Duration 0.5 Days 3 CPD hours This course is intended for This course is designed for the non-technical end user of computers, mobile devices, networks, and the Internet, to enable you to use technology more securely to minimize digital risks. This course is also designed for you to prepare for the Certified CyberSAFE credential. You can obtain your Certified CyberSAFE certificate by completing the Certified CyberSAFE credential process on the CHOICE platform following the course presentation. Overview In this course, you will identify many of the common risks involved in using conventional end-user technology, as well as ways to use it safely, to protect yourself from those risks. You will: Identify the need for security Secure devices like desktops, laptops, smartphones, and more Use the Internet securely Regardless of your computer experience, this class will help you become more aware of technology ðrelated risks and what you can do to protect yourself and your organization from them. This course will help you to: ? Understand security compliance needs and requirements ? Recognize and avoid phishing and other social engineering ? Recognize and avoid viruses, ransomware, and other malware ? Help ensure data security on computers, mobile devices, networks, the Internet, and in the cloud. In this course, you will use discussions, case studies, and the experiences of your instructor and fellow students to explore the hazards and pitfalls of technology and learn how to use that technology safely and securely. Course includes access to the CyberSAFE assessment. Upon successful completion of the assessment, learners will receive the CyberSAFE credential and digital badge. Identifying the Need for Security Identify Security Compliance Requirements Recognize Social Engineering and Avoid Phishing and other Attacks Securing Devices Maintain Physical Security of Devices Use Passwords for Security Protect Your Data Identify and Mitigate Viruses, Ransomware, and other Malware Use Wireless Devices Securely Using the Internet Securely Browse the Web Safely Use Email Securely Use Social Networking Securely Use Cloud Services Securely Additional course details: Nexus Humans CertNexus CyberSAFE Extended Edition 2019 (CBS-310) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CertNexus CyberSAFE Extended Edition 2019 (CBS-310) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
This CPD accredited short course is for everyone who wants to work more effectively with their collaeagues. It will help strengthen personal competencies including listening and communication, understanding and engaging with different perspectives, and working together to create a positive culture in the office or on the shopfloor.
Duration 2 Days 12 CPD hours This course is intended for This course is intended for system and network administrators responsible for installation, setup, configuration, and administration of BIG-IP DNS systems. This course gives networking professionals a functional understanding of the BIG-IP DNS system as it is commonly used. The course covers configuration and ongoing management of the BIG-IP DNS system, and includes a combination of lecture, discussion, and hands-on labs. Module 1: Setting Up the BIG-IP System Introducing the BIG-IP System Initially Setting Up the BIG-IP System Archiving the BIG-IP Configuration Leveraging F5 Support Resources and Tools Provision the BIG-IP System and Confirm Network Configuration Module 2: Introducing the Domain Name System (DNS) and BIG-IP DNS Understanding the Domain Name System (DNS) Reviewing the Name Resolution Process Implementing BIG-IP DNS Using DNS Resolution Diagnostic Tools Module 3: Accelerating DNS Resolution Introducing DNS Resolution with BIG-IP DNS BIG-IP DNS Resolution Decision Flow Configuring BIG-IP DNS Listeners Resolving DNS Queries in the Labs (Lab Zone Records) Load Balancing Queries to a DNS Server Pool Accelerating DNS Resolution with DNS Cache Accelerating DNS Resolution with DNS Express Introducing Wide IPs Using Other Resolution Methods with BIG-IP DNS Integrating BIG-IP DNS into Existing DNS Environments Module 4: Implementing Intelligent DNS Resolutions Introducing Intelligent DNS Resolution Identifying Physical Network Components Identifying Logical Network Components Collecting Metrics for Intelligent Resolution Configuring Data Centers Configuring a BIG-IP DNS System as a Server Configuring a BIG-IP LTM System as a Server Establishing iQuery Communication between BIG-IP Systems Configuring a Non-F5 Server Defining Links and Routers Configuring Wide IP Pools Configuring Wide IPs Managing Object Status Using the Traffic Management Shell (TMSH) Module 5: Using LDNS Probes and Metrics Introducing LDNS Probes and Metrics Types of LDNS Probes Excluding an LDNS from Probing Configuring Probe Metrics Collection Module 6: Load Balancing Intelligent DNS Resolution Introducing Load Balancing on BIG-IP DNS Using Static Load Balancing Methods Round Robin Ratio Global Availability Static Persist Other Static Load Balancing Methods Using Dynamic Load Balancing Methods Round Trip Time Completion Rate CPU Hops Least Connections Packet Rate Kilobytes per Second Other Dynamic Load Balancing Methods Virtual Server Capacity Virtual Server Score Using Quality of Service Load Balancing Persisting DNS Query Responses Configuring GSLB Load Balancing Decision Logs Using Manual Resume Using Topology Load Balancing Module 7: Monitoring Intelligent DNS Resources Exploring Monitors Configuring Monitors Assigning Monitors to Resources Monitoring Best Practices Module 8: Advanced BIG-IP DNS Topics Implementing DNSSEC Setting Limits for Resource Availability Using iRules with Wide IPs Introducing Other Wide IP Types Implementing BIG-IP DNS Sync Groups Module 9: Final Configuration Projects Final Configuration Projects
A key-worker role is to provide the best individual care for people they support and carry out effective assessment and support planning. Staff need to know how to motivate individuals to achieve their personal goals and understand how to advocate on their behalf. Staff also need to know how to improve communication between colleagues, individuals, other professionals, and contribute to service improvement.
Facilitating Effective Meetings: In-House Training Billions of dollars and exorbitant amounts of time are wasted annually across the globe because of organizations' meeting practices. This contributes to serious performance problems for both organizations and employees, and it has a serious impact on culture and morale. But despite the costs and consequences, every-day people in any role have the ability to change that. They can reduce cost, improve productivity, and enhance their workplace cultures by improving their meeting facilitation skills. And that is because facilitation skills start in the planning stage, not in the live meeting stage. In this course, participants will learn that their responsibility as a facilitator is to be a steward of time, money, relationships, and performance. To do that, they will learn to estimate costs of meetings and practice a variety of strategic thinking and analysis tasks to effectively plan results-aligned meetings. They will also apply several techniques and strategies to proactively prevent and deal with conflict in meetings, as well as give objective, constructive feedback to others in order to create behavior change during meetings. Participants must bring laptops with them and have internet access during the course (both virtual classroom and traditional classroom). The laptops are needed for specific activities. Also note that this course pairs well with IIL's Conflict Resolution Skills and Decision Making and Problem Solving courses, which go much deeper into related skills and tools that support effective meeting facilitation. What you will Learn At the end of this program, you will be able to: Estimate the financial and time costs of attendance for real-world meetings Use a performance formula to define the purpose of meetings Describe the responsibilities and qualities of an effective facilitator Analyze situations to determine when a meeting is necessary Articulate performance-driven meeting goals and results Align meeting goals and results Strategize to invite, involve, and exclude appropriate attendees Explain research-based best practices for meeting decisions and agenda development Create an effective agenda for a results-driven meeting Apply proactive tools and strategies for relationship-building dealing with meeting conflict Give constructive behavioral feedback using the Situation-Behavior-Impact® technique The Business Case for Effective Facilitation Embracing the research on meetings Estimating the real costs of meetings Determining a meeting's performance value Clarifying the meeting facilitator's role Facilitating the Meeting Plan Determining if a meeting is necessary Aligning meeting goals with meeting types Identifying the right attendees Creating a strategically effective agenda Facilitating the Live Meeting Building relationships from the start Dealing with conflict proactively Giving feedback on unproductive behavior
This Renewables Technical Surveying training short two day course is specifically designed for individuals and companies that want to train themselves and their staff on exactly how to carry out Renewables Technical Site Surveying prior to any renewables installation measures, this includes for heating systems, solar systems and EV Charge point installations. The course is primarily aimed at Energy Suppliers, Equipment Manufacturers, Renewable Installers, Domestic Energy Assessors, Retrofit Assessors, Retrofit Co-ordinators, Renewables sales staff and suitable individuals with a basic level of knowledge in varying building structures, heating systems and varying renewable technologies.
Duration 5 Days 30 CPD hours This course is intended for This course is for support staff for AIX on POWER systems Overview After completing this course, you should be able to: - Distinguish Korn and bash shell specific features - Use utilities such as sed and awk to manipulate data - Understand system shell scripts such as /etc/shutdown - Write useful shell scripts to aid system administration This course will teach you how to use shell scripts and utilities for practical system administration of AIX (or other UNIX) operating systems. Basic shell conceptsFlow control in a shell ScriptFunctions and typesetShell features such as arithmetic and string handlingUsing regular expressionsUsing sed, awk and other AIX utilities
Duration 5 Days 30 CPD hours Overview By the end of the course, you should be able to meet the following objectives: List the operational challenges for rolling out and operating telco services including 5G. Identify the role of VMware Telco Cloud products in supporting telco services. Discuss the role of VMware technologies such as vSphere, NSX, and Tanzu etc. in implementing telco services. Outline the role of native tools and other VMware monitoring tools such as vRealize Operations and vRealize Log Insight in maintaining network services. Choose the VMware Telco Cloud products that meet your application requirements. Deploy a solution architecture that meet VMware best practices for delivering services using VMware Telco Cloud products. Implement and maintain VMware Telco Cloud products in a secure manner. Identify the tools and remediation pathways for maintaining the availability and performance of your applications and infrastructure using VMware Telco Cloud and vRealize Suite products. Follow specific steps to resolve application performance and availability problems Scale your VMware Telco Cloud products to meet operational requirements in line with VMware best practices. Optimize the operation of VMware Telco Cloud products to ensure SLAs are met. This five-day, hands-on training course provides the knowledge to operate and scale VMware Telco Cloud version 2.x products in a Telco cloud provider environment. In this course, you are exposed to the entire VMware Telco Cloud portfolio, and the tools and methodologies available to ensure they operate effectively. In addition, you are presented with various scenarios where you will be guided through the process of identifying, analyzing, and formulating solutions to performance and other problems. Course Introduction Introductions and course logistics Course objectives Overview of Network Transformation Reviews the technologies that enable modern networks Lists the components of modern service provider networks Outlines characteristics of modern service provider networks in meeting customer application needs Service Delivery with VMware Telco Cloud Outlines the components of the VMware Telco Cloud portfolio Reviews the role each VMware Telco Cloud product plays in delivering telco services Specifies the dependencies each product has on underlying technologies Supporting VMware Telco Cloud Service Delivery Reviews the products that implements the virtualization, management, platform, and orchestration layers Outlines the role played by other VMware products such as NSX in delivering cloud services Outline opensource integration options with VMware Telco Cloud products Securing VMware Telco Cloud Reviews security threats that affect telco services Identifies the critical telco assets that are prone to attack Outlines best practice for securing VMware Telco Cloud products and underlying technology Provides overview of appropriate security controls for VMware Telco Cloud products Assessing Service Provision Reviews tools and methodologies used to gather requirements Outlines how to assess cloud-native capabilities Documenting findings Identifying security vulnerabilities with Helm. Reviews VMware?s Customer Engagement process Capturing infrastructure requirements from TCA Designing a VMware Telco Cloud Solution Selecting appropriate deployment topology Pros and cons of design choices How a design choice might be affected by other factors such as NSX and TKG deployment, or data center architecture Outlines typical scenarios where specific products align with identified requirements Documenting a design Designing for availability Ensuring a design aligns with best practice Specifying monitoring options Implementing VMware Telco Cloud Products Review deployment options for VMware products Integrating new products with existing ones Outline post-installation tasks Adding the new products as data sources in monitoring tools such as vRealize Operations and vRealize Operations Network Insight Ensuring products meet security requirements Configuring monitoring software Outlines the xNF onboarding process in TCA Maintaining Telco Services Outlines typical administrative tasks in ensuring services are maintained Use of native and other VMware performance monitoring tools Reviewing performance data Role of SLAs in service maintenance Reviews scenarios where known behaviors indicate problems Troubleshooting Deployed Telco Services Reviews the troubleshooting tools available Using tools to gather useful data Outlines how event correlation can be used to isolate problems Using a methodology to determine the root cause of a problem Steps to identify and resolve a problem Reviews scenarios where known problems are isolated and resolution steps identified Scaling VMware Telco Cloud Products Assessing if operations are impacted by lack of resources now or will be in the future Reviews performance optimization options Identifies implications for other products if you scale VMware Telco Cloud products Reviews VMware sizing guidelines Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Telco Cloud: Day 2 Operate and Scale [V2.x] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Telco Cloud: Day 2 Operate and Scale [V2.x] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
The Art of Delegation and High-Impact Feedback (Virtual) Whether you are a project manager, an executive, or simply someone involved in leading or helping others, a critical part of your work must involve delegating and giving feedback. These two skills, however, are not as simple as they seem. How do you know what to delegate? What kinds of feedback should you give? Knowing this and practicing this are two different things. Ultimately, delegating and giving feedback are skills that must be done mindfully, strategically, and meaningfully. They must be done in ways that not only positively impact performance, but also inspire growth, engagement, and motivation. When done poorly, they can create significant problems. But when done well, they can generate value for everyone and benefit future endeavors. In this course, you will learn to think more deeply about the importance of delegating and discover how to give better feedback. You will have opportunities to apply best practices and methodologies that you can use in the real world, ultimately paying off for you and for others. What You Will Learn At the end of this program, you will be able to: Explain why common excuses for NOT delegating are short-sighted Identify what needs delegating by using a proven methodology Utilize best practices in real world scenarios, delegating in a way that benefits you and the individual to whom you delegate Summarize key lessons learned in brain science which enhance the feedback-giving process Recognize the critical connection between feedback and performance Apply a proven model to deliver feedback that inspires growth, engagement, and motivation Delegation What is delegation? What makes delegation hard? What do I delegate and why? How to delegate effectively
Time Management and Productivity (Virtual) Effective time management reduces stress and helps you better adhere to commitments. This course is designed to help you identify personal and organizational priorities and gain better control of where you focus your attention. You will explore the importance of planning and organizing, and you will practice sorting through and setting priorities. You will also learn how to set better time boundaries and manage the demands of others. Working with a time management framework, you will use a set of practical techniques to organize and manage your work to better deliver on your commitments. Techniques for overcoming procrastination will be addressed, as well as strategies for dealing with information overload. What You Will Learn You'll learn how to: Plan and prioritize each day's activities in a more efficient, productive manner Establish strategies to execute priorities and overcome procrastination Understand how to make trade-offs when faced with fire drills How to set and communicate boundary conditions Getting Started Introductions Course orientation Participants' expectations Foundation Concepts Exercise: A day in your life Resources to implement change o Mind-set o Tool-set o Skill-set What is your time really worth? The dynamics of procrastination The myth of multi-tasking Brain Rules - how to optimize your efficiency Organization and Prioritization Time management best practices Goal setting Exercise: Identifying your priorities The importance of organization Time management framework Prioritizing time Time Management Techniques Tips for managing time Nine ways to overcome procrastination The STING technique Managing your time o Handling unplanned urgencies o Dealing with information overload Delegation and managing others' time Creating your personal action plan