• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1150 Educators providing Operations courses delivered Online

Black's Academy

black's academy

London

AQA A level Mathematics 7357 AS level Mathematics 7356 GCSE higher level Mathematics 8300H GCSE foundation level Mathematics 8300F Edexcel A level Mathematics 9MA0 AS level Mathematics 8MA0 GCSE higher level Mathematics 1MA1H GCSE foundation level Mathematics 1MA1F OCR A level Mathematics H240 AS level Mathematics H230 GCSE higher level Mathematics J560 GCSE foundation level Mathematics Other courses IGCSE extended level Mathematics 0580 Scholastic Apititude Test (USA Exam) GED (USA Exam) All other exams Click on any of the above links to obtain free resources Book free diagnostic now blacksacademy symbol Director Peter Fekete Educational consultancy | Curriculum design | Courses for adults | Public speaking | Publications CONTACT a CONTENT OF THE REMOTE LEARNING SYSTEM * US GRADE 6 / UK GCSE GRADE 2–3 1. Addition and subtraction 2. Starting number sequences 3. Further number sequences part I 4. Multiplication to 8 x 8 5. Further number sequences part II 6. Multiplication to 12 x 12 7. Square numbers 8. Positive and negative numbers 9. Sums 10. Shapes and perimiters 11. Measurement and areas 12. Reading information 14. Understanding fractions 15. Decimals 16. Percentages 17. Long multiplication 18. Beginning algebra 19. Beginning probability 20. Beginning geometry 21. Properties of numbers 22. Telling the time 23. Geometry in three dimensions US GRADE 7 / UK GCSE GRADE 4 1. Deeper understanding of number 2. Combinations 3. Long division 4. Operations 5. Practical problems 6. Order and type of numbers 7. Measurement 8. Time and time management 9. Fractions 10. Organising information 11. Ratio and proportion 12. Probability 13. Angles 14. Visual reasoning 15. Bearings 16. Working in two dimensions 17. Working in three dimensions 18. Transformation geometry 19. Continuing algebra US GRADE 8 / UK GCSE GRADE 5–6 1. Patterns and pattern recognition 2. Lines, regions and inequalities 3. Mastering fractions 4. Types of number 5. More about triangles 6. Measurement and computation 7. Proportionality 8. Working with space 9. Indices 10. Further work with ratio 11. Investments 12. Further algebra 13. Quadrilaterals and polygons 14. Speed and displacement 15. Continuing with probability 16. Describing data US GRADE 9 / UK GCSE GRADE 6–7 1. Further proportionality 2. Congruency 3. The tricky aspects of algebra 4. Lines and equations 5. Basic formal algebra 6. Analysis and display of data 7. Graphing functions 8. Dimension and algebra 9. Algebraic fractions 10. Circle theorems 11. Algebraic factors 12. Simultaneous equations 13. Velocity and acceleration 14. Proportionality and scatter 15. Number puzzles US GRADE 10/ UK GCSE GRADE 7–8 1. Transpositions 2. Patterns and pattern recognition 3. Algebraic manipulations 4. Quadratics 5. Surds 6. Linear inequalities 7. Functions 8. Trigonometry 9. Systems of linear equations 10. Further presentation and analysis of data 11. Polynomial functions 12. Algebraic products 13. Finding roots 14. Intersection of lines and curves 15. Indices and index equations US GRADE 11/ UK GCSE GRADE 8–9 1. Completing the square 2. Venn diagrams 3. Coordinate geometry with straight lines 4. Further trigonometry 5. Transformations of curves 6. Modulus 7. Basic vectors 8. Quadratic inequalities 9. The quadratic discriminant 10. Arcs, sectors and segments 11. Circles, curves and lines 12. Probability and Venn diagrams 13. Functions, domains and inverses 14. Trigonometric functions 15. Recurrence relations 16. Further elementary vectors FREE LEGACY RESOURCES Business Studies, Economics, History, Mathematics, Philosophy, Sociology Business Studies PEOPLE AND ORGANISATIONS 1. Management structures and organisations 2. Leadership and management styles 3. Classical theory of motivation 4. Human relations school 5. Management by objectives 6. Workforce planning 7. Recruitment 8. Payment systems MARKETING 1. The economic problem 2. Money and exchange 3. Price determination 4. Determinants of demand 5. Market analysis 6. Marketing and the product life cycle 7. Objectives and marketing EXTERNAL INFLUENCES 1. Stakeholders 2. Business ethics 3. Market conditions 4. Business and the trade cycle 5. Business and technological change 6. Business and inflation 7. Business and exchange rates 8. Business and unemployment ACCOUNTING & FINANCE 1. Cash Flow Management 2. Costs, Profits & Breakeven Analysis 3. Budgeting & Variance Analysis 4. Sources of Finance 5. Profit & Loss Account 6. The Balance Sheet 7. Depreciation by the fixed-rate method 8. Reducing Balance Method 9. Stock Evaluation 10. Working Capital and Liquidity 11. Accounting Principles and Window Dressing 12. Costing and Management Accounting 13. Investors and the Corporate Life Cycle 14. Investment Appraisal: Average Rate of Return 15. Investment Appraisal: Payback Method 16. Investment Appraisal: Net Present Value 17. Investment Appraisal: Internal Rate of Return 18. Profitability Ratios 19. Liquidity Ratios 20. Efficiency and shareholder ratios 22. Gearing and Risk 23. Net Asset Value Economics MARKETS & MARKET FAILURE 1. The economic problem 2. Productive and allocative efficiency 3. Money and exchange 4. Price determination 5. The money market 6. Introduction to the labour market 7. The determinants of demand 8. Supply and elasticity of supply 9. Excess supply and excess capacity 10. Elasticity of demand 11. Market structures 12. Income and cross elasticity 13. Market failure 14. Factor immobility 15. Public and private goods 16. Merit and non-merit goods 17. Cost-benefit analysis 18. Competition policy 19. Market failure and government intervention History ANCIENT HISTORY 1. Prehistory of Greece 2. Mycenae, the Heroic Age c.1550—1125 BC 3. The Greek Middle Ages c.1125—c.700 BC 4. The Greek Tyrannies c. 650—510 BC 5. Sparta 6th and 7th centuries BC 6. Athens and Solon 7. The early inhabitants of Italy 8. The Etruscans 9. Early Roman History up to Tarquin GERMANY & EUROPE 1870—1939 1. Social Change from 1870 to 1914 2. Socialism in Europe 1870 to 1914 3. The Balance of Power in Europe 1870 4. Anti Semitism in Europe 1870 to 1914 5. The Structure of Wilhelmine Germany 6. Bismarck and the Alliance System 7. Weltpolitik 8. Colonial Rivalries 9. First and Second Moroccan Crises 10. The First World War triggers 11. The Causes of the First World War 12. Germany and the First World War 13. Military history of the First World War 14. The Treaty of Versailles 15. The Domestic Impact of the First World War 16. The German Revolution 17. The Weimar Republic 18. The Early Years of the Nazi Party 19. The Rise of the Nazi Party 20. The Establishment of the Nazi Dictatorship 21. Nazi Rule in Germany 1934 to 1939 22. The Economics of the Third Reich 23. Appeasement RUSSIA & EUROPE 1855—1953 1. Alexander II and the Great Reforms 2. Imperial Russia under Alexander III 3. Nicholas II and the 1905 revolution 4. Social and economic developments in Russia 5. Russia: the Great war and collapse of Tsarism 6. Provisonal Government & October Revolution 7. The Era of Lenin 8. The Development of Lenin's Thought 9. New Economic Policy and the Rise of Stalin 10. Stalin and the Soviet Union 1924 to 1953 11. Stalin and the Soviet Economy 12. Stalin and International Relations BRITAIN 1914—1936 1. The Great War and Britain 1914—15 2. Britain during the Great War, 1915—16 3. Lloyd George & the Great War, 1916—1918 4. Great Britain after the War, 1918—22 5. British Politics, 1922—25 6. Class Conflict & the National Strike, 1926 7. Britain & International Relations, 1925—29 8. Social Trends in Britain during the 1920s 9. Social Issues during the late 1920s 10. British Politics 1926—29; Election of 1929 11. Britain — the crisis of 1929 12. The Labour Government of 1929—31 13. Britain and economic affairs, 1931—33 14. Britain and Foreign Affairs, 1931—36 15. Social Conditions in Britain during the 1930s Advanced level Mathematics ALGEBRA & GEOMETRY 1. Simultaneous Equations 2. Polynomial Algebra 3. Cartesian Coordinates 4. The equation of the straight line 5. Intersection of lines and curves 6. Remainder and Factor Theorems 7. Functions 8. Quadratic Inequalities 9. Graphs of Inequalities 10. Indices 11. Polynomial Division 12. Velocity-Time Graphs 13. Tally Charts 14. Absolute and relative errors 15. Sequences and Series 16. Arithmetic Progressions 17. Proof by Contradiction 18. Geometric Progressions 19. The Cartesian Equation of the Circle 20. Transformations of graphs 21. Plane Trigonometry 22. Modulus 23. Trigonometric Functions 24. Inverse Trigonometric Functions 25. Linear Inequalities 26. Proportionality 27. Probability 28. Surds 29. Special Triangles 30. Quadratic Polynomials 31. Roots & Coefficients of Quadratics 32. Radian measure 33. Permutations and Combinations 34. Set Theory and Venn Diagrams 35. Sine and cosine rules 36. Elementary Trigonometric Identities 37. Roots and curve sketching 38. Graphs and roots of equations 39. Picards Method 40. Small Angle Approximations 41. Simultaneous equations in three unknowns 42. Linear relations and experimental laws 43. Conditional Probability 44. Pascal's Triangle and the Binomial Theorem 45. Index Equations and Logarithms 46. The Binomial Theorem for Rational Indices 47. Exponential Growth and Decay 48. Exponential and Natural Logarithm 49. Compound Angle Formulas 50. Sinusoidal functions 51. Vector Algebra 52. The Vector Equation of the Straight Line 53. The Scalar Product of Vectors 54. Axiom Systems 55. Introduction to Complex Numbers 56. The algebra of complex numbers 57. Complex Numbers and the Argand plane 58. De Moivres Theorem 59. Eulers formula 60. Further loci of complex numbers 61. Further graph sketching 62. Mathematical Induction 63. Proof of the Binomial Theorem 64. Polar Coordinates 65. Conic sections 66. Partial Fractions 67. First-order linear recurrence relations 68. Summation finite series with standard results 69. Method of differences 70. Trigonometric Equations 72. Series Expansion 73. Lagrange Interpolating Polynomial 74. Error in an interpolating polynomial 75. Abelian groups 76. Geometrical uses of complex numbers 77. Cyclic Groups 78. The Cayley-Hamilton Theorem 2x2 Matrices 79. Cayley Theorem 80. Determinants 81. Isomorphisms 82. Lagrange theorem 83. Properties of groups 84. Group structure 85. Subgroups 86. Homomorphisms 87. Matrix Algebra 88. Determinant and Inverse of a 2x2 matrix 89. Gaussian elimination 90. Matrix representation of Fibonacci numbers 91. Matrix groups 92. Inverse of a 3 x 3 Matrix 93. Singular and non-singular matrices 94. Properties of Matrix Multiplication 95. Induction in Matrix Algebra 96. Properties of Determinants 97. Permutation groups 98. First Isomorphism Theorem for Groups 99. Roots of Polynomials of Degree 3 100. Scalar Triple Product 101. Systems of Linear Equations 102. Matrix Transformations 103. Mappings of complex numbers 104. Cross product of two vectors 105. Vector planes 106. Eigenvalues and Eigenvectors CALCULUS 1. Introduction to the Differential Calculus 2. Stationary points and curve sketching 3. Applications of Differentiation 4. Differentiation from First Principles 5. The Trapezium Method 6. Integration 7. Direct Integration 8. Applications of integration to find areas 9. Graphs of Rational Functions 10. Derivatives of sine and cosine 11. Products, Chains and Quotients 12. Volumes of Revolution 13. Exponential and Logarithmic Functions 14. Integration by Parts 15. Parametric Equations 16. The Integral of 1/x 17. Integration by Substitution 18. Implicit Differentiation 19. Formation of a differential equation 20. Separation of variables 21. Integrals of squares of trig functions 22. Maclaurin Series 23. Techniques of Integration 24. Integrating Factor 25. The Newton-Raphson formula 26. Errors in Numerical Processes 27. Roots and Recurrence Relations 28. Derivatives of Inverse Trig. Functions 29. Second order homogeneous equations 30. Second order inhomogeneous equations 31. Implicit differentiation — second derivative 32. Integrands to inverse trigonometric functions 33. Integrands to logarithmic function 34. Integration of Partial Fractions 35. Logarithms and Implicit Differentiation 36. Implicit differentiation and MaClaurin series 37. Separation of variables by substitution 38. Trigonometric Substitutions for Integrals 39. Truncation Errors 40. Euler and Trapezoidal Method 41. Numerical methods for differential equations 42. Simpson Method 43. Proof of Simpson Formula 44. Richardson Extrapolation 45. Arc length of a curve in Cartesian coordinates 46. Arc length of a curve in Polar coordinates 47. Arc length of a curve: Parametric form 48. Curves in Euclidean space 49. Functions and continuity 50. The gradient of a scalar field 51. The derivatives of the hyperbolic functions 52. Hyperbolic Functions 53. Inverse Hyperbolic Functions 54. Hyperbolic Identities 55. Integrals with inverse hyperbolic functions 56. Reduction formulae 57. Simultaneous differential equations 58. Surface of Revolution 59. Vector differential calculus 60. Scalar Fields and Vector Functions STATISTICS & PROBABILITY 1. Central Tendency: Mean, Median and Mode 2. Standard Deviation 3. Cumulative Frequency 4. Discrete Random Variables 5. Mutually exclusive and independent events 6. The Binomial Distribution 7. The Normal Distribution 8. Standardised Normal Distribution 9. Regression Lines 10. Correlation 11. The Geometric Distribution 12. Hypothesis Testing — Binomial Distribution 13. Index Numbers 14. Time Series Analysis 15. Bayes Theorem 16. Confidence interval mean — known variance 17. The Central Limit Theorem 18. Pearsons product moment correlation 19. Spearmans Rank Correlation Coefficient 20. Hypothesis Testing — Normal Distribution 21. The Poisson Distribution 22. The Normal Approximation to the Binomial 23. The Normal Approximation to the Poisson 24. The Poisson Approximation to the Binomial 25. Type I and type II errors 26. Scalar multiples of a Poisson variable 27. Test for the Mean of a Poisson distribution 28. Random Number Sampling 29. Estimating Population Parameters 30. Random Samples and Sampling Techniques 31. The Concept of a Statistic 32. Hypothesis test for the population variance 33. Central Concepts in Statistics 34. Continuous Probability Distributions 35. Modeling: Chi squared goodness of fit 36. Chi squared test for independence 37. Degrees of Freedom 38. Difference Sample Means Unknown Variance 39. Moment generating functions 40. Probability generating functions 41. Linear Combinations of Random Variables 42. Maximum Likelihood Estimators 43. Wilcoxon signed rank test on median 44. Non-parametric significance tests 45. Single-sample sign test of population median 46. Paired-sample sign test on medians 47. Paired sample t-test for related data 48. Paired sample Wilcoxon signed rank test 49. Difference of two sample means 50. Pooled sample estimate 51. Testing the Sample Mean 52. The Uniform Distribution MECHANICS 1. Velocity-Time and Displacement-Time Graphs 2. Force diagrams 3. Representation of Forces by Vectors 4. Static Equilibrium 5. Equilibrium of coplanar forces 6. Weight and Free Fall 7. Normal Reaction and Friction 8. Newtons First and Second Laws 9. Relative Motion 10. Projectiles 11. Calculus and Kinematics 12. Motion of a Particle: Vector calculus form 13. Work 14. Energy Conversions 15. Gravitational potential and kinetic energy 16. Connected Particles 17. Moments 18. Linear momentum 19. Power 20. Hookes Law 21. Simple Harmonic Motion 22. Simple Harmonic Motion and Springs 23. Calculus, Kinematics in Three Dimensions 24. Sliding, toppling and suspending 25. Impulsive Tensions in Strings 26. Angular Velocity 27. Motion in a Horizontal Circle 28. Centre of Mass of a Uniform Lamina 29. Motion in a Vertical Circle 30. Motion under a Variable Force 31. Conservation of Angular Momentum 32. Centre of Mass of a Composite Body 33. Motion under a central force 34. Centre of Mass of a Uniform Lamina 35. Centre of Mass Uniform Solid of Revolution 36. Equilibrium of Rigid Bodies in Contact 37. Damped Harmonic Motion 38. Moment of Inertia 39. Impulse, elastic collisions in one dimension 40. Parallel and Perpendicular Axis Theorems 41. Motion described in polar coordinates 42. Simple pendulum 43. Compound pendulum 44. Stability and Oscillations 45. Vector calculus 46. Linear Motion of a Body of Variable Mass DISCRETE & DECISION 1. Algorithms 2. Introduction to graph theory 3. Dijkstra algorithm 4. Sorting Algorithms 5. Critical Path Analysis 6. Dynamic Programming 7. Decision Trees 8. The Maximal Flow Problem 9. The Hungarian algorithm 10. Introduction to Linear Programming 11. Simplex Method 12. Matching Problems 13. Game Theory 14. Minimum connector problem 15. Recurrence relations 16. Proofs for linear recurrence relations 17. Simulation by Monte Carlo Methods 18. Travelling and Optimal Salesperson Problems 19. The Travelling Salesperson Problem Philosophy INTRODUCTION TO PHILOSOPHY 1. The problem of evil 2. Introduction to Plato 3. Knowledge, belief and justification 4. Descartes Meditation I 5. Introduction to the problem of universals 6. Introduction to metaethics 7. Subjectivism versus objectivism 8. Aristotle's function argument 9. Natural Law Theory 10. Utilitarianism 11. The Nicomachaen Ethics of Aristotle 12. Virtue Ethics 13. Descartes Meditation II 14. Hume and empiricism 15. The paradox of induction 16. Hume's attack on Descartes 17. The Cosmological Argument 18. The Ontological Argument 19. The Teleological Argument 20. The Argument from religious experience 21. The Moral Argument 22. The argument from illusion 23. Materialism 24. Human Identity Sociology PERSPECTIVES & METHODOLOGY 1. Introduction to Marxism 2. Introduction to Durkheim 3. Weber: classes, status groups and parties 4. Introduction to patriarchy and gender roles 5. Mass culture theory 6. The Frankfurt school STRATIFICATION & DIVERSITY 1. Ethnic groups and discrimination 2. Race, Ethnicity and Nationalism 3. Social Inequality 4. Theories of Racism 5. Class structure 6. Modern Functionalism and Stratification 7. Social Mobility 8. Bottomore: Classes in Modern Britain 9. American exceptionalism ASPECTS OF SOCIETY 1. Definitions of Poverty 2. Theories of Poverty 3. Solutions to Poverty 4. Alienation 5. Leisure 6. Work and Technological Change 7. Conflict and Cooperation at Work 8. Attitudes to Work 9. Unemployment 10. Perspectives on Education 11. Education and Ethnicity 12. Education and Gender 13. The Family and Social Structure 14. The Family and Household Structure 15. Conjugal Roles 16. Marital Breakdown 17. Post War Education in Britain 18. British Social Policy 1945—1990

Wrexham Foyer

wrexham foyer

Denbighshire,

In this document the expression ‘we’ refers to, ClwydAlyn Housing Limited, Tir Tai Limited, PenArian Limited and Tai Elwy Limited, that provides housing and related services across North Wales. Each entity is the controller of its own personal data although data may be processed by other Group members on its behalf This privacy notice sets out how ClwydAlyn collects and uses information about you. Please read this privacy notice carefully to understand how we will use your personal information. If you have any questions or queries in relation to this privacy notice, you can contact our Data Protection Officer at: datacontroller@clwydalyn.co.uk 72 Ffordd William Morgan, St Asaph Business Park, St Asaph, Denbighshire, LL17 0JD 0800 1835757 (freephone from a landline) or 01745 536800 This privacy notice explains: What information we may collect about you How we use your information Contacting you Sharing your information Our legal basis for collecting, holding and using your information Security and storage of your information Your rights 1.What information we may collect about you The information we collect about you depends on why we are dealing with you. For example, if you make a housing application or become one of our tenants, we will need more information from you than if you are merely making an enquiry. We may collect the information about you in the following circumstances: If you call our Contact Centre When you call our contact centre we collect Calling Line Identification (CLI) information. We use this information to help improve its efficiency and effectiveness. We record calls for training and monitoring purposes. Additionally, our call handlers will make a record of your call in order to manage your query. We may need to share information with other organisations within or outside ClwydAlyn in order to respond to your call, for example so that we can organise maintenance or repairs or other support. We will usually tell you if it is necessary for us to pass information on to other organisations. If you email us Any email sent to us, including any attachments, may be monitored and used by us for reasons of security and for monitoring compliance with office policy. Email monitoring or blocking software may also be used. Please be aware that you have a responsibility to ensure that any email you send to us is within the bounds of the law. If you make a complaint to us When we receive a complaint from a person we make up a file containing the details of the complaint. This normally contains the identity of the complainant and any other individuals involved in the complaint. We will only use the personal information we collect to process the complaint and to check on the level of service we provide. If a complainant doesn’t want information identifying him or her to be disclosed to any person that the complaint is about, we will try to respect that. However, it may not be possible to handle a complaint on an anonymous basis. Similarly, where enquiries are submitted to us we will only use the information supplied to us to deal with the enquiry and any subsequent issues and to check on the level of service we provide. If you use our services We hold the details of the people who request and use our services so that we can provide these services and for other closely related purposes. For example, we use information about our service users to develop and improve our services and to make sure we are delivering services to different groups fairly. If you apply for housing or become a tenant, there is certain information that we require in order to process your application and manage your tenancy. If you do not provide us with this information, we will not be able to progress your application. When you visit our websites We automatically collect certain information when you visit one of our websites. Please see Use of Cookies below for more information about this. When you use our customer portal, you are able to view information held in our housing management system, including personal details, account statements, tenancy information, repair history and pay your rent / service charges. Please note that we use a third party provider, Verseone to support our customer portal. Information we receive from others We work closely with other organisations, such as local councils, police forces, voluntary sector organisations, other housing providers and our contractors, and we may receive information about you from them. If you visit our premises We may ask you to sign in and out if you visit staff or residents at our premises. Access is controlled for the purposes of building and occupant security. Access is recorded to assist with fire and other evacuation procedures. Furthermore, your image may be captured on CCTV to monitor and collect visual images for the purpose of security and the prevention and detection of crime. If you use our Wi-Fi or computer to access our IT systems, access and activity may be monitored to prevent misuse of Group property, according to our IS Corporate policies. Job applicants When individuals apply to work for us, we will only use the information they supply to us to process their application and to monitor recruitment statistics. Where we want to disclose information to a third party, for example where we want to take up a reference or obtain a ‘disclosure’ from the Criminal Records Bureau we will not do so without informing them beforehand unless the disclosure is required by law. Personal information about unsuccessful candidates will be held for 12 months after the recruitment exercise has been completed; it will then be destroyed or deleted. We retain de-personalised statistical information about applicants to help inform our recruitment activities, but no individuals are identifiable from that data. Once a person has taken up employment with us, we will compile a file relating to their employment. The information contained in this will be kept secure and will only be used for purposes directly relevant to that person’s employment. Once their employment with us has ended, we will retain the file in accordance with the requirements of our retention schedule and then delete it. If you are a member of one of our Boards, Committees or Panels We may ask for personal details for managing and statistical purposes. 2.How we use your information We process your personal information primarily in connection with managing our housing services. If you are a tenant, this includes managing your tenancy and dealing with any applications, queries or complaints that you make. Examples of how we use your information include: to confirm your identity to assess your suitability to access any of our services to manage your tenancy, care or support to ensure our properties are appropriately maintained and in accordance with legal obligations, such as periodic gas safety checks to notify you about important changes to our services to let you know about other relevant services, both ours and those of other parties whose products and services we have agreed should be made available to you (see the section below on 'Contacting you' for more information about this) to update and correct our records to carry out statistical and market analyses, including benchmarking exercises, to enable us to understand you better and improve our services, and in accordance with our operating Regulations to develop, test and improve our systems to ensure that content of our website is presented in the most effective manner for you and for your computer to administer our website and for internal operations, including troubleshooting, data analysis, testing, research, statistical and survey purposes to comply with other legal obligations, such as Health and Safety laws or safeguarding vulnerable people We may combine information we receive from other sources with information you give to us for the purposes set out above (depending on the types of information we receive). 3.Contacting you We will use your contact information to send you important information via letters, emails, text messages, or otherwise to telephone you. We may record telephone calls for security and training purposes. We may use the information we hold about you in order to provide you with information about our services which we feel may interest you. You can opt out of receiving marketing communications at any time, although please note that we will continue to send you important messages about your tenancy. If you have changed your mind about being contacted for marketing purposes, please contact our Customer Services Team on 0800 1835757 (freephone from a landline) or 01745 536800 to update your preferences. 4.Sharing your information We do not sell your information to any third party, but in certain limited circumstances we may disclose your personal information to: any member of our group, which means our subsidiaries, our ultimate holding company and its subsidiaries, as defined in section 736 of the UK Companies Act 1985; and/or other third parties in the following circumstances: if we are under a duty to disclose or share your personal data in order to comply with any legal obligation; in order to enforce or apply our terms and conditions and other agreements; to protect the rights, property, or safety of ClwydAlyn, our customers, or others; to investigate or prevent a crime. This includes exchanging information with other companies and organisations for the purposes of fraud protection and credit risk reduction; to obtain any professional advice; and/or with your consent. 5.Our legal basis for collecting, holding and using your information Data protection law sets out various lawful legal bases (or ‘conditions’) which allow us to collect, hold and use your personal information: Where you have entered into a contract or contracts with us, we may need to use your information to provide you with our services. An example of this is where you have a tenancy with us. Where we are under a legal obligation which requires us to process your personal information. For example, notifications of Health and Safety incidents. We will sometimes use your personal information based upon your consent. We will always tell you where this is the case and ask you to agree before we process your information. An example of using your personal information with your consent is publishing your image as part of a photograph on our website. Finally, sometimes it is necessary to process your personal information for the purposes of our own legitimate interests. We will only do so where these interests are not overridden by the interests and fundamental rights or the freedoms of the individuals concerned. An example of this is when we may contact you about your experience of contacting our Customer Services Team or a recent repair to your property. Data protection law recognises certain "special categories" of personal information, which is information revealing racial or ethnic origin, political opinions, religious or philosophical beliefs, trade union membership, genetic information, biometric information for uniquely identifying a person, information concerning health, and information concerning a person's sex life or sexual orientation. Information about criminal offences and records is placed in a similar category. These special categories of personal information are considered particularly sensitive and so we will only collect and use this information where you have given us your explicit consent or where we consider it necessary to do so. 6.Security and storage of your personal information The information about you that we collect may be transferred to, and stored at, a destination outside the European Economic Area (EEA). It may also be processed by staff operating outside the EEA who work for one of our suppliers. We will take all steps reasonably necessary to ensure that your data is treated securely and in accordance with this privacy policy. We will generally keep personal information about you no longer than is needed for as per our Retention Policy. 7.Your rights You have the right to request from us access to your own personal information. This is sometimes known as a 'subject access request'. You also have the right to ask us not to process your personal data for direct marketing purposes. We will tell you if we intend to use your data for this purpose or if we intend to disclose your information to any third party for this purpose. You can exercise your right to prevent such processing by checking certain boxes on the forms we use to collect your data or by contacting our Customer Services Team on 0800 1835757 (freephone from a landline) or 01745 536800. From 25 May 2018, you will have additional rights to request from us: That any inaccurate information we hold about you is corrected That your information is deleted That we stop using your personal information for certain purposes That your information is provided to you in a portable format That decisions about you are not made by wholly automated means Many of the rights listed above are limited to certain defined circumstances and we may not be able to comply with your request. We will tell you if this is the case. If you choose to make a request to us, we will aim to respond to you within one month. We will not charge a fee for dealing with your request.

Courses matching "Operations"

Show all 4196

Learn SQL Basics, 1-day Course, Online Instructor-Led

4.6(12)

By PCWorkshops

SQL Queries Course, 1-Day. Basic SQL syntax. This course is good for any database, covering standard SQL. Most attendees are in-work IT Professional. Private individuals are also very welcome.

Learn SQL Basics, 1-day Course, Online Instructor-Led
Delivered Online + more
£185

Certified Data Centre Environmental Sustainability Specialist (CDESS)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course is any IT, facilities or data centre professional who works in and around the data centre and has the responsibility to achieve and improve efficiency and environmental sustainability, whilst maintaining the availability and manageability of the data centre. Overview After completion of the course the participant will be able to: Understand the impact of data centres on the environment Describe the various environmental/energy management standards Understand the purpose and goals of the legally binding international treaties on climate change Implement various sustainable performance metrics and how to use them in the data centre environment Manage data centre environmental sustainability using international standards Set up the measurement, monitoring and reporting of energy usage Use power efficiency indicators in a variety of data centre designs Use best practices for energy savings in the electrical infrastructure and in the mechanical (cooling) infrastructure Use best practices for energy savings for the ICT equipment and data storage Understand the importance of water management and waste management Understand the different ways to use sustainable energy in the data centre Get practical tips and innovative ideas to make a data centre more sustainable The CDESS© course is aimed at providing knowledge of the standards and guidelines related to environmental sustainability, and how to move your data centre (existing or new) to a more environmentally sustainable design and operations. Impact of Data Centres on the Environment Predictions in 2010 Current situation Outlook and commitments What is Environmental Sustainability The importance of sustainability Senior management commitment Environmental sustainability framework Sustainability policies Performance standards and metrics Information policies Transparency Awareness Service charging models Environmental Management Environmental sustainability framework (ISO 14001) Standards and guidelines ? ISO 50001 / ISO 30134 Measurement and categories Baselining Trend analysis Reporting Power Effiðciency Indicators Various eðfficiency indicators Power Usage Effectiveness (PUE) PUE measurement levels Factors affecting PUE Measurement points and intervals PUE in mixed source environments Measuring PUE in a mixed-use building PUE reporting Impact of PUE after optimising IT load Electrical Energy Savings (Electrical) Identifying the starting point for saving energy Sizing of power DC power Generators UPS systems Power Factor (PF) Energy savings on lighting Electrical Energy Savings (Mechanical) Energy savings on the cooling infrastructure Temperature and humidity setpoints Various energy eðcient cooling technologies Energy savings on the airflow Liquid cooling Energy reusage PUE, ERE/ERF and Control Volume Electrical Energy Savings (ICT) Procurement IT equipment energy eðfficiency ITEEsv, SMPE, SMPO IT equipment utilisation Server virtualisation Open compute project Electrical Energy Savings (Data Storage) Data management Data storage management Data storage equipment effiðciency Water Management Water Usage Effectiveness (WUE) Improving WUE Water usage at the power generation source Energy Water Intensity Factor (EWIF) Waste Management Waste management policies Life-cycle assessment (Cradle to the grave) 3 R?s for waste management Reduce Reuse Second-hand market Recycle Sustainable Energy Usage Sustainable energy sources Power purchase agreements Energy attribute certificates Renewable Energy Factor (REF) Matching renewable energy supply and demand Sustainable energy storage Carbon trading Automated Environmental Management Systems Use of AI and machine learning Load migration Data Centre Infrastructure Management (DCIM) solutions

Certified Data Centre Environmental Sustainability Specialist (CDESS)
Delivered Online
£1,500

Finance for Non-Financial Entrepreneurs - North Essex

5.0(1)

By Let’s Do Business Group

This course aims to demystify the accounting language so that you are in control of the financial performance of your business, helping you forecast for the future, evaluate your current efforts, and establish strategies to meet your goals.

Finance for Non-Financial Entrepreneurs - North Essex
Delivered Online
FREE

App in a day

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for Looking for a way to extend your business operations? Look no further than the App in a Day workshop! In this one day course you will learn to build a custom, secure business application that you can share across your organise and will run across multiple platforms including tablets and mobile devices. Power Platform is a secure and scalable platform for building your own applications. In this course, you will learn how to build an application from the ground up by building the required UX, Backend, and frontend. All this without writing any code. Overview Some of the applications of the Power Platform you will learn to build will allow you to potentially: A) Share information with trusted colleagues and associates B) Monitor and manage your business operations C) Monitor and manage your customers D) Share business news on social media E) Share business photos and footage This course will teach you how to build your own application that is completely secure and private. Power Apps Canvas App Connect to data sources and filter results based on specified criteria Work with screens and navigation Use controls, properties, formulas, and actions to customize the user experience Display the logged in user?s name Configure app settings Save and share an app Run an app on a mobile device Microsoft Dataverse Create and customize a custom table Use the Form control Save data into the Microsoft Dataverse using the Form control Microsoft Dataverse Create a standalone Model-driven app. Customize forms for the Model-driven app Use a Business Process Flow to guide users through a process Microsoft Dataverse Create a flow that is triggered when a new Microsoft Dataverse row is created Automate sending approval requests Customize the approval based on the Microsoft Dataverse row Use the Approval centre

App in a day
Delivered Online
£450

AZ-305T00 Designing Microsoft Azure Infrastructure Solutions

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Successful students have experience and knowledge in IT operations, including networking, virtualization, identity, security, business continuity, disaster recovery, data platforms, and governance. Students also have experience designing and architecting solutions. Before attending this course, students must have previous experience deploying or administering Azure resources and strong conceptual knowledge of: Azure compute technologies such as VMs, containers and serverless solutions Azure virtual networking to include load balancers Azure Storage technologies (unstructured and databases) General application design concepts such as messaging and high availability This course teaches Azure Solution Architects how to design infrastructure solutions. Course topics cover governance, compute, application architecture, storage, data integration, authentication, networks, business continuity, and migrations. The course combines lecture with case studies to demonstrate basic architect design principles. Prerequisites Before attending this course, students must have previous experience deploying or administering Azure resources and conceptual knowledge of: Azure Active Directory Azure compute technologies such as VMs, containers and serverless solutions Azure virtual networking to include load balancers Azure Storage technologies (unstructured and databases) General application design concepts such as messaging and high availability AZ-104T00 - Microsoft Azure Administrator 1 - Design governance Design for governance Design for management groups Design for subscriptions Design for resource groups Design for resource tags Design for Azure Policy Design for role-based access control (RBAC) Design for Azure landing zones 2 - Design an Azure compute solution Choose an Azure compute service Design for Azure Virtual Machines solutions Design for Azure Batch solutions Design for Azure App Service solutions Design for Azure Container Instances solutions Design for Azure Kubernetes Service solutions Design for Azure Functions solutions Design for Azure Logic Apps solutions 3 - Design a data storage solution for non-relational data Design for data storage Design for Azure storage accounts Design for data redundancy Design for Azure Blob Storage Design for Azure Files Design for Azure managed disks Design for storage security 4 - Design a data storage solution for relational data Design for Azure SQL Database Design for Azure SQL Managed Instance Design for SQL Server on Azure Virtual Machines Recommend a solution for database scalability Recommend a solution for database availability Design security for data at rest, data in motion, and data in use Design for Azure SQL Edge Design for Azure Cosmos DB and Table Storage 5 - Design data integration Design a data integration solution with Azure Data Factory Design a data integration solution with Azure Data Lake Design a data integration and analytic solution with Azure Databricks Design a data integration and analytic solution with Azure Synapse Analytics Design strategies for hot, warm, and cold data paths Design an Azure Stream Analytics solution for data analysis 6 - Design an application architecture Describe message and event scenarios Design a messaging solution Design an Azure Event Hubs messaging solution Design an event-driven solution Design a caching solution Design API integration Design an automated app deployment solution Design an app configuration management solution 7 - Design authentication and authorization solutions Design for identity and access management (IAM) Design for Microsoft Entra ID Design for Microsoft Entra business-to-business (B2B) Design for Azure Active Directory B2C (business-to-customer) Design for conditional access Design for identity protection Design for access reviews Design service principals for applications Design managed identities Design for Azure Key Vault 8 - Design a solution to log and monitor Azure resources Design for Azure Monitor data sources Design for Azure Monitor Logs (Log Analytics) workspaces Design for Azure Workbooks and Azure insights Design for Azure Data Explorer 9 - Design network solutions Recommend a network architecture solution based on workload requirements Design patterns for Azure network connectivity services Design outbound connectivity and routing Design for on-premises connectivity to Azure Virtual Network Choose an application delivery service Design for application delivery services Design for application protection services 10 - Design a solution for backup and disaster recovery Design for backup and recovery Design for Azure Backup Design for Azure blob backup and recovery Design for Azure files backup and recovery Design for Azure virtual machine backup and recovery Design for Azure SQL backup and recovery Design for Azure Site Recovery 11 - Design migrations Evaluate migration with the Cloud Adoption Framework Describe the Azure migration framework Assess your on-premises workloads Select a migration tool Migrate your structured data in databases Select an online storage migration tool for unstructured data Migrate offline data 12 - Introduction to the Microsoft Azure Well-Architected Framework Azure Well-Architected Framework pillars Cost optimization Operational excellence Performance efficiency Reliability Security 13 - Microsoft Azure Well-Architected Framework - Cost Optimization Develop cost-management discipline Design with a cost-efficiency mindset Design for usage optimization Design for rate optimization Monitor and optimize over time 14 - Microsoft Azure Well-Architected Framework - Operational excellence Embrace DevOps culture Establish development standards Evolve operations with observability Deploy with confidence Automate for efficiency Adopt safe deployment practices 15 - Microsoft Azure Well-Architected Framework - Performance efficiency Negotiate realistic performance targets Design to meet capacity requirements Achieve and sustain performance Improve efficiency through optimization 16 - Microsoft Azure Well-Architected Framework - Reliability Design for business requirements Design for resilience Design for recovery Design for operations Keep it simple 17 - Microsoft Azure Well-Architected Framework - Security Plan your security readiness Design to protect confidentiality Design to protect integrity Design to protect availability Sustain and evolve your security posture 18 - Getting started with the Microsoft Cloud Adoption Framework for Azure Customer narrative Common blockers 19 - Prepare for successful cloud adoption with a well-defined strategy Customer narrative Capture strategic motivation Define objectives and key results Evaluate financial considerations Understand technical considerations Create a business case 20 - Prepare for cloud adoption with a data-driven plan Customer narrative 21 - Choose the best Azure landing zone to support your requirements for cloud operations Customer narrative Common operating models Design areas for Azure landing zones Design principles for Azure landing zones Journey to the target architecture Choose an Azure landing zone option Deploy the Azure landing zone accelerator Enhance your landing zone 22 - Migrate to Azure through repeatable processes and common tools Customer narrative Migration process Migration tools Common tech platforms 23 - Address tangible risks with the Govern methodology of the Cloud Adoption Framework for Azure Customer narrative Govern methodology Corporate policies Governance disciplines Deploy a cloud governance foundation The Cost Management discipline 24 - Ensure stable operations and optimization across all supported workloads deployed to the cloud Establish business commitments Deploy an operations baseline Protect and recover Enhance an operations baseline Manage platform and workload specialization 25 - Innovate applications by using Azure cloud technologies Follow the innovation lifecycle Azure technologies for the build process Infuse your applications with AI Azure technologies for measuring business impact Azure technologies for the learn process 26 - Prepare for cloud security by using the Microsoft Cloud Adoption Framework for Azure Customer narrative Methodology Security roles and responsibilities Simplify compliance and security Simplify security implementation Security tools and policies Additional course details: Nexus Humans AZ-305T00: Designing Microsoft Azure Infrastructure Solutions training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AZ-305T00: Designing Microsoft Azure Infrastructure Solutions course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

AZ-305T00 Designing Microsoft Azure Infrastructure Solutions
Delivered Online
£2,380

Change Management Foundation

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for CxO?s IT Managers/ Directors Senior Project Officers Project & Program Coordinator/Managers Operations Managers Quality Managers Business Analysts Engineering Managers IT Infrastructure Managers Internal Consultants Professional Consultants Overview Change and the individual Change and the organization Communication and stakeholder engagement Change practice Dealing with change and more importantly, the impact of change is a high priority for all organisations. The Change Management Certification has been developed by APMG in partnership with the Change Management Institute (CMI), an independent, global professional association of change managers. Together they have developed a professional ?body of knowledge? for the discipline of change management. This body of knowledge now provides an independent benchmark for the professional knowledge expected of an effective change manager. APMG?s refreshed Change Management certification is fully aligned with the change management body of knowledge. Prerequisites There is no prerequisite to attending this foundation course, although it is recommended that candidates should have a good understanding of business practices. 1 - Change and the Organization Drivers for change Developing a vision Culture and climate Emergent change and lifecycle Organizational metaphors Models of change Roles required for change 2 - Stakeholders Principles Identification Analysis Influencing and listening Emotion and demonstration Communications Cognitive biases Remaining people focused Improving Communications Communications channels Collaboration Communications Planning Larger workshops 2 - Change Impact Assessing impact McKinsey 7 S Stakeholder impact assessment Assessing change readiness Large change ? how to staff Building a change team Preparing for resistance Building team effectiveness 4 - Individual Change Learning theory Motivation Change Curve Personality differences

Change Management Foundation
Delivered Online
£2,000

AZ-204T00 Developing Solutions for Microsoft Azure

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Students in this course are interested in Azure development or in passing the Microsoft Azure Developer Associate certification exam. This course teaches developers how to create end-to-end solutions in Microsoft Azure. Students will learn how to implement Azure compute solutions, create Azure Functions, implement and manage web apps, develop solutions utilizing Azure storage, implement authentication and authorization, and secure their solutions by using KeyVault and Managed Identities. Students will also learn how to connect to and consume Azure services and third-party services, and include event- and message-based models in their solutions. The course also covers monitoring, troubleshooting, and optimizing Azure solutions. Prerequisites To be successful in this course, learners should have the following: Hands-on experience with Azure IaaS and PaaS solutions, and the Azure Portal. Experience writing in an Azure supported language at the intermediate level. (C#, JavaScript, Python, or Java) Ability to write code to connect and perform operations on, a SQL or NoSQL database product. (SQL Server, Oracle, MongoDB, Cassandra or similar) Experience writing code to handle authentication, authorization, and other security principles at the intermediate level. A general understanding of HTML, the HTTP protocol and REST API interfaces. 1 - Explore Azure App Service Examine Azure App Service Examine Azure App Service plans Deploy to App Service Explore authentication and authorization in App Service Discover App Service networking features 2 - Configure web app settings Configure application settings Configure general settings Configure path mappings Enable diagnostic logging Configure security certificates 3 - Scale apps in Azure App Service Examine autoscale factors Identify autoscale factors Enable autoscale in App Service Explore autoscale best practices 4 - Explore Azure App Service deployment slots Explore staging environments Examine slot swapping Swap deployment slots Route traffic in App Service 5 - Explore Azure Functions Discover Azure Functions Compare Azure Functions hosting options Scale Azure Functions 6 - Develop Azure Functions Explore Azure Functions development Create triggers and bindings Connect functions to Azure services 7 - Explore Azure Blob storage Explore Azure Blob storage Discover Azure Blob storage resource types Explore Azure Storage security features Discover static website hosting in Azure Storage 8 - Manage the Azure Blob storage lifecycle Explore the Azure Blob storage lifecycle Discover Blob storage lifecycle policies Implement Blob storage lifecycle policies Rehydrate blob data from the archive tier 9 - Work with Azure Blob storage Explore Azure Blob storage client library Create a client object Manage container properties and metadata by using .NET Set and retrieve properties and metadata for blob resources by using REST 10 - Explore Azure Cosmos DB Identify key benefits of Azure Cosmos DB Explore the resource hierarchy Explore consistency levels Choose the right consistency level Explore supported APIs Discover request units 11 - Work with Azure Cosmos DB Explore Microsoft .NET SDK v3 for Azure Cosmos DB Create stored procedures Create triggers and user-defined functions Explore change feed in Azure Cosmos DB 12 - Manage container images in Azure Container Registry Discover the Azure Container Registry Explore storage capabilities Build and manage containers with tasks Explore elements of a Dockerfile 13 - Run container images in Azure Container Instances Explore Azure Container Instances Run containerized tasks with restart policies Set environment variables in container instances Mount an Azure file share in Azure Container Instances 14 - Implement Azure Container Apps Explore Azure Container Apps Explore containers in Azure Container Apps Implement authentication and authorization in Azure Container Apps Manage revisions and secrets in Azure Container Apps Explore Dapr integration with Azure Container Apps 15 - Explore the Microsoft identity platform Explore the Microsoft identity platform Explore service principals Discover permissions and consent Discover conditional access 16 - Implement authentication by using the Microsoft Authentication Library Explore the Microsoft Authentication Library Initialize client applications 17 - Implement shared access signatures Discover shared access signatures Choose when to use shared access signatures Explore stored access policies 18 - Explore Microsoft Graph Discover Microsoft Graph Query Microsoft Graph by using REST Query Microsoft Graph by using SDKs Apply best practices to Microsoft Graph 19 - Implement Azure Key Vault Explore Azure Key Vault Discover Azure Key Vault best practices Authenticate to Azure Key Vault 20 - Implement managed identities Explore managed identities Discover the managed identities authentication flow Configure managed identities Acquire an access token 21 - Implement Azure App Configuration Explore the Azure App Configuration service Create paired keys and values Manage application features Secure app configuration data 22 - Explore API Management Discover the API Management service Explore API gateways Explore API Management policies Create advanced policies Secure APIs by using subscriptions Secure APIs by using certificates 23 - Explore Azure Event Grid Explore Azure Event Grid Discover event schemas Explore event delivery durability Control access to events Receive events by using webhooks Filter events 24 - Explore Azure Event Hubs Discover Azure Event Hubs Explore Event Hubs Capture Scale your processing application Control access to events Perform common operations with the Event Hubs client library 25 - Discover Azure message queues Choose a message queue solution Explore Azure Service Bus Discover Service Bus queues, topics, and subscriptions Explore Service Bus message payloads and serialization Explore Azure Queue Storage Create and manage Azure Queue Storage and messages by using .NET 26 - Monitor app performance Explore Application Insights Discover log-based metrics Instrument an app for monitoring Select an availability test Troubleshoot app performance by using Application Map 27 - Develop for Azure Cache for Redis Explore Azure Cache for Redis Configure Azure Cache for Redis Interact with Azure Cache for Redis by using .NET 28 - Develop for storage on CDNs Explore Azure Content Delivery Networks Control cache behavior on Azure Content Delivery Networks Interact with Azure Content Delivery Networks by using .NET

AZ-204T00 Developing Solutions for Microsoft Azure
Delivered Online
£2,975

C++ Bootcamp Course, 2-Months

4.6(12)

By PCWorkshops

C++ Bootcamp is for coding beginners: You want all the basic stuff, all the advanced stuff and practical experience and get a fantastic job in C++

C++ Bootcamp Course, 2-Months
Delivered Online + more
£2,000

Certified Data Centre Professional (CDCP)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The primary audience for this course is any IT, facilities or data centre professional who works in and around the data centre and who has the responsibility to achieve and improve the availability and manageability of the data centre. Overview After completion of the course the participant will be able to:? Choose an optimum site for mission-critical data centre based on current and future needs? Describe all components that are important for high availability in a data centre and how to effectively setup the data centre? Name and apply the various industry standards? Describe the various technologies for UPS, fire suppression, cooling, monitoring systems, cabling standards, etc, and to select and apply them effectively to cost-efficiently enhance the high-availability of the data centre.? Review the electrical distribution system to avoid costly downtime? Enhance cooling capabilities and efficiency in the data centre by using existing and new techniques and technologies for the increased cooling requirements of the future? Design a highly reliable and scalable network architecture and learn how to ensure installers apply proper testing techniques? Create effective maintenance contracts with equipment suppliers ensuring the best return on investment? Setup effective data centre monitoring ensuring the right people get the right message? Ensure proper security measures, both procedural and technical, are established to safeguard your company's valuable information in the data centre The course will address how to setup and improve key aspects such as power, cooling, security, cabling, safety, etc., to ensure a high available data centre. It will also address key operations and maintenance aspects. The Data Centre, it?s Importance and Causes for DowntimeData Centre Standards and Best PracticesData Centre Location, Building and Construction Selecting appropriate sites and buildings and how to avoid pitfalls Various components of an effective data centre and supporting facilities setup Raised Floor/Suspended Ceiling Uniform, concentrated and rolling load definitions Applicable standards Raised Floor guidelines Signal Reference Grid, grounding of racks Disability act and regulations Suspended ceiling usage and requirements Light Standards Light fixture types and placement Emergency lighting, Emergency Power Supply (EPS) Power Infrastructure Power infrastructure layout from generation to rack level ATS and STS systems Redundancy levels and techniques Three-phase and single-phase usage Power distribution options within the computer room Power cabling versus bus bar trunking Bonding versus grounding Common Mode Noise and isolation transformers Distribution boards, form factors and IP-protection grades Power quality guidelines Real power versus apparent power How to size and calculate load in the data centre Generators Static and dynamic UPS systems, selection criteria, how they operate and energy efficiency option Battery types, correct selection and testing Thermo-graphics Electro Magnetic Fields Electrical fields and magnetic fields definitions and units of measurements Sources of EMF Effects of EMF on human health and equipment (H)EMP Standards EMF shielding solutions Equipment Racks Rack standards, properties and selection criteria Security considerations Power rail/strip options Cooling Infrastructure Temperature and humidity recommendations Cooling measurement units and conversion rates Sensible and latent heat definitions Differences between comfort and precision cooling Overview of different air conditioner technologies Raised floor versus non-raised floor cooling Placement of air conditioner units and limitations to be observed Supplemental cooling options Cold aisle/hot aisle containment Water Supply Importance of water supply and application areas Backup water supply techniques Designing a Scalable Network Infrastructure The importance of a Structured Cabling System Planning considerations Copper and Fiber cable technology and standards ANSI/TIA-942 Cabling hierarchy and recommendations Testing and verification SAN storage cabling Network redundancy Building-to-building connectivity Network monitoring system requirements Fire Suppression Standards for fire suppression Detection systems Various total flooding fire suppression techniques and systems, their benefits and disadvantages Handheld extinguishers Signage and safety Regulatory requirements and best practices Data Centre Monitoring Data centre monitoring requirements EMS versus BMS Water leak detection systems Notification options and considerations Operational Security and Safety Practices Data centre security layers Physical, infrastructure and organisational security Safety measures and essential signage Labelling Choosing a labelling scheme Recommended labelling practices Network labelling Documentation How to setup proper documentation Document management policies and procedures Cleaning Cleaning practices for the data centre MTBF/MTTR Standards and definitions Calculation models The ?real? value Maintenance Contracts/SLA/OLAEXAM: Certified Data Centre Professional Additional course details: Nexus Humans Certified Data Centre Professional (CDCP) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Certified Data Centre Professional (CDCP) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Certified Data Centre Professional (CDCP)
Delivered Online
£1,500

AZ-800T00 Administering Windows Server Hybrid Core Infrastructure

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This four-day course is intended for Windows Server Hybrid Administrators who have experience working with Windows Server and want to extend the capabilities of their on-premises environments by combining on-premises and hybrid technologies. Windows Server Hybrid Administrators implement and manage on-premises and hybrid solutions such as identity, management, compute, networking, and storage in a Windows Server hybrid environment. This course teaches IT Professionals how to manage core Windows Server workloads and services using on-premises, hybrid, and cloud technologies. The course teaches IT Professionals how to implement and manage on-premises and hybrid solutions such as identity, management, compute, networking, and storage in a Windows Server hybrid environment. Prerequisites Experience with managing Windows Server operating system and Windows Server workloads in on-premises scenarios, including AD DS, DNS, DFS, Hyper-V, and File and Storage Services Experience with common Windows Server management tools (implied in the first prerequisite). Basic knowledge of core Microsoft compute, storage, networking, and virtualization technologies (implied in the first prerequisite). Experience and an understanding of core networking technologies such as IP addressing, name resolution, and Dynamic Host Configuration Protocol (DHCP) Experience working with and an understanding of Microsoft Hyper-V and basic server virtualization concepts Basic experience with implementing and managing IaaS services in Microsoft Azure Basic knowledge of Azure Active Directory Experience working hands-on with Windows client operating systems such as Windows 10 or Windows 11 Basic experience with Windows PowerShell 1 - Introduction to AD DS Define AD DS Define users, groups, and computers Define AD DS forests and domains Define OUs Manage objects and their properties in AD DS 2 - Manage AD DS domain controllers and FSMO roles Deploy AD DS domain controllers Maintain AD DS domain controllers Manage the AD DS Global Catalog role Manage AD DS operations masters Manage AD DS schema 3 - Implement Group Policy Objects Define GPOs Implement GPO scope and inheritance Define domain-based GPOs Create and configure a domain-based GPO Define GPO storage Define administrative templates 4 - Manage advanced features of AD DS Create trust relationships Implement ESAE forests Monitor and troubleshoot AD DS Create custom AD DS partitions 5 - Implement hybrid identity with Windows Server Select a Microsoft Entra integration model Plan for Microsoft Entra integration Prepare on-premises Active Directory for directory synchronization Install and configure directory synchronization with Microsoft Entra Connect Implement Seamless Single Sign-On Enable Microsoft Entra login in for Windows VM in Azure Describe Microsoft Entra Domain Services Implement and configure Microsoft Entra Domain Services Manage Windows Server 2019 in a Microsoft Entra Domain Services environment Create and configure a Microsoft Entra Domain Services instance Join a Windows Server VM to a managed domain 6 - Deploy and manage Azure IaaS Active Directory domain controllers in Azure Select an option to implement directory and identity services using Active Directory Domain Services in Azure Deploy and configure Active Directory Domain Services domain controllers in Azure VMs Install a replica Active Directory domain controller in an Azure VM Install a new Active Directory forest on an Azure VNet 7 - Perform Windows Server secure administration Define least privilege administration Implement delegated privileges Use privileged access workstations Use jump servers 8 - Describe Windows Server administration tools Explore Windows Admin Center Use Server Manager List Remote Server Administration Tools Use Windows PowerShell Use Windows PowerShell to remotely administer a server 9 - Perform post-installation configuration of Windows Server List the available post-installation configuration tools Configure Server Core using Sconfig Use DSC to configure Windows Server Perform post-installation configuration with Windows Admin Center Configure a server with answer files 10 - Just Enough Administration in Windows Server Explain the concept of Just Enough Administration (JEA) Define role capabilities for a JEA endpoint Create a session configuration file to register a JEA endpoint Describe how JEA endpoints work to limit access to a PowerShell session Create and connect to a JEA endpoint Demonstration: Connect to a JEA endpoint 11 - Administer and manage Windows Server IaaS Virtual Machine remotely Select the appropriate remote administration tool Manage Windows Virtual Machines with Azure Bastion Create an Azure Bastion host Configure just-in-time administration 12 - Manage hybrid workloads with Azure Arc Describe Azure Arc Onboard Windows Server instances Connect hybrid machines to Azure from the Azure portal Use Azure Arc to manage Windows Server instances Restrict access with RBAC 13 - Configure and manage Hyper-V Define Hyper-V Define Hyper-V Manager Configure Hyper-V hosts using best practices Configure Hyper-V networking Assess advanced Hyper-V networking features Define nested virtualization 14 - Configure and manage Hyper-V virtual machines List the virtual machine configuration versions List the virtual machine generation versions List available VHD formats and types Create and configure VMs Determine storage options for VMs Define shared VHDs and VHD Sets Implement guest clusters using shared VHDX 15 - Secure Hyper-V workloads Define guarded fabric Define the Host Guardian Service Explore TPM-trusted attestation Define KPS Determine key features of shielded VMs Compare encryption-supported and shielded VMs in a guarded fabric Implement a shielded VM 16 - Run containers on Windows Server Define containers List the differences between containers and VMs Define Windows Server and Hyper-V containers and isolation modes Explore Docker Prepare a Windows Server 2019 host for container deployment Security, Storage, and Networking with Windows containers 17 - Orchestrate containers on Windows Server using Kubernetes Define orchestration Define Kubernetes Deploy Kubernetes resources Create a Kubernetes cluster on Windows Define Azure Arc Connect an Azure Arc-enabled Kubernetes cluster to Azure Arc 18 - Plan and deploy Windows Server IaaS Virtual Machines Describe Azure compute Describe Virtual Machine storage Deploy Azure Virtual Machines Create a windows Virtual Machine using the portal Create a windows Virtual Machine using Azure CLI Deploy Azure Virtual Machines using templates Describe additional management optimization options 19 - Customize Windows Server IaaS Virtual Machine images Create a generalized image Create a new Virtual Machine from a managed image Create a managed image of a generalized virtual machine in Azure Create a Virtual Machine from a managed image Implement Azure Image Builder Create a windows Virtual Machine using Azure Image Builder template Create a Windows Virtual Machine with Azure Image Builder using PowerShell 20 - Automate the configuration of Windows Server IaaS Virtual Machines Describe Azure Automation Implement Azure Automation with DSC Remediate noncompliant servers Describe Custom Script Extensions Configure a Virtual Machine by using DSC 21 - Deploy and manage DHCP Use DHCP to simplify IP configuration Install and configure the DHCP role Configure DHCP options Configure DHCP scopes Select DHCP high availability options Implement DHCP Failover 22 - Implement Windows Server DNS Explore the DNS architecture Work with DNS zones and records Install and configure the DNS role Implement DNS forwarding 23 - Implement IP Address Management Define IP Address Management Deploy IP Address Management Administer IP Address Management Configure IP Address Management options Manage DNS zones with IP Address Management Manage DHCP servers with IP Address Management Use IP Address Management to manage IP addressing 24 - Implement remote access Examine the remote access options in Windows Server Select and set up VPNs Use NPS to create and enforce network access policies Plan and implement NPS Deploy a PKI for remote access Use WAP as a reverse web proxy 25 - Implement hybrid network infrastructure Describe Azure network topologies Implement Azure VPN options Create a route-based VPN gateway using the Azure portal Implement Azure ExpressRoute Configure Azure Virtual WAN Implement DNS in hybrid environments 26 - Implement DNS for Windows Server IaaS VMs Understand Azure DNS Implement Azure DNS Create an Azure DNS zone and record using the Azure portal Implement DNS with Azure IaaS virtual machines Implement split-horizon DNS in Azure Troubleshoot DNS 27 - Implement Windows Server IaaS VM IP addressing and routing Implement a virtual network Implement IaaS VM IP addressing Assign and manage IP addresses Configure a private IP address for a virtual machine using the Azure portal Create a virtual machine with a static public IP address using the Azure portal Implement IaaS virtual machine IP routing Implement IPv6 for Windows Server IaaS virtual machines 28 - Manage Windows Server file servers Define the Windows Server file system List the benefits and uses of File Server Resource Manager Define SMB and its security considerations Configure SMB protocol Define Volume Shadow Copy Service 29 - Implement Storage Spaces and Storage Spaces Direct Define the Storage Spaces architecture and its components List the functionalities, benefits, and use cases of Storage Spaces Implement Storage Spaces List the functionalities, components, benefits, and use cases of Storage Spaces Direct Implement Storage Spaces Direct 30 - Implement Windows Server Data Deduplication Define the architecture, components, and functionality of Data Deduplication Define the use cases and interoperability of Data Deduplication Implement Data Deduplication Manage and maintain Data Deduplication 31 - Implement Windows Server iSCSI List the functionalities, components, and use cases of iSCSI List the considerations for implementing iSCSI Implement iSCSI Configure high availability for iSCSI 32 - Implement Windows Server Storage Replica List the functionalities and components of Storage Replica Examine the prerequisites for implementing Storage Replica Implement Storage Replica by using Windows Admin Center Implement Storage Replica by using Windows PowerShell 33 - Implement a hybrid file server infrastructure Describe Azure File services Configure Azure Files Configure connectivity to Azure Files Describe Azure File Sync Implement Azure File Sync Deploy Azure File Sync Deploy Azure File Sync 2 Manage cloud tiering Migrate from DFSR to Azure File Sync

AZ-800T00 Administering Windows Server Hybrid Core Infrastructure
Delivered Online
£2,380