• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

4264 Operations courses delivered Online

VMware vRealize Automation SaltStack SecOps: Deploy and Manage [V8.6]

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Security administrators who are responsible for using SaltStack SecOps to manage the security operations in their enterprise Overview By the end of the course, you should be able to meet the following objectives: Describe the architecture of SaltStack Config and SaltStack SecOps Integrate SaltStack Config with directory services. Configure roles and permissions for users and groups to manage and use SaltStack SecOps Use targeting to ensure that the jobs run on the correct minion systems Use remote execution modules to install the packages, transfer files, manage services, and manage users on minion systems Manage configuration control on the minion systems with states, pillars, requisites, and declarations Use Jinja and YAML code to manage the minion systems with the state files Enforce the desired state across minion systems automatically Use SaltStack SecOps to update the compliance and vulnerability content libraries Use SaltStack SecOps to enforce compliance and remediation on the infrastructure with industry standards Use SaltStack SecOps to provide automated vulnerability scanning and remediation on your infrastructure This two-day, hands-on training course provides you with the advanced knowledge, skills, and tools to achieve competency in using VMware vRealize© Automation SaltStack© SecOps. SaltStack SecOps allows you to scan your system for compliance against security benchmarks, detect system vulnerabilities, and remediate your results. This course enables you to create the SaltStack SecOps custom compliance libraries and use SaltStack SecOps. In addition, this course provides you with the fundamentals of how to use VMware vRealize© Automation SaltStack© Config to install software and manage system configurations. Course Introduction Introductions and course logistics Course objectives SaltStack Config Architecture Identify the SaltStack Config deployment types Identify the components of SaltStack Config Describe the role of each SaltStack Config component SaltStack Config Security Describe local user authentication Describe LDAP and Active Directory authentication Describe the roles and permissions in vRealize Automation for SaltStack Config Describe the roles and permissions in SaltStack Config Describe the SecOps permissions in SaltStack Config Describe the advanced permissions available in SaltStack Config Targeting Minions Describe targeting and its importance Target minions by minion ID Target minions by glob Target minions by regular expressions Target minions by lists Target minions by compound matching Target minions by complex logical matching Remote Execution and Job Management Describe remote execution and its importance Describe functions and arguments Create and manage jobs Use the Activities dashboard Configuration Control Through States, Pillars, Requisites, and Declarations Define the SaltStack states Describe file management in SaltStack Config Create the SaltStack state files Identify the components of a SaltStack state Describe pillar data and the uses of pillar data Configure pillar data on the SaltStack Config master server Use pillar data in variables in the state files Describe the difference between IDs and names in the state files Use the correct execution order Use requisites in the state files Using Jinja and YAML Describe the SaltStack Config renderer system Use YAML in the state files Use Jinja in the state files Use Jinja conditionals, lists, and loops Using SaltStack SecOps Comply Describe the SaltStack SecOps Comply architecture Describe CIS and DISA STIG benchmarks Describe the SaltStack SecOps Comply security library Describe the remediation differences between SaltStack SecOps and VMware Carbon Black© Create and manage the policies Create and manage the custom checks Run assessments on the minion systems Use SaltStack SecOps to remediate the noncompliant systems Manage the SaltStack SecOps Comply configuration options Manage the benchmark content ingestion Using SaltStack SecOps Protect Describe Common Vulnerabilities and Exposures (CVEs) Use the Protect dashboard Create and manage the policies Update the vulnerability library Run the vulnerability scans Remediate the vulnerabilities Manage the vulnerability exemptions

VMware vRealize Automation SaltStack SecOps: Deploy and Manage [V8.6]
Delivered OnlineFlexible Dates
Price on Enquiry

Symantec Ghost Solution Suite 3.0 - Administration

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is for network and system administrators, IT managers, IT support personnel, and other network operations staff who are responsible for deploying new computers across their organizations, managing ongoing software and hardware configuration tasks for computers, and retiring outdated computers. Overview By the completion of this course, you will be able to: Install and configure Ghost Solution Suite 3.0. Use the Ghost Console to create and use jobs and tasks to manage computes. Configure image deployments. Manage ?unknown? and predefined computers. Perform disk wipes and create disk partitions. Create Windows scripted OS installations. Create PC transplant templates. Capture a computer personality, and deploy personality packages. Perform a computer migration from Win 7 to Win 8.1. This course is designed for the professional tasked with installing, configuring, and managing a Deployment Solution system. Overview of Endpoint Lifecycle Management Introduction to Endpoint Lifecycle Management Phases of Endpoint Lifecycle Management ELM Business Objectives and Goals ELM Solution Mapping to Business Objectives Ghost Solution Suite 3.0 Product Overview Implementation Assessment ELM Requirements Gathering Solution Analysis of ELM Requirements Implementation Design GSS 3.0 Technical Overview Installation Options and Prerequisites Defining the Solution Infrastructure Defining the ELM Solution Configuration Installation and Configuration of the ELM Solution Base Software Installation Navigating the Console Core & Solution Configuration Driver Management Pre-boot Environment Endpoint Identification & Gathering IT Requirements Overview Analyzing and Defining IT Requirements Using ELM to Forecast IT Requirements Endpoint Configuration Standards Endpoint Standards Overview Defining Endpoint Standards Implementation of Endpoint Standards Endpoint Provisioning Endpoint Provisioning Overview Standard Build and Image Methodology Software Compatibility Analysis Software Packaging requirements for use in the ELM Solution Software Quality Assurance Methodology Endpoint Deployment & Staging Endpoint Lifecycle Automation Endpoint Lifecycle Automation Scenario Exercise Backup and restore Automating the backup of a computer image Scripted OS Installation Capturing an image for deployment Automating the creation of a master image Automating the deployment of computer images Software Distribution Software Delivery Methods Software Installation Methods Understanding Software Delivery Reporting and Analysis of Software Distribution Tasks Image and Build Maintenance Image maintenance overview Restoring a computer image Capturing the updated image Updating Jobs Managing Software Upgrades Software Upgrade Process Overview Distribution of Software Updates Supporting the Business Ensuring Business Continuity in an ELM System Endpoint Restoration/Recovery Managing Service Support Activities Endpoint Monitoring & Alerting Endpoint Configuration & Maintenance Automating Problem Resolution Application Self-Healing Desired State Management Hardware Refresh & Migration Hardware Refresh & Migration Process Overview Personality Capture and Restore Gathering Current State Inventory for Requirements and Planning Activities Performing Data capture and storage activities Gathering User state or PC personality information Automating the Migration Process Endpoint Retirement/Disposal Ensuring Compliant Disposal Methods and Procedures End to End Endpoint Lifecycle Use Case Endpoint Management Lifecycle Use Case for GSS Additional course details: Nexus Humans Symantec Ghost Solution Suite 3.0 - Administration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Symantec Ghost Solution Suite 3.0 - Administration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Symantec Ghost Solution Suite 3.0 - Administration
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco NSO Essentials for Programmers and Network Architects v3.0 (NSO201)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for System installersSystem integratorsSystem administratorsNetwork administratorsSolutions designers Overview After completing this course, you should be able to:Explain transactional service activation and how it relates to business requirementsExplain the benefits and uses of Cisco NSOExplain how Cisco NSO communicates with network devicesUnderstand the NETCONF protocol and be able to read and write simple YANG modelsInstall NSO and describe how NSO uses NETCONF and the Device Manager componentUnderstand the difference between devices that are fully NETCONF capable and those that are less or not NETCONF capableExplain the YANG service model structureDescribe how YANG is used with NSO, create and deploy a service, and explain NSO FASTMAPDesign and manage services with YANG modelsPerform NSO configuration and basic troubleshooting, and describe the following NSO features: integration options, alarms and reporting, scalability and performance options, and available function packsUse logs to troubleshoot the Cisco NSO deployment and check NSO communication with network devicesExplain the mapping logic of service parameters to device models and consequently to device configurationsDescribe the use of different integration options and APIsExplain the use of Reactive FASTMAP for manipulating and implementing advanced Network Functions Virtualization (NFV) componentsDescribe the use of feature components and function packsDefine and explain the European Telecommunications Standards Institute (ETSI) Open Source NFV Management and Orchestration (MANO) principles and solutionWork with the alarm console, and understand the NSO alarm structure and how it conforms to modern network operations procedures The Cisco NSO Essentials for Programmers and Network Architects (NSO201) course introduces you to Cisco© Network Services Orchestrator (NSO). You will learn to install Cisco NSO and use it to manage devices and create services based on YANG templates with XPath. This course provides a brief overview of NSO as a network automation solution, as well as an introduction to NETCONF, YANG, and XPath. You will learn about service packages, network element drivers, and Application Programming Interfaces (APIs). The course also covers service creation, device and configuration management, NSO maintenance, NSO options and integrations, and basic NSO troubleshooting. Introduction to Cisco NSO Meeting Challenges with Orchestration Challenges of Network Management Challenges of Network Orchestration NSO Features and Benefits That Meet Challenges Standardized Approach What Is NSO? Logical Architecture Components What Does NSO Do? Orchestration Use Cases How Does NSO Work? Introduction to NETCONF and YANG Packages Mapping Logic Network Element Drivers (NEDs) Resources and Training Resources Training Get Started with Cisco NSO Installing Cisco NSO Setup Overview Cisco NSO Local Installation Installing NEDs Using NetSim NETCONF Overview Challenges of Network Management Introduction to NETCONF NETCONF Operation Device Manager Device Manager Overview Device Configuration Management Device Connection Management Templates and Groups Other Device Management Tools Service Manager Essentials YANG Overview Introduction to YANG Other Representations of YANG Data Types XPath Overview Basic YANG Statements Can You Spot the Error? Using Services Package Architecture Creating a Service Package Sample Service Configuration Service Template YANG Service Model Deploying a Service Model-to-Model Mapping Mapping Introduction Mapping Logic FASTMAP Template Processing Service Design and Cisco NSO Programmability Service Design Service Design Overview Top-Down Approach Bottom-Up Approach Device Configuration Service Model Service Management Service Management Tasks Service Lifecycle Management Guidelines NSO Programmability Introduction NSO Programmability Overview Python Service Skeleton Creating a Service YANG Model Creating a Service Template Template Processing with Python Cisco NSO Flexibility System Configuration and Troubleshooting System Configuration System Troubleshooting Integration Integration Options NETCONF Server Web Integration SNMP Agent Alarm Management and Reporting Alarm Management Reporting Scalability and Performance High Availability High-Availability Cluster Communications Clustering Layered Service Architecture Addressing Performance Limitations Components and Function Packs Function Packs NFV Orchestration Reactive FASTMAP

Cisco NSO Essentials for Programmers and Network Architects v3.0 (NSO201)
Delivered OnlineFlexible Dates
Price on Enquiry

AZ-304T00 - Microsoft Azure Architect Design

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is for IT Professionals with expertise in designing and implementing solutions running on Microsoft Azure. They should have broad knowledge of IT operations, including networking, virtualization, identity, security, business continuity, disaster recovery, data platform, budgeting, and governance. Azure Solution Architects use the Azure Portal and as they become more adept they use the Command Line Interface. Candidates must have expert-level skills in Azure administration and have experience with Azure development processes and DevOps processes. Overview Recommend solutions to minimize costs Recommend a solution for Conditional Access, including multi-factor authentication Recommend a solution for a hybrid identity including Azure AD Connect and Azure AD Connect Recommend a solution for using Azure Policy Recommend a solution that includes KeyVault Recommend a solution that includes Azure AD Managed Identities Recommend a storage access solution Design an Azure Site Recovery solution Recommend a solution for autoscaling Recommend a solution for containers Recommend a solution for network security Recommend a solution for migrating applications and VMs Recommend a solution for migration of databases This course teaches Solutions Architects how to translate business requirements into secure, scalable, and reliable solutions. Lessons include design considerations related to logging, cost analysis, authentication and authorization, governance, security, storage, high availability, and migration. This role requires decisions in multiple areas that affect an overall design solution. Design a Compute Solution Recommend a Solution for Compute Provisioning Determine Appropriate Compute Technologies Recommend a Solution for Containers Recommend a Solution for Automating Compute Management Design a Network Solution Recommend a Solution for Network Addressing and Name Resolution Recommend a Solution for Network Provisioning Recommend a Solution for Network Security Recommend a Solution for iInternete Connectivity and On-Premises Networks Recommend a Solution for Automating Network Management Recommend a Solution for Load Balancing and Rraffic Routing Design for Migration Assess and On-Premises Servers and Applications for Migration Recommend a Solution for Migrating Applications and VMs Recommend a Solution for Migration of Databases Design Authentication and Authorization Tips for Identity and Access Management Recommend a Solution for Multi-Factor Authentication Five Steps for Securing Identity Infrastructure Recommend a Solution for Single-Sign On (SSO) Recommend a Solution for a Hybrid Identity Recommend a Solution for B2B Integration Recommend a Hierarchical Structure for Management Groups Design Governance Recommend a Solution for using Azure Policy Recommend a Solution for using Azure Blueprint Design a Solution for Databases Select an Appropriate Data Platform Based on Requirements Overview of Azure Data Storage Recommend Database Service Tier Sizing Dynamically Scale Azure SQL Database and Azure SQL Managed Instances Recommend a Solution for Encrypting Data at Rest, Transmission, and In Use Select an Appropriate Storage Account Understanding Storage Tiers Recommend a Storage Access Solution Recommend Storage Management Tools Design Data Integration Recommend a Data Flow Recommend a Solution for Data Integration Design a Solution for Logging and Monitoring Azure Monitoring Services Azure Monitor Design a Solution for Backup and Recovery Recommend a Recovery Solution for Hybrid and On-Premises Workloads Design and Azure Site Recovery Solution Recommend a Solution for Recovery in Different Regions Recommend a Solution for Azure Backup Management Design a Solution for Data Archiving and Retention Design for High Availability Recommend a Solution for Application and Workload Redundancy Recommend a Solution for Autoscaling Identify Resources that Require High Availability Identify Storage Tpes for High Availability Recommend a Solution for Geo-Redundancy of Workloads Design for Cost Optimization Recommend Solutions for Cost Management Recommended Viewpoints for Minimizing Costs Design an Application Architecture Recommend a Microservices Architecture Recommend an Orchestration Solution for Deployment of Applications Recommend a Solution for API Integration Design Security for Applications Security for Applications and Services Recommend a Solution using Key Vault Recommend Solutions using Azure AD Managed Identities

AZ-304T00 - Microsoft Azure Architect Design
Delivered OnlineFlexible Dates
Price on Enquiry

MB-340T00: Microsoft Dynamics 365 Commerce Functional Consultant

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for The audience for this course is either: a Dynamics 365 consultant who wants to learn Commerce, or a retail analyst with core Dynamics 365 experience who wants to apply their skills to the Dynamics product family. Overview After completing this course, students will be able to: Configure Dynamics 365 Commerce Headquarters Configure products, prices, discounts, loyalty, and affiliations Manage Point of Sale (POS) in Dynamics 365 Commerce Configure and Manage Dynamics 365 Commerce call centers Manage e-commerce Dynamics 365 Commerce functional consultants set up and use the application functionality in Dynamics 365 Commerce, and provide support for the application. The functional consultant typically has a strong understanding of unified commerce business operations, and experience configuring, deploying, maintaining, and using Microsoft Dynamics 365 Commerce. This four-day course covers the essentials for the role Module 1: Get started with Dynamics 365 Commerce Introduction to Unified Commerce platform Dynamics 365 Commerce architecture Deployment of Dynamics 365 Commerce Hardware and peripherals Module 2: Configure Commerce Headquarters Configure prerequisites and Commerce parameters Configure and maintain payment processing Configure Commerce Data Exchange (CDX) Configure delivery modes and charges Configure and work with statements Module 3: Products and Merchandising Product information management Merchandising in Dynamics 365 Commerce Product recommendations and product discovery Module 4: Retail Pricing Manage Pricing Manage discounts and promotions Module 5: Loyalty and customer experience Customer Management Loyalty and affiliations Module 6: Point of sale Introduction to POS Channel Setup Configure Cash and Shift management Worker Setup Point of Sale Setup Customer management at POS Transaction processing Inventory processing End of day processing Reporting Configure and work with Task management Test POS Maintain registers and devices Localization Module 7: Configure and work with call centers in Dynamics 365 Commerce Configure channel Configure Product Catalogs Configure Order Holds Create call center orders Configure call center directed selling Configure Returns and Refunds Configure continuity orders and installment billing Module 8: Work with E-Commerce in Dynamics 365 Commerce Describe e-commerce core capabilities Configure an E-Commerce Channel in Dynamics 365 HQ Configure an E-Commerce site Configure and manage E-Commerce site content Describe & Demonstrate digital asset management Configure business-to-business (B2B) site Configure Ratings and reviews functionality Demonstrate E-Commerce Order Processing Module 9: Manage order fulfillment and inventory in Dynamics 365 Commerce Configure and work with Stock replenishment Configure and work with Order fulfillment Module 10: Work with Dynamics 365 Fraud Protection Overview of Dynamics Fraud Protection Describe Dynamics Fraud Protection Services Configure and work with Dynamics Fraud Protection with Dynamics 365 Commerce Additional course details: Nexus Humans MB-340T00: Microsoft Dynamics 365 Commerce Functional Consultant training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the MB-340T00: Microsoft Dynamics 365 Commerce Functional Consultant course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

MB-340T00: Microsoft Dynamics 365 Commerce Functional Consultant
Delivered OnlineFlexible Dates
Price on Enquiry

BIT400 SAP Process Integration

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course are Business Process Architects, Developers, Developer Consultants, System Administrators, System Architects, and Technology Consultants. Overview The participants will learn to configure scenariosUnderstand and configure the different options with which a back-end system can be connected to the SAP Process Integration (formerly known as SAP Exchange Infrastructure). In this course, students gain knowledge in configuring SAP Process Integration and learn how to implement different integration scenarios with SAP and non-SAP applications. SAP Process Integration Architecture Describing SAP Process Integration Architecture Explaining the Functionality and Utilization of SAP Process Integration The System Landscape Directory (SLD) Maintaining Products and Software Components in the System Landscape Directory (SLD) Implementing Technical Systems in the System Landscape Directory Maintaining Business Systems for Use in the Integration Directory Interface Objects in the Enterprise Service Repository (ESR) Listing Options for Navigating the Enterprise Services Repository (ESR) Analyzing Interface Objects in the Enterprise Services Repository (ESR) Maintaining Interface Objects Defining Message Processing Types and Quality of Services Object Mapping in the Enterprise Service Repository (ESR) Creating Message Mapping Objects Mapping Between Service Interfaces Analyzing Asynchronous Integration Scenarios Configuration of Integration Directory Communication Objects Using Configuration Views Creating Communication Channels in the Integration Directory (ID) Configuration of Integration Directory Objects for ABAP Processing Analyzing Objects Used in the Configuration of Integration Engine (IE) Communication Analyzing Routing Objects Used in Integration Engine (IE) Communication Analyzing Multiple Receiver Objects Used in Integration Engine (IE) Communication Configuration of Integration Directory Objects for Java Processing Maintaining Objects for Advanced Adapter Engine (AAE)-Only Processing Maintaining Objects for Advanced Adapter Engine Extended (AEX) Message Processing Creating and Deploying Integration Flows to the Advanced Adapter Engine Extended (AEX) Operations of SAP Process Integration Using the Runtime Workbench Using the Process Integration Monitoring (PIMon) Home Using the SAP NetWeaver Administrator Connectivity Options for SAP Process Integration Analyzing Connectivity Options between Back-End Systems with SAP Process Integration HTTP Connectivity Options Configuring the Simple Object Access Protocol (SOAP) Adapter Using Proxy Technology Checking the HTTP ABAP Adapter Using the HTTP_AAE (Java) Adapter File Adapter Configuration Configuring the Receiver File Adapter Configuring a Sender File Adapter Intermediate Document (IDoc) Connectivity Options Using the Intermediate Document (IDoc) Adapter with the Receiver Intermediate Document Adapter for the ABAP Stack Using the Sender Intermediate Document (IDoc) Adapter Using the Intermediate Document (IDoc) Adapter in the Advanced Adapter Engine (AAE) Configuring a Complete Intermediate Document (IDoc) Scenario Configuration of SAP Business Application Programming Interfaces (BAPIs) Connectivity Configuring the Receiver Remote Function Call (RFC) Adapter Configuring the Sender Remote Function Call (RFC) Scenario Enterprise Services and B2B Connectivity Analyzing Enterprise Services Configuring Business-to-Business (B2B) Connectivity Cross-Component Business Process Management (ccBPM) Integration Processes Analyzing the Runtime of the Cross-Component Business Process Management (ccBPM) Identifying the Steps to Create and Use an Integration Process Additional course details: Nexus Humans BIT400 SAP Process Integration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the BIT400 SAP Process Integration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

BIT400 SAP Process Integration
Delivered OnlineFlexible Dates
Price on Enquiry

Virtual Assistant

By The Teachers Training

Overview Virtual Assistant Course is yet another 'Teacher's Choice' course from Teachers Training for a complete understanding of the fundamental topics. You are also entitled to exclusive tutor support and a professional CPD-accredited certificate in addition to the special discounted price for a limited time. Just like all our courses, this Virtual Assistant Course and its curriculum have also been designed by expert teachers so that teachers of tomorrow can learn from the best and equip themselves with all the necessary skills. Consisting of several modules, the course teaches you everything you need to succeed in this profession. The course can be studied part-time. You can become accredited within 05 Hours studying at your own pace. Your qualification will be recognised and can be checked for validity on our dedicated website. Why Choose Teachers Training Some of our website features are: This is a dedicated website for teaching 24/7 tutor support Interactive Content Affordable price Courses accredited by the UK's top awarding bodies 100% online Flexible deadline Entry Requirements No formal entry requirements. You need to have: Passion for learning A good understanding of the English language Be motivated and hard-working Over the age of 16. Certification CPD Certification from The Teachers Training Successfully completing the MCQ exam of this course qualifies you for a CPD-accredited certificate from The Teachers Training. You will be eligible for both PDF copy and hard copy of the certificate to showcase your achievement however you wish. You can get your digital certificate (PDF) for £4.99 only Hard copy certificates are also available, and you can get one for only £10.99 You can get both PDF and Hard copy certificates for just £12.99! The certificate will add significant weight to your CV and will give you a competitive advantage when applying for jobs. Module 01: Introduction to Virtual Assistant Introduction to Virtual Assistant 00:16:00 Module 02: Different Types of Virtual Assistants Different Types of Virtual Assistants 00:24:00 Module 03: Be a Virtual Assistant Be a Virtual Assistant 00:12:00 Module 04: Must-Have Skills for Virtual Assistants Must Have Skills for Virtual Assistants 00:22:00 Module 05:Essential Tools for a Virtual Assistant Essential Tools for a Virtual Assistant 00:10:00 Module 06: Finding Your Niche Finding Your Niche 00:12:00 Module 07: Get Hired for VA Jobs Get Hired for VA Jobs 00:20:00 Module 08: How to Set VA Business How to Set VA Business 00:16:00 Module 09: Admin Support- a Vital Part of VA Admin Support a Vital Part of VA 00:14:00 Module 10: How to Manage Clients How to Manage Clients 00:10:00 Module 11: Working with a Virtual Team Working with a Virtual Team 00:12:00 Module 12: Data Security Measures Data Security Measures 00:20:00 Assignment Assignment - Virtual Assistant 00:00:00

Virtual Assistant
Delivered Online On Demand3 hours 8 minutes
£27.99

AWS Serverless Microservices with Patterns and Best Practices

By Packt

You will learn how to develop reliable and scalable serverless applications, following the microservices architecture. We will develop event-driven microservices with AWS serverless services that come with the power of the cloud, high availability and high scalability by nature following serverless design patterns and best practices.

AWS Serverless Microservices with Patterns and Best Practices
Delivered Online On Demand30 hours 20 minutes
£74.99

Level 5 Hospitality & Tourism Management with Customer Service

By Wise Campus

Hospitality: Hospitality Course Online Our Level 5 Hospitality Management programme might help you discover your passion for a career in a service-based sector. Are you ready to develop your talents and have an enthusiasm for the hospitality sector? Look nowhere else! With a thorough curriculum, our Level 5 Hospitality Management covers all facets of hospitality management, from travel and tourism to food safety. With its nine specific modules, this Level 5 Hospitality Management the course will provide you with a strong grasp. This Level 5 Hospitality Management explains the fundamentals of the hospitality sector and its main divisions. By the help of Level 5 Hospitality Management You will examine the industry overview with an emphasis on various hotel kings and hospitality roles, changes, growth, and operations. With Level 5 Hospitality Management You will also learn how to manage marketing campaigns. Take the first step towards a lucrative career in the hospitality business by enrolling right away in our Level 5 Hospitality Management. Main Course: Level 5 Hospitality Management Course Free Courses are including with this Hospitality: Hospitality Course Along with The Hospitality: Hospitality Course, We Offer a free Level 5 Travel & Tourism Course Along with Hospitality: Hospitality Course, We Offer a free Level 2 Customer Service Course Special Offers of this Hospitality: Hospitality Course This Hospitality: Hospitality Course includes a FREE PDF Certificate. Lifetime access to this Hospitality: Hospitality Course Instant access to this Hospitality: Hospitality Course Get FREE Tutor Support to this Hospitality: Hospitality Course Hospitality: Hospitality Course Online With an emphasis on various hotel kinds and hospitality positions, this course on hospitality management will provide you with a strong understanding of the hospitality sector and its important areas. This course on hospitality management will teach you how to create a service management program that integrates cutting-edge technology, safety, security, and quality, as well as how to manage all hotel operations. Who is this course for? Hospitality: Hospitality Course Online For people who are enthusiastic about the hotel sector and want to thrive in a variety of professions within it, this Level 5 Hospitality Management programme is perfect. It is appropriate for: Job seekers Event planners Culinary enthusiastics Hospitality professionals seeking advancement Hospitality business owners Entrepreneurs seeking to expand their knowledge. Receptionists or customer service representatives working in the hospitality industry. Requirements Hospitality: Hospitality Course Online To enrol in this Hospitality: Hospitality Course, students must fulfil the following requirements. To join in our Hospitality: Hospitality Course, you must have a strong command of the English language. To successfully complete our Hospitality: Hospitality Course, you must be vivacious and self driven. To complete our Hospitality: Hospitality Course, you must have a basic understanding of computers. A minimum age limit of 15 is required to enrol in this Hospitality: Hospitality Course. Career path Hospitality: Hospitality Course Online Candidates who successfully completed our Level 5 Hospitality Management programme can choose from a variety of careers, such as director of maintenance, marketing, operations, sales, and event planner, all of which provide handsome salaries in the UK between £30,000 and £60,000 annually.

Level 5 Hospitality & Tourism Management with Customer Service
Delivered Online On Demand1 hour 48 minutes
£12

Pefect your Algebra Fundamentals

By iStudy UK

Algebra is one of the most common and malleable types of mathematics, and it is also one of the most significant since primary algebra used by electricians, engineers, and nearly everyone in between. This Pefect your Algebra Fundamentals is intended for individuals with no prior knowledge of Algebra. This course includes all the fundamental concepts of Algebra, and each step-by-step arranged modules will explain topics in a mild and an approachable manner. You will understand the basic terminology of Algebra, following with finding the numerical value of Algebraic expressions, addition, subtraction, multiplication and division of Algebraic expressions, directed numbers, higher indices, use of brackets in Algebra and many more. To sum up, theories explained in an interactive and practical format and then further demonstrated with questions to ensure you have a good understanding of the topics by the end of this course. What Will I Learn? Apply laws of Indices ( Exponents) on algebraic expressions. Algebraic Identities used in algebra and their application like ( a - b ) ² , ( a + b ) ³ , a ³ - b ³ , ( a + b + c ) ² etc Factorize using common factors, regrouping , splitting the middle term, using identity a² - b² , (a+b)² , (a+b)² ,a ³ + b ³ + c ³ - 3 a b c etc Solve all types of Linear equations in one variable Word problems based on linear equations Knows about adding and removing brackets in algebraic expressions Change the subject of formula simplify fractions with denominators algebraic expression and bring them to its lowest form Add , subtract , multiply and divide any algebraic expression Divide one polynomial by another by long division method Find value of any algebraic expression when value of variable is known Fully familiar with rarely used identity a ³ + b ³ + c ³ - 3 a b c Learn to draw line graph Solve Linear Inequalities Able to solve all the problems of simultaneous linear equations by applying different methods Able to solve linear equations with 1/2 variables graphically Able to solve real world problems with the help of simultaneous linear equations Solve Quadratic equations using Factorization method and Quadratic Formula Solve Quadratic using squaring complete method Solve all types of complex Quadratic equations and reducible to quadratic equation Knowledge of nature of roots of quadratic equations Learn to solve different types of word problems on Quadratic equations Requirements Knowledge of Mathematics till 5th grade Who is the target audience? GMAT , GRE and MBA entrance exams students looking for revision of Algebra fundamentals Wants to brush up basics of algebra in Mathematics Current IGCSE students because course is designed to cover topics of Algebra Current Algebra students of CBSE , ICSE board . Middle school, High school or early college level students If Algebra is always trouble for you then this course is specially for you as it will teach from very basics to in depth knowledge giving lots of practice through solving problems Students who wants to learn all types of factorisation especially middle term split High school students who have gaps in their knowledge and would like to fill them with basics Introduction Lecture 1 Intro video Algebra Introduction final 00:02:00 Fundamental concepts on Algebraic Expressions Lecture 2 Terminology used in Algebra 00:05:00 Lecture 3 Language of Algebra 00:06:00 Lecture 4 Practice Questions 00:06:00 Lecture 5 Finding numerical value of an algebraic expression 00:14:00 Operations on Algebraic Expressions Lecture 6 Revision of Directed number ( integers 00:06:00 Lecture 7 Addition and subtraction of monomial expressions 00:06:00 Lecture 8 Addition of algebraic expressions with many terms 00:10:00 Lecture 9 Subtraction of algebraic expressions 00:10:00 Indices ( Exponents) Lecture 10 The rules of Indices in algebra 00:11:00 Lecture 11 Fractional indices 00:10:00 Lecture 12 Understanding indices (practice questions) 00:07:00 Lecture 13 Problems from IGCSE Last year papers 00:09:00 Multiplication and Division of Algebraic expressions Lecture 14 Multiplication of monomial algebraic expressions 00:05:00 Lecture 15 Multiplication of monomial with binomials and trinomials 00:11:00 Lecture 16 Division of algebraic expression by a monomial 00:07:00 Lecture 17 Division of algebraic expression by another polynomial 00:09:00 Lecture 18 Division of a polynomial by another polynomial with remainder 00:11:00 Brackets in Algebra Lecture 19 Rules of brackets 00:04:00 Lecture 20 Simplification by removing brackets 00:11:00 Linear equations in one variable Lecture 21 Simplification of algebraic fractions 00:07:00 Lecture 22 Rules to solve linear equations in one variable 00:03:00 Lecture 23 Solving linear equations in one variable 00:07:00 Pefect your Algebra Fundamentals 00:10:00 Lecture 25 Word problems on linear equations in one variable 00:13:00 Algebraic Identities Lecture 26 Standard Identities (a + b )² and (a - b )² identities 00:11:00 Lecture 27 Standard Identity ( a - b ) ( a + b) = a ² - b ² 00:08:00 Lecture 28 Standard Identities ( a + b + c ) ² = a ² + b ² + c ² + 2 a b + 2 a c +2 b c 00:07:00 Lecture 29 Standard Identities ( a + b ) ³ and ( a - b ) ³ 00:09:00 Lecture 30 Standard Identities a ³ + b ³ and a ³ - b ³ 00:06:00 Lecture 31 Standard Identities a ³ + b ³ + c ³ - 3 a b c 00:10:00 Formula : Change of subject of formula Lecture 32 -Changing the subject of formula 00:08:00 Linear Inequalities Lecture 33 Linear Inequalities 00:12:00 Resolve into factors Lecture 34 Factorization by taking out common factor 00:10:00 Lecture 35 Factorization by grouping the terms 00:09:00 Lecture 36 Factorize using identity a ² - b ² 00:07:00 Lecture 37 Factorize using identity (a + b )² and (a - b )² 00:08:00 Lecture 38 Factorize using identity ( a + b + c ) ² 00:05:00 Lecture 39 Factorization by middle term split 00:12:00 Algebraic Fractions Lecture 40 Simplification of algebraic fractions 00:06:00 Coordinate axis - points and Line graph Lecture 41 All that you need to know about co ordinate axis 00:04:00 Lecture 42 Some important facts needed to draw line graph 00:03:00 Lecture 43 How to draw a line graph on coordinate plane 00:03:00 Lecture 44 Drawing line graphs 00:06:00 System of simultaneous linear equations in two variables Lecture 45 Simultaneous Linear Equations in two variables- intro 00:03:00 Lecture 46 Graphical method of solving linear equations 00:06:00 Lecture 47 Graphical method - more sums 00:10:00 Lecture 48 Method of Elimination by substitution 00:09:00 Lecture 49 Method of Elimination by Equating coefficients 00:11:00 Lecture 50 Method of Elimination by cross multiplication 00:07:00 Lecture 51 Equations reducible to simultaneous linear equations 00:12:00 Lecture 52 Word Problems on Linear equations 00:18:00 Polynomials Lecture 53 Polynomials and Zeros of polynomials 00:10:00 Lecture 54 Remainder Theorem 00:04:00 Lecture 55 Factor Theorem 00:08:00 Lecture 56 Practice problems on Remainder and Factor Theorem 00:09:00 Lecture 57 Factorization using factor Theorem 00:10:00 Quadratic Polynomials Lecture 58 Zeros of polynomials α, β & γ 00:10:00 Lecture 59 Relation between zeros and coefficients of a polynomials 00:13:00 Lecture 60 Writing polynomials if zeros are given 00:06:00 Lecture 61 Practice problems on zeros of polynomials 00:10:00 Lecture 62 Problems solving with α and β (part 1) 00:11:00 Lecture 63 Problems solving with α and β (part 2) 00:10:00 Quadratic Equations Lecture 64 what are Quadratic equations 00:03:00 Lecture 65 Solutions by factorization method 00:12:00 Lecture 66 Solutions by completing square formula 00:06:00 Lecture 67 Deriving Quadratic formula 00:05:00 Lecture 68 Practice problems by Quadratic formula 00:07:00 Lecture 69 Solving complex quadratic equations by Quadratic Formula 00:11:00 Lecture 70 Solutions of reducible to Quadratic Formula 00:09:00 Lecture 71 Skilled problems on Quadratic Equations 00:07:00 Lecture 72 Exponential problems reducible to Quadratic Equations 00:06:00 Lecture 73 Nature of Roots of Quadratic Equations 00:09:00 Lecture 74 Word problems on quadratic Equations Part 1 00:13:00 Lecture 75 Word problems on quadratic Equations Part 2 00:11:00 lecture 76 word problems on Quadratic 00:12:00 Mock Exam Final Exam

Pefect your Algebra Fundamentals
Delivered Online On Demand10 hours 32 minutes
£25