• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

274 Operator courses in Manchester delivered Live Online

Introduction Perl Programming Essentials (TT4925)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is appropriate for anyone who wants to create applications or modules to automate and simplify common tasks with Perl. Overview Working within in an engaging, hands-on learning environment, guided by our expert web development, PHP practitioner, students will learn to: Create a working script that gets input from the command line, the keyboard, or a file Use arrays to store and process data from files Create formatted reports Use regular expressions Use the appropriate types of variables and data structures Refactor duplicate code into subroutines and modules What is available in the standard library Use shortcuts and defaults, and what they replace Introduction to Perl Programming Essentials is an Introductory-level practical, hands-on Perl scripting training course that guides the students from the basics of writing and running Perl scripts to using more advanced features such as file operations, report writing, the use of regular expressions, working with binary data files, and using the extensive functionality of the standard Perl library. Students will immediately be able to use Perl to complete tasks in the real world. Session: An Overview of Perl What is Perl? Perl is compiled and interpreted Perl Advantages and Disadvantages Downloading and Installing Perl Which version of Perl Getting Help Session: Creating and running Perl Programs Structure of a Perl program Running a Perl script Checking syntax and warnings Execution of scripts under Unix and Windows Session: Basic Data and I/O Numeric and Text literals Math operators and expressions Scalar variables Default values Writing to standard output Command line arguments Reading from the standard input Session: Logic and Loops About flow control The if statement and Boolean values Using unless and elsif Statement modifiers warn() and die() The conditional construct Using while loop and its variants Using the for loop Exiting from loops Session: Lists and Arrays The list data type Accessing array elements Creating arrays List interpolation Arrays and memory Counting elements Iterating through an array List evaluation Slices and ranges Session: Reading and writing text files File I/O Overview Opening a file Reading text files Writing to a text file Arrays and file I/O Using the <> operator Session: List functions Growing and shrinking arrays The split() function Splitting on whitespace Assigning to literal lists The join() function The sort() function Alternate sort keys Reversing an array Session: Formatting output Using sprintf() and printf() Report formatting overview Defining report formats The write() function Advanced filehandle magic Session: Hashes Hash overview Creating hashes Hash attributes Traversing a hash Testing for existence of elements Deleting hash elements Session: References What is a reference? The two ways to create references References to existing data References to anonymous data Dereferencing scalar, array, and ash references Dereferencing elements of arrays and hashes Multidimensional arrays and other data structures Session: Text and Regular Expressions String length The substr() function The index() and rindex() functions String replication Pattern matching and substitution Regular expressions Session: Raw file and data access Opening and closing raw (binary) files Reading raw data Using seek() and tell() Writing raw data Raw data manipulation with pack() and unpack() Session: Subroutines and variable scope Understanding packages Package and Lexical variables Localizing builtin variables Declaring and calling subroutines Calling subroutines Passing parameters and returning values Session: Working with the operating system Determining current OS Environment variables Running external programs User identification Trapping signals File test operators Working with files Time of day Session: Shortcuts and defaults Understanding $_ shift() with no array specified Text file processing Using grep() and Using map() Command-line options for file processing Session: Data wrangling Quoting in Perl Evaluating arrays Understanding qw( ) Getting more out of the <> operator Read ranges of lines Using m//g in scalar context The /o modifier Working with embedded newlines Making REs more readable Perl data conversion Session: Using the Perl Library The Perl library Old-style library files Perl modules Modules bundled with Perl A selection of modules Getting modules from ActiveState Getting modules from CPAN Using Getopt::Long Session: Some Useful Tools Sending and receiving files with Net::FTP Using File::Find to search for files and directories Grabbing a Web page Some good places to find scripts Perl man pages for more information Zipping and unzipping files

Introduction Perl Programming Essentials (TT4925)
Delivered OnlineFlexible Dates
Price on Enquiry

SS84 IBM DFSMS Implementation

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This is an intermediate course for individuals responsible for developing and implementing effective storage management techniques. Overview Establish a DFSMS configuration to automatically enforce your installation's storage management policies Convert service level requirements into appropriate parameters for data class, storage class, management class, and storage groups Create and test Automatic Class Selection (ACS) routines Convert volumes and move data to system-managed volumes with DFSMS Data Set Services (DFSMSdss) Specify appropriate management class and storage group parameters for DFSMS Hierarchical Storage Management (DFSMShsm) processing of system-managed data sets Plan to maintain your DFSMS environment using Naviquest Establish procedures to control, manage, and recover the storage management subsystem with ISMF and operator commands Develop a DFSMS implementation plan In this course you will learn how to plan and implement DFSMS and learn how to manage temporary and permanent data sets with an emphasis on disk storage. Course introduction and DFSMS overview Specify the storage administration functions that can be automatically performed by the system Identify the types of data set services that need to be established by negotiating service level agreements Correlate data set service requirements to the SMS configuration components: data class, storage class, management class, storage group, and automatic class selection routines Activating SMS Identify the functions eligible for exploitation with the installation of DFSMS Data Facility Product (DFSMSdfp) and the activation of SMS Create SMS control data sets Code SYS1.PARMLIB operands necessary to bring up SMS Create a minimal configuration Activate a configuration Writing ACS routines Identify the purpose of the ACS routines Develop an understanding of the statements Differentiate between literals and masks Describe the read variables available in the ACS routines Managing temporary data sets Create/alter storage classes and storage groups Identify steps to install and use the starter set Write ACS routines to handle temporary data sets Activate a system to manage temporary data sets Code commands to change volume/group SMS status Issue operator commands to display current status Exploiting DFSMS Describe the purpose of the data class Identify the features that the data class can exploit Create data sets using the space parameter Define Virtual Storage Access Method (VSAM) and volume attributes for data class Identify special data sets and their exploitation through the data class Managing permanent data sets Create/alter data classes, storage classes, management classes, and storage groups Translate current (DFSMShsm) service level agreements to management class parameters Identify alternatives and concerns for standard naming conventions Establish the controls for automatic backup of data sets Establish the controls for automatic volume dump Write ACS routines to manage permanent data Create a configuration that manages permanent data sets Create a new managed data set Identify function of storage class exit provided by Custom-Built Installation Process Offering (CBIPO) and resulting System Management Facility (SMF) records Using Naviquest Create test cases using Naviquest Perform storage administration tasks in batch Create online DFSMS reports Create model commands using Naviquest Use the COPYFILT macro Device preparation and data movement Initialize volumes as system-managed Move data into/out from system-managed control Convert volumes to/from system-managed Move data to utilize new hardware capabilities Controlling DFSMS Code commands to change SMS volume/group status Issue commands to save configurations and use alternate Active Control Data Set (ACDS) Issue command to use alternate Communication Data Set (COMMDS) Issue VARY SMS commands Communicate with the security administrator about storage management requirements Additional considerations Establish a plan for implementing SMS Locate sources of implementation planning checklists Identify the tools available to document the current system Identify multiple site considerations for recovery and exploitation Additional course details: Nexus Humans SS84 IBM DFSMS Implementation training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SS84 IBM DFSMS Implementation course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

SS84 IBM DFSMS Implementation
Delivered OnlineFlexible Dates
Price on Enquiry

LEVEL 4 ENDORSED CERTIFICATION DIPLOMA

By Export Unlocked Limited

Level 4 Endorsed Diploma - International Trade Qualification Complete all 15 modules and 3 assessments, from a choice of 7 to earn a Level 4 Diploma in International Trade.

LEVEL 4 ENDORSED CERTIFICATION DIPLOMA
Delivered OnlineFlexible Dates
£3,995

Cisco Video Infrastructure Implementation VII

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Network Video Operator and Administrator Voice / UC / Collaboration / Communications Engineer Collaboration Tools Engineer Collaboration Sales / Systems Engineer Overview Upon completing this course, the learner will be able to meet these overall objectives: Install, configure, maintain, and troubleshoot Cisco visual collaboration solutions. This course assists the student in preparing for the Cisco TelePresence Video Specialist Certification. Upon completing this course, the learner will be able to meet these overall objectives Module 1: Advanced Cisco Expressway Features Introducing Cisco video network solutions Exploring Cisco Expressway basic setup Explaining regular expressions in a Cisco Expressway environment Deploying components of Cisco Expressway Security Exploring the fundamentals of subzonesÿ Administering call control Implementing subzone bandwidth management Implementing zones Exploring clustering Applying troubleshooting Module 2: Advanced Cisco Meeting Server Features Introducing the Cisco meeting server Exploring API configuration Exploring resilient and scalable deployments Additional features Module 3: Cisco Collaboration Meeting Room Solutions with Cisco TelePresence Server Introducing Collaboration Meeting Room cloud, premises, and hybrid products Deploying the TelePresence Server and TelePresence conductor Applying troubleshooting to Cisco CMR Premises Solutions Module 4: Cisco TelePresence Management Suite (TMS) Solution Explaining Cisco TMS Installation Describing TMS operation Explaining TMS conference scheduling and management Configuring permissions Applying troubleshooting Module 5: Cisco Cloud Solutions - WebEx and Spark Introducing WebEx and Spark cloud solutions Exploring Spark administration configuration Deploying Spark hybrid services Exploring Spark APIs and BOTs configuration Module 6: Cisco TelePresence Content Server (Optional Module) Examining Cisco TCS operation and configuration

Cisco Video Infrastructure Implementation VII
Delivered OnlineFlexible Dates
Price on Enquiry

Python Programming Beginners Evenings Course, Virtual Classroom.

4.6(12)

By PCWorkshops

Course summary This Python Programming course has become essential to all professional who would like to do code using Python. Learn evenings, work while studying. Work and study Python Part Time. It is a Python beginners course and teaches Python coding from scratch to intermediate. Hands-on, practical. We code some real life examples in this course.

Python Programming Beginners Evenings Course, Virtual Classroom.
Delivered OnlineFlexible Dates
£100

VAT Bookkeeping Course Online

By Osborne Training

Overview Knowledge of how to prepare and submit VAT Return can help you to stand out from the crowd of job seekers. Moreover, if you are running a business or thinking of running a business, the vat training course will help you to understand the issues relating to vat more clearly and help process VAT Return more accurately and efficiently. Our VAT Training courses are eligible CPD Training for accountants and attending this course can give you a more detailed understanding of how to do a VAT return correctly. What is VAT Return? Almost every business has to submit a VAT Return. VAT Return contains Output VAT and Input VAT information to be submitted to Taxman (HMRC). Through the VAT return, HMRC knows exactly how much the business owes to HMRC. Moreover, HMRC can pay back any VAT amount overpaid which only can be determined through an accurate VAT return. How to do VAT Return Firstly, businesses need to register with HMRC before they can process a VAT Return. Businesses must fulfil the criteria to become VAT registered and to get a VAT Registration no. Once the business is registered they can then regularly submit the VAT return using specified VAT forms. There are many VAT Schemes available in general. There are some specialised VAT schemes available only for specific industries. Understanding VAT Principles Analysis of different VAT Scheme Preparing VAT in Spreadsheet Reconciliation of VAT Completing a VAT return Import and Export VAT analysis Calculating VAT for a business with mixed zero-rated and standard-rated sales, using Spreadsheet Introduction of TOMS (Tour Operator Margin Scheme) Submission Steps of VAT Return to HMRC Introduction to Making Tax Digital(VAT) scheme

VAT Bookkeeping Course Online
Delivered OnlineFlexible Dates
Price on Enquiry

VAT Accounting, Preparation and Submission Training Course

By Osborne Training

VAT Accounting, Preparation and Submission Training Course Overview: Knowledge of how to prepare and submit VAT Return can help you to stand out from the crowd of job seekers. Moreover, if you are running a business or thinking of running a business, the vat training course will help you to understand the issues relating to vat more clearly and help process VAT Return more accurately and efficiently. Our VAT Training courses are eligible CPD Training for accountants and attending this course can give you a more detailed understanding of how to do a VAT return correctly. What is VAT Return? Almost every business has to submit a VAT Return. VAT Return contains Output VAT and Input VAT information to be submitted to Taxman (HMRC). Through the VAT return, HMRC knows exactly how much the business owes to HMRC. Moreover, HMRC can pay back any VAT amount overpaid which only can be determined through an accurate VAT return. How to do VAT Return Firstly, businesses need to register with HMRC before they can process a VAT Return. Businesses must fulfil the criteria to become VAT registered and to get a VAT Registration no. Once the business is registered they can then regularly submit the VAT return using specified VAT forms. There are many VAT Schemes available in general. There are some specialised VAT schemes available only for specific industries. Certificate of Attendance Understanding VAT Principles Analysis of different VAT Scheme Preparing VAT in Spreadsheet Reconciliation of VAT Completing a VAT return Import and Export VAT analysis Calculating VAT for a business with mixed zero-rated and standard-rated sales, using Spreadsheet Introduction of TOMS (Tour Operator Margin Scheme) Submission Steps of VAT Return to HMRC Introduction to Making Tax Digital(VAT) scheme

VAT Accounting, Preparation and Submission Training Course
Delivered OnlineFlexible Dates
Price on Enquiry

EC-Council Certified Network Defender (C|ND) v.2

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Network Administrators Network security Administrators Network Security Engineer Network Defense Technicians CND Analyst Security Analyst Security Operator Anyone who involves in network operations Overview A dedicated focus on IoT security Network virtualization practices for the remote workforce Enhanced Cloud Security & IoT and Operational Technology (OT) Modules Introduction to threat intelligence In-depth Attack Surface Analysis Certified Network Defender (CND) is a vendor-neutral, hands-on, instructor-led comprehensive network security certification training program. It is a skills-based, lab intensive program based on the security education framework and work role task analysis presented by the National Infocomm Competency Framework (NICF) as well as a job-task analysis and cybersecurity education framework by the National Initiative of Cybersecurity Education (NICE). The course has also been mapped to global job roles and to the Department of Defense (DoD) job roles for system/network administrators. The program prepares network administrators how to identify what parts of an organization need to be reviewed and tested for security vulnerabilities and how to reduce, prevent, and mitigate risks in the network. CND covers the protect, detect, respond and predict approach to network security. Course Outline Network Attacks and Defense Strategies Administrative Network Security Technical Network Security Network Perimeter Security Endpoint Security-Windows Systems Endpoint Security-Linux Systems Endpoint Security- Mobile Devices Endpoint Security-IoT Devices Administrative Application Security Data Security Enterprise Virtual Network Security Enterprise Cloud Network Security Enterprise Wireless Network Security Network Traffic Monitoring and Analysis Network Logs Monitoring and Analysis Incident Response and Forensic Investigation Business Continuity and Disaster Recovery Risk Anticipation with Risk Management Threat Assessment with Attack Surface Analysis Threat Prediction with Cyber Threat Intelligence

EC-Council Certified Network Defender (C|ND) v.2
Delivered OnlineFlexible Dates
Price on Enquiry

VMware SD-WAN for Service Providers [V4.x]

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Service providers who are designing or using VMware SD-WAN solutions or managing SD-WAN networks for customers Service providers looking to deliver a managed hybrid WAN with MPLS service Service providers transforming their MPLS networks for direct access to cloud services and increased network agility Overview By the end of the course, you should be able to meet the following objectives: Describe how VMware SASE™ solves security challenges for distributed enterprises Identify where VMware SD-WAN fits in the VMware SASE framework Describe the process for validating the installation of VMware SD-WAN Orchestrator and Gateway in a service provider environment Describe the features for monitoring and maintaining a VMware SD-WAN installation Evaluate the security features and certificate operations for managing a VMware SD-WAN installation Describe VMware SD-WAN Edge licensing and license types Describe the features of VMware Edge Network Intelligence™ Recognize VMware SD-WAN network monitoring tools for generating reports, events, and alerts Recognize the remote diagnostic actions available on VMware SD-WAN Orchestrator Troubleshoot VMware SD-WAN Orchestrator and Gateway common issues This three-day, hands-on training course provides you with the advanced knowledge, skills, and tools to achieve competency in operating and troubleshooting the VMware SD-WAN? environment for service providers.In this course, you focus on deploying and managing VMware SD-WAN for a service provider, including troubleshooting common issues. Course Introduction Introductions and course logistics Course objectives VMware SD-WAN Installation for Service Providers Describe security challenges for distributed enterprises Describe the VMware SASE solution for securing distributed enterprises Describe VMware deployment models for service providers Explain how VMware SD-WAN can help to transform MPLS networks to service-ready networks Identify resource requirements for installing VMware SD-WAN Orchestrator and Gateways Describe the procedure for installing VMware SD-WAN Orchestrator Describe the process for provisioning VMware SD-WAN Orchestrator Identify the external service dependencies for VMware SD-WAN Orchestrator Recognize disaster recovery options for SD-WAN Orchestrator Describe the disaster recovery workflow for VMware SD-WAN Orchestrator Identify the requirements for installing VMware SD-WAN Gateway instances Describe the procedure for installing VMware SD-WAN Gateway instances Describe the procedure for installing VMware SD-WAN Gateway instances on ESXi hosts identify Data Plane Development Kit support for gateway performance Describe the VMware SD-WAN Gateway deployment modes for service providers Configure a VMware SD-WAN Gateway for a service provider Assign a VMware SD-WAN Gateway for a service provider VMware SD-WAN Monitoring and Maintenance Describe VMware SD-WAN Orchestrator system health-monitoring features Describe VMware SD-WAN Orchestrator process-monitoring features Describe VMware SD-WAN Orchestrator storage-monitoring features Describe VMware SD-WAN Orchestrator database-monitoring features Describe the VMware SD-WAN Orchestrator upgrade process Describe the VMware SD-WAN Orchestrator backup and data archival processes Describe the VMware SD-WAN Orchestrator process to expand database disks Describe the VMware SD-WAN Orchestrator system metrics for monitoring Describe how systems metrics are collected for monitoring VMware SD-WAN Orchestrator Describe VMware SD-WAN Gateway additions and removals Describe the VMware SD-WAN Gateway upgrade process Describe the VMware SD-WAN Gateway validation process VMware SD-WAN Security and Edge Licensing Describe the VMware SD-WAN PKI security infrastructure Recognize VMware SD-WAN PKI authentication modes Describe VMware SD-WAN certificate operations Describe the VMware SD-WAN PKI certificate authentication configuration Describe the VMware SD-WAN PKI configuration process Compare operator and partner logins Describe the VMware SD-WAN self-signed certificate authority process Describe VMware SD-WAN certificate authority renewal and revocation Describe the VMware SD-WAN intermediate certificate authority Describe the VMware SD-WAN certificate chain of trust Describe the VMware SD-WAN Edge licensing and license types Assign and view the VMware SD-WAN Edge licenses and reports VMware SD-WAN Reporting and Diagnostics Describe the VMware SD-WAN network monitoring tools Describe the VMware SD-WAN network visibility options and controls Identify the VMware SD-WAN Orchestrator reporting features Describe and analyze VMware SD-WAN Orchestrator events View enterprise reports by operator, partner, and administrator View historical network insights and real-time reports on path visibility Describe common VMware SD-WAN alerts Describe the VMware SD-WAN heart mechanism for alerts Configure VMware SD-WAN alerts Analyze common VMware SD-WAN alerts Use standard networking tools for monitoring VMware SD-WAN Describe remote diagnostic actions available on VMware SD-WAN Orchestrator Use the remote diagnostics tools on VMware SD-WAN Orchestrator Generate remote diagnostics bundles and packet captures VMware SD-WAN Orchestrator and Gateway Troubleshooting Recognize the basic sanity checks to troubleshoot VMware SD-WAN Orchestrator Create diagnostic bundles to enable support to troubleshoot VMware SD-WAN Orchestrator Recognize the basic checks to troubleshoot VMware SD-WAN Orchestrator Troubleshoot common VMware SD-WAN Orchestrator performance issues Describe the tools available to troubleshoot VMware SD-WAN Gateway Analyze sample outputs for debugging a VMware SD-WAN Gateway issue Use Data Plane Development Kit to improve VMware SD-WAN Gateway performance VMware SD-WAN Orchestrator and Gateway Commands Recognize when and how to use VMware SD-WAN Orchestrator database-monitoring commands Recognize when and how to use the VMware SD-WAN Gateway process-monitoring commands

VMware SD-WAN for Service Providers [V4.x]
Delivered OnlineFlexible Dates
Price on Enquiry

SM110 - Service Manager 9.x Foundations for Process Owners

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for For Process Owners, project managers, and other managers who are new to Service Manager. Overview At the end of the course, you will be able to:? Describe the role and intent for each of theService Manager components.? Describe the processes, workflows, and keyactivities for each module.? Use the Service Manager Web and Windowsclient as well as the Employee Self Service portal.? Manage Service Manager operators, usingadministrative tools.? Review how to configure operator, profile, role,environment, folder, and contact objects.? Determine the difference between Incident andProblem Management.? Discuss the Change, Configuration, Knowledge,and Service Level Management processes.? Explain and configure the Service Catalog.? Use Request Management workflows.? Describe the reporting capabilities of ServiceManager. This introductory course provides students with the skills needed to effectively use and manage the Service Manager 9.x software product. This course focuses on teaching the processes embedded in Service Manager. This introductory course provides students with the skills needed to effectively use and manage the Service Manager 9.x software product. This course focuses on teaching the processes embedded in Service Manager. Additional course details: Nexus Humans SM110 - Service Manager 9.x Foundations for Process Owners training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SM110 - Service Manager 9.x Foundations for Process Owners course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

SM110 - Service Manager 9.x Foundations for Process Owners
Delivered OnlineFlexible Dates
Price on Enquiry
1...34567...28