plan and implement Network Security Groups (NSGs) and Application Security Groups (ASGs) Plan and implement User-Defined Routes (UDRs) Plan and implement Virtual Network peering or gateway Plan and implement Virtual Wide Area Network, including secured virtual hub Secure VPN connectivity, including point-to-site and site-to-site Implement encryption over ExpressRoute Configure firewall settings on PaaS resources Monitor network security by using Network Watcher, including NSG flow logging 6 - Plan and implement security for private access to Azure resources Plan and implement virtual network Service Endpoints Plan and implement Private Endpoints Plan and implement Private Link services Plan and implement network integration for Azure App Service and Azure Functions Plan and implement network security configurations for an App Service Environment (ASE) Plan and implement network security configurations for an Azure SQL Managed Instance 7 - Plan and implement security for public access to Azure resources Plan and implement Transport Layer Security (TLS) to applications, including Azure App Service and API Management Plan, implement, and manage an Azure Firewall, Azure Firewall Manager and firewall policies Plan and implement an Azure Application Gateway Plan and implement an Azure Front Door, including Content Delivery Network (CDN) Plan and implement a Web Application Firewall (WAF) Recommend when to use Azure DDoS Protection Standard 8 - Plan and implement advanced security for compute Plan and implement remote access to public endpoints, Azure Bastion and just-in-time (JIT) virtual machine (VM) access Configure network isolation for Azure Kubernetes Service (AKS) Secure and monitor AKS Configure authentication for AKS Configure security for Azure Container Instances (ACIs) Configure security for Azure Container Apps (ACAs) Manage access to Azure Container Registry (ACR) Configure disk encryption, Azure Disk Encryption (ADE), encryption as host, and confidential disk encryption Recommend security configurations for Azure API Management 9 - Plan and implement security for storage Configure access control for storage accounts Manage life cycle for storage account access keys Select and configure an appropriate method for access to Azure Files Select and configure an appropriate method for access to Azure Blob Storage Select and configure an appropriate method for access to Azure Tables Select and configure an appropriate method for access to Azure Queues Select and configure appropriate methods for protecting against data security threats, including soft delete, backups, versioning, and immutable storage Configure Bring your own key (BYOK) Enable double encryption at the Azure Storage infrastructure level 10 - Plan and implement security for Azure SQL Database and Azure SQL Managed Instance Enable database authentication by using Microsoft Entra ID Enable and monitor database audit Identify use cases for the Microsoft Purview governance portal Implement data classification of sensitive information by using the Microsoft Purview governance portal Plan and implement dynamic mask Implement transparent data encryption? Recommend when to use Azure SQL Database Always Encrypted 11 - Plan, implement, and manage governance for security Create, assign, and interpret security policies and initiatives in Azure Policy Configure security settings by using Azure Blueprint Deploy secure infrastructures by using a landing zone Create and configure an Azure Key Vault Recommend when to use a dedicated Hardware Security Module (HSM) Configure access to Key Vault, including vault access policies and Azure Role Based Access Control Manage certificates, secrets, and keys Configure key rotation Configure backup and recovery of certificates, secrets, and keys 12 - Manage security posture by using Microsoft Defender for Cloud Implement Microsoft Defender for Cloud Identify and remediate security risks by using the Microsoft Defender for Cloud Secure Score and Inventory Assess compliance against security frameworks and Microsoft Defender for Cloud Add industry and regulatory standards to Microsoft Defender for Cloud Add custom initiatives to Microsoft Defender for Cloud Connect hybrid cloud and multicloud environments to Microsoft Defender for Cloud Identify and monitor external assets by using Microsoft Defender External Attack Surface Management 13 - Configure and manage threat protection by using Microsoft Defender for Cloud Enable workload protection services in Microsoft Defender for Cloud, including Microsoft Defender for Storage, Databases, Containers, App Service, Key Vault, Resource Manager, and DNS Configure Microsoft Defender for Servers Configure Microsoft Defender for Azure SQL Database Manage and respond to security alerts in Microsoft Defender for Cloud Configure workflow automation by using Microsoft Defender for Cloud Evaluate vulnerability scans from Microsoft Defender for Server 14 - Configure and manage security monitoring and automation solutions Monitor security events by using Azure Monitor Configure data connectors in Microsoft Sentinel Create and customize analytics rules in Microsoft Sentinel Configure automation in Microsoft Sentinel Additional course details: Nexus Humans AZ-500T00 Microsoft Azure Security Technologies training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AZ-500T00 Microsoft Azure Security Technologies course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

AZ-500T00 Microsoft Azure Security Technologies
Delivered OnlineFlexible Dates
£2,380

Git and GitHub Crash Course

By Packt

This course focuses on the basic features of Git and GitHub such as commits, branches, merging, GitHub, and Git objects. If you are new to Git and GitHub, this course will help you get familiarized with the concepts so that you can use them in your projects and the projects that you potentially will contribute to in the future.

Git and GitHub Crash Course
Delivered Online On Demand1 hour 15 minutes
£37.99