Duration 4 Days 24 CPD hours This course is intended for This class is designed for enterprise architects, solution architects, and business analysts working to earn their Salesforce Application Architect credential, or for application architects looking to get more hands-on experience. Overview Design data models that scale gracefully Leverage Salesforce sharing mechanisms at an advanced level Evaluate the nuances of field types and pick the right one for the circumstances Make data model decisions that minimize record locking and other performance degradations Dive into the two cornerstone domains of being an Application Architect: Data Architecture and Management, and Sharing and Visibility. In this 4-day workshop, our Architect experts will present you with a case study scenario that will be broken down and digested through iterative exploration. Learn how to design and build secure, scalable, and high-performing solutions through a combination of lecture, demos, hands-on exercises, and workshop presentations and discussions. Application Architect Overview Assess the Requirements to Become an Application Architect Understand the Real-World Expectations of Application Architects Review the Core Characteristics of Successful Application Architects Scenario Introduction Review the Application Architecture Scenario Identify Scenario Problem Areas Identify Scenario Actors and Licensing Architecture Documentation Understand Key Architecture Documentation Requirements Learn About Best Practices for Artifact Documentation Produce Architecture Documents Data Modeling Identify Relationship Types and Their Impact on Record Access, User Interface, and Reporting Review the Considerations for Changing Field Types Review the Considerations for Modifying Data Models with Schema Builder Review the Considerations for Importing and Exporting Data Identify Use Cases of External Objects Determine an Appropriate Data Model Understand Design Implications with Complex Environments and Large Data Volumes (LDV) Data Management Review the Considerations for Working with LDV Review Data Lifecycle Concepts and Mechanisms Review Master Data Management and System of Record Concepts Review Data Migration, Planning, Preparation, and Execution Identify Potential LDV and Calculate Expected Volumes Go Further with Indexes Standard and Custom Skinny Tables Lock Records Security Model Review the Considerations for Working with Internal and External Sharing Models Restrict and Extend Object and Field Access Determine Sharing Solutions Identify Record Sharing Mechanisms (Declarative, Programmatic, Implicit) Understand Teams Concepts (Account, Opportunity, Case) Understand Person Accounts and Its Implication on Sharing Encrypt Data Sharing in Communities Understand Community Security Mechanisms Secure Integration Endpoints Integrate and Specify Connected Apps and Named Credentials Advanced Security & Visibility Concepts Implement Security & Visibility Controls with Apex and Visualforce Review Territory Management and Its Implication on Data Management, Sharing, and Visibility Review Divisions and Its Implication on Data Management, Sharing, and Visibility Understand Security and Visibility Controls on 'Special' Objects Solution Design Determine When to Leverage Standard Products Functionality vs. Custom Build vs. AppExchange Understand Declarative and Programmatic Configuration Get to Know the Order of Execution Automate Business Processes Consider Reporting and Analytics Needs Consider How to Store and Access Content/Files Apply Solution Design Concepts to Real-World Problems and Scenarios Deployment & Integration Best Practices Review the Application Lifecycle Understand How Sandboxes Should Be Used Review Deployment Options Identify Integration Patterns Wrap-up Review a Practice Scenario Review What Was Covered Additional course details: Nexus Humans Salesforce Build Application Architect Expertise (ARC901) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Salesforce Build Application Architect Expertise (ARC901) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours This course is intended for Experienced system administrators, system engineers, and system integrators Overview By the end of the course, you should be able to meet the following objectives:Describe the architecture of VMware Cloud on AWS, Deploy a VMware Cloud on AWS SDDC and virtual machines (VMs),Configure internal, external, and inter-SDDC networking, Describe and configure storage integrations and solutions for VMware Cloud on AWS,Configure a connection between an on-premises vSphere SDDC and a VMware Cloud on AWS SDDC,Configure the scale-up and scale-down of a VMware Cloud on AWS SDDC,Migrate virtual machines between on-premises vSphere and VMware Cloud on AWS SDDCs,Describe and configure disaster recovery solutions,Describe additional services that add value to a VMware Cloud on AWS SDDC,Describe lifecycle, troubleshooting scenarios, and support resources for a VMware Cloud on AWS SDDC This four-day, hands-on training course provides you with the knowledge, skills, and tools for deploying and managing a VMware Cloud? on AWS infrastructure. You explore the common use cases of the VMware Cloud on AWS infrastructure that allows you to modernize, protect, and scale applications based on VMware vSphere© that leverage AWS.In this course, you are introduced to various rapid and easy migration options for workloads based on vSphere to VMware Cloud on AWS. In addition, you are presented with VMware Cloud Disaster Recovery?, which is a Disaster Recovery as-a-service (DRaaS) solution, with fast recovery capabilities, that can be used to cost-effectively protect a broad set of your virtualized applications. Course Introduction Introductions and course logistics Course objectives Introduction to VMware Cloud on AWS Why choose VMware Cloud on AWS Management and operational structure VMware Cloud on AWS Platform and SDDC Deployment Preparation Getting started with VMware Cloud on AWS Preparing AWS infrastructure for a VMware Cloud on AWS deployment Setting up a VMware on Cloud AWS account Billing and pricing on VMware Cloud services Deploying and Scaling and SDDC Deploying and examining SDDC configurations Sizing the SDDC SDDC cluster management SDDC host management Optimizing and maintaining an SDDC cluster using Elastic DRS for VMware Cloud? on AWS Accessing and Analyzing vCenter Configurations Accessing vCenter Server in the Cloud SDDC from the public internet Creating virtual machines in the Cloud SDDC Analyzing HA, DRS, and resource pools settings in the SDDC Analyzing vSphere permissions Networking in VMware Cloud on AWS Internal SDDC network Networking and security options Inter-SDDC networking Storage on VMware Cloud on AWS vSAN storage in VMware Cloud on AWS Attaching external storage to a VM running on an SDDC Working with On-Premises vSphere Hybrid linked mode VMware Cloud on AWS migration solutions Virtual machine migration with VMware Hybrid Cloud Extension Maintaining and Troubleshooting VMware Cloud on AWS Accessing API with VMware Cloud on AWS Maintenance and support Common troubleshooting steps Disaster Recovery Solution Site Recovery add-on service VMware Cloud Disaster Recovery Using Other VMware Products with the SDDC VMware vRealize© Log Insight Cloud? VMware Horizon© with VMware Cloud on AWS VMware vRealize© Automation Cloud? add-on Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Cloud on AWS: Deploy, Configure, Manage 2021 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Cloud on AWS: Deploy, Configure, Manage 2021 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
ᴋᴀᴘ ɪꜱ ᴀ ᴛʀᴀɴꜱᴍɪꜱꜱɪᴏɴ ᴏꜰ ᴋᴜɴᴅᴀʟɪɴɪ ᴇɴᴇʀɢʏ ᴀɴᴅ ɴᴏɴ-ᴅᴜᴀʟ ꜱᴛᴀᴛᴇꜱ ᴏꜰ ᴄᴏɴꜱᴄɪᴏᴜꜱɴᴇꜱꜱ ᴏʀ ᴏɴᴇɴᴇꜱꜱ. It’s stands for Kundalini Activation Process. When the energy is transmitted by the facilitator it activates a person’s life force energy that exists inside every one of us. It's the path of surrender, there is nothing a person needs to “do” while the facilitator transmits the energy. The energy enters through the crown chakra, and builds up in between the first and second chakra, to then start flowing both ways. No breathwork or poses are necessary: that's why it's different from kundalini yoga, tantra or chi-gong. In KAP, to receive and feel the energy all you need to do is to surrender. During the session experiences can be: out of body, bliss states, seeing colours and visions, and having emotional releases. Nevertheless, what happens in the session is not what's most important, what comes after is a profound unblocking of your energy centers and a deeper connection to your intuition and to your true self. The real changes in your life occur because of these major internal shifts. No experience required! Important to note: - Please wear comfortable clothing - Try not to eat 3 hours before the session (or something light, such as a piece of fruit) - Try to avoid alcohol or substances 24 hours before the session - Bring a yoga mat if you prefer, otherwise one will be provided for you
Duration 2 Days 12 CPD hours This course is intended for Data Protection OfficersData Protection ManagersAuditorsLegal Compliance OfficersSecurity ManagerInformation ManagersAnyone involved with data protection processes and programs Overview It will show the world that students know privacy laws and regulations and how to apply them, and that students know how to secure your place in the information economy. When students earn a CIPP credential, it means they?ve gained a foundational understanding of broad global concepts of privacy and data protection law and practice, including: jurisdictional laws, regulations and enforcement models; essential privacy concepts and principals; legal requirements for handling and transferring data and more. It will show the world that students know privacy laws and regulations and how to apply them, and that students know how to secure their place in the information economy. When students earn a CIPP credential, it means they've gained a foundational understanding of broad global concepts of privacy and data protection law and practice, including: jurisdictional laws, regulations and enforcement models; essential privacy concepts and principals; legal requirements for handling and transferring data and more. Common Principles and Approaches to Privacy This unit includes a brief discussion about the modern history of privacy, an introduction to types of information, an overview of information risk management and a summary of modern privacy principles. Jurisdiction and Industries This unit introduces the major privacy models employed around the globe and provides an overview of privacy and data protection regulation by jurisdictions and industry sectors. Information Security: Safeguarding Personal Information This unit presents introductions to information security, including definitions, elements, standards, and threats/ vulnerabilities, as well as introductions to information security management and governance, including frameworks, controls, cryptography and identity and access management (IAM). Online Privacy: Using Personal Information on Websites and with Other Internet-related Technologies This unit focuses on the web as a platform, as well as privacy considerations for sensitive online information, including policies and notices, access, security, authentication and data collection. Additional topics include children?s online privacy, email, searches, online marketing and advertising, social media, online assurance, cloud computing and mobile devices. Canadian Legal Framework This unit provides an introduction to the Canadian legal system. It includes enforcement agencies and their powers, privacy basics from a Canadian perspective and the underlying framework for Canadian privacy law and practice. Canadian Private-sector Privacy Laws This unit focuses on the Canadian legal system. It includes enforcement agencies and their powers, privacy basics from a Canadian perspective and the underlying framework for Canadian privacy law and practice. Canadian Public-sector Privacy Laws This unit highlights key concepts and practices related to the collection, retention, use, disclosure and disposal of personal information by federal, provincial and territorial governments. Health Information Privacy Laws This unit touches on the applicability and purpose of health information privacy laws. Private-sector Compliance Practices This unit delves into the components that make up compliance regulations, including Generally Accepted Privacy Principals and security breach notification, and also examines compliance track records and Federal Commissioner Findings. Public-sector Compliance Practices This unit presents the various methods that can be implemented for compliance in the public sector, such as privacy impact assessments and data sharing agreements. In addition, it discusses the challenges presented by digital information exchanges, as well as non-legislative considerations. Health-sector Compliance Practices This unit covers the issues presented with digital compliance in the health sector. Additional course details: Nexus Humans Certified Information Privacy Professional (CIPP/CAN) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Certified Information Privacy Professional (CIPP/CAN) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for System administrators, IT security administrators, IT security engineers, and other professionals responsible for designing, implementing, maintaining, and managing the security of Red Hat Enterprise Linux systems and ensuring their compliance with the organization's security policies. Be a Red Hat Certified Engineer (RHCE©), or demonstrate equivalent Red Hat Enterprise Linux knowledge and experience. Overview Students that complete this course should be able to demonstrate these skills: - Analyze and remediate system compliance using OpenSCAP and SCAP Workbench, employing and customizing baseline policy content provided with Red Hat Enterprise Linux. - Monitor security-relevant activity on your systems with the kernel's audit infrastructure. - Explain and implement advanced SELinux techniques to restrict access by users, processes, and virtual machines. - Confirm the integrity of files and their permissions with AIDE. - Prevent unauthorized USB devices from being used with USBGuard. - Protect data at rest but provide secure automatic decryption at boot using NBDE. - Proactively identify risks and misconfigurations of systems and remediate them with Red Hat Insights. - Analyze and remediate compliance at scale with OpenSCAP, Red Hat Insights, Red Hat Satellite, and Red Hat Ansible Tower. This course is ideal for security administrators and system administrators who need to manage the secure operation of servers running Red Hat© Enterprise Linux©, whether deployed on physical hardware, as virtual machines, or as cloud instances. Maintaining security of computing systems is a process of managing risk through the implementation of processes and standards backed by technologies and tools. In this course, you will discover and understand the resources that can be used to help you implement and comply with your security requirements. This course is based on Red Hat Enterprise Linux 7.5, Red Hat Satellite 6.3, Red Hat Ansible© Engine 2.5, Red Hat Ansible Tower 3.2, and Red Hat Insights. 1 - MANAGE SECURITY AND RISK Define strategies to manage security on Red Hat Enterprise Linux servers. 2 - AUTOMATE CONFIGURATION AND REMEDIATION WITH ANSIBLE Remediate configuration and security issues with Ansible Playbooks. 3 - PROTECT DATA WITH LUKS AND NBDE Encrypt data on storage devices with LUKS and use NBDE to manage automatic decryption when servers are booted. 4 - RESTRICT USB DEVICE ACCESS Protect system from rogue USB device access with USBGuard. 5 - CONTROL AUTHENTICATION WITH PAM Manage authentication, authorization, session settings, and password controls by configuring pluggable authentication modules (PAMs). 6 - RECORD SYSTEM EVENTS WITH AUDIT Record and inspect system events relevant to security, using the Linux kernel's audit subsystem and supporting tools. 7 - MONITOR FILE SYSTEM CHANGES Detect and analyze changes to a server's file systems and their contents using AIDE. 8 - MITIGATE RISK WITH SELINUX Improve security and confinement between processes by using SELinux and advanced SELinux techniques and analyses. 9 - MANAGE COMPLIANCE WITH OPENSCAP Evaluate and remediate a server's compliance with security policies by using OpenSCAP. 10 - AUTOMATE COMPLIANCE WITH RED HAT SATELLITE Automate and scale your ability to perform OpenSCAP checks and remediate compliance issues using Red Hat Satellite. 11 - ANALYZE AND REMEDIATE ISSUES WITH RED HAT INSIGHTS Identify, detect, and correct common issues and security vulnerabilities with Red Hat Enterprise Linux systems by using Red Hat Insights. 12 - PERFORM A COMPREHENSIVE REVIEW Review the content covered in this course by completing hands-on review exercises. Additional course details: Nexus Humans Red Hat Security - Linux in Physical, Virtual, and Cloud (RH415) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Red Hat Security - Linux in Physical, Virtual, and Cloud (RH415) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
About this Training Course Asset maintenance and equipment reliability teams play a significant role to ensure that there is no room for downtime and losses in production. They are often recognised for their contribution and ability to keep assets running productively in today's organisations. This 4 full-day Certificate in Asset Management course will provide those involved in Asset Management with a full explanation of the key processes to manage assets across their lifecycle. This course has been designed to equip participants with practical skills to take back to work. This course enables participants to ensure their organisation's assets are realising their full value in support of the organisation's objectives. Accredited by the Institute of Asset Management (IAM), this course will prepare participants to sit for the IAM Asset Management Certificate qualification. The IAM exam is offered as an option for participants of this course. Training Objectives Upon completion of this course, the participants will be able to: Understand the key principles, tools and terminology of Asset Management, and demonstrate how it will benefit their organisation Gain familiarity in the application of ISO 55000 in practice Access a range of models that will support the implementation of asset management in their organisation Have their understanding of Asset Management tools and concepts assessed Learn new Asset Management skills and models that will enhance their current performance Be better prepared for the Institute of Asset Management (IAM) Certificate Examination Target Audience This course will benefit maintenance managers, operations managers, asset managers and reliability professionals, planners and functional specialists. It will also be useful for facilities engineers, supervisors/managers and structural engineers/supervisors/ and managers. Course Level Basic or Foundation Training Methods Other than world-class visuals and slides, this course will include a high level of interaction between the facilitator and participants and group discussion among the participants themselves. There will be a number of exercises & quizzes to demonstrate key points and to give participants the chance to apply learning and appreciate key aspects of best practice. Participants will also have the chance to share examples from their own experience, discuss real problems they are facing and develop actions for improvement when they return to work. Trainer Your expert course leader is a is a highly experienced in maintenance and turnaround specialist. He is a Chartered Mechanical Engineer, having spent 19 years working for BP in engineering, maintenance and turnaround management roles. During this time, he worked on plants at all ages in the lifecycle, from construction, commissioning and operating new assets to maintaining aging assets and decommissioning. He has taken roles in Projects, Human Resources and Integrity Management which give real breadth to his approach. He also specialized in Continuous Improvement, gaining the award of International Petrochemical Coach of the year. He stays up to date with the latest industrial developments through his consulting support for major clients. He is also the Asset Management lead and a VILT specialist, having delivered over 70 days of VILT training in the last year. He has an engaging style and will bring his current industrial experience, proficiency of VILT techniques and diverse content, gathered from a comprehensive training portfolio, to deliver a distinctive training experience. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations
Duration 4 Days 24 CPD hours This course is intended for This course is geared for experienced skilled Java developers, software developers, data scientists, machine learning experts or others who wish to transtion their coding skills to Scala, learning how to code in Scala and apply it in a practical way. This is not a basic class. Overview Working in a hands-on learning environment led by our expert instructor you'll: Get comfortable with Scala's core principles and unique features, helping you navigate the language confidently and boosting your programming skills. Discover the power of functional programming and learn techniques that will make your code more efficient,maintainable, and enjoyable to write. Become proficient in creating dynamic web applications using the Play Framework, and easily connect to databases with the user-friendly Slick library. Master concurrency programming with Akka, empowering you to build scalable and fault-tolerant applications that excel in performance. Enhance your testing skills using ScalaTest and ScalaCheck, ensuring the reliability and quality of your Scala applications, while having fun in the process. Explore the fascinating world of generative AI and GPT technologies, and learn how to integrate them into your projects,adding a touch of innovation and intelligence to your Scala solutions. If your team requires different topics, additional skills or a custom approach, our team will collaborate with you to adjust the course to focus on your specific learning objectives and goals. Discover the power of Scala programming in our comprehensive, hands-on technical training course designed specifically for experienced object-oriented (OO) developers. Scala is a versatile programming language that combines the best of both OO and functional programming paradigms, making it ideal for a wide range of projects, from web applications to big data processing and machine learning. By mastering Scala, you'll be able to develop more efficient, scalable, and maintainable applications. Fast Track to Scala Programming for OO / Java Developers is a four day hands-on course covers the core principles of Scala, functional programming, web application development, database connectivity, concurrency programming, testing, and interoperability between Scala and Java. Additionally, you'll explore cutting-edge generative AI and GPT technologies, learning how to integrate them into your Scala applications for intelligent suggestions or automation. Throughout the course you?ll explore the latest tools and best practices in the Scala ecosystem, gaining valuable knowledge and experience that can be directly applied to your day-to-day work. With 50% of the course content dedicated to hands-on labs, you'll gain practical experience applying the concepts you've learned across various projects, such as building functional web applications, connecting to databases, designing modular components, and implementing concurrency. Upon completing the course, you'll have a solid understanding of the language and its features, empowering you to confidently apply your new skills in data science and machine learning projects. You'll exit well-prepared to create efficient, scalable, and maintainable Scala applications, regardless of the complexity of your projects. Introduction to Scala Scala features and benefits Comparing Scala with Java and other OO languages Installing Scala and setting up the development environment Object-Oriented Programming in Scala Classes and objects Traits, mixins, and inheritance Companion objects and factories Encapsulation and polymorphism Functional Programming Basics Pure functions and referential transparency Higher-order functions and currying Immutability and persistent data structures Pattern matching and recursion Having Fun with Functional Data Structures Lists, sets, and maps in Scala Folding and reducing operations Stream processing and lazy evaluation For-comprehensions Building Web Applications in Functional Style Introduction to Play Framework Functional web routing and request handling JSON handling with Play-JSON Middleware and functional composition Connecting to a Database Introduction to Slick library Database configuration and setup Querying and updating with Slick Transactions and error handling Building Scalable and Extensible Components Modular architecture and design patterns Dependency injection with MacWire Type classes and type-level programming Implicit parameters and conversions Concurrency Programming & Akka Introduction to Akka framework and Actor model Actor systems and message passing Futures and Promises Supervision and fault tolerance Building Confidence with Testing Introduction to ScalaTest and ScalaCheck Unit testing and property-based testing Test-driven development in Scala Mocking and integration testing Interoperability between Scala and Java Calling Java code from Scala Using Java libraries in Scala projects Converting Java collections to Scala collections Writing Scala code that can be called from Java Using Generative AI and GPT Technologies in Scala Programming Overview of GPT and generative AI Integrating GPT with Scala applications Use cases and practical examples
Duration 0.5 Days 3 CPD hours This course is intended for This course is intended for people who have made the transition to remote working and now wish to fully leverage Microsoft Teams for their day to day business needs. Done in a show and Tell style, this course is designed to give business users a thorough understanding of how to use Teams features from an organizational perspective. Features such as: how to manage communications, file sharing for collaboration, calendar events, conference calling, search functions and other daily tasks. Prerequisites: To ensure your success in this course, you should have end-user skills with any current version of Windows, including being able to open and close applications, navigate basic file structures, and manage files and folders. Overview Overview of Teams Permissions, Access & Restrictions Team Management (Power Users) Team Management (End Users) Communication and Collaboration Searching and Activity Sharing Files Customizing your settings Meetings and Calls Done in a show and Tell style, this course is designed to give business users a thorough understanding of how to use Teams features from an organizational perspective. Overview What is Microsoft Teams? How to Access Microsoft Teams Etiquette for using teams Integration and Storage Capabilities Interface Permissions, Access & Restrictions Owner, Member & Guest Team restrictions Channel restrictions Call Restrictions Team Management (Power Users) Create a Team Access administrator settings Add/delete members to a Team Add/delete a guest user Create and manage Channels Create and manage Private channels Customize Channel tabs Creating Tags Team Management (End Users) Getting your Channel email address Integration with Outlook Leave a Team or Channel Communication and Collaboration Team Conversations Using the New Conversation panel Replying to a conversation Using the interactive options Deleting and editing a conversation Turn off notifications for a conversation Using Mentions and Tags Saving messages Accessing your saved messages Accessing recent chats Create a new Chat for one-2-one Create a new chat for group chats Read Receipts Pop out Chats Searching and Activity Use the search tool to find Specific messages Files People Accessing your Activity Accessing your Feed Filtering your feed and activity Sharing Files Uploading files Viewing files Attaching files to a conversation Sharing a link to a file Edit and Collaborate on files Create files Open files in Teams Online Desktop SharePoint Add a file to a tab Share file outside your organization Customizing your settings Filter Teams Hide channels Channel notifications Channel analytics Changing your Status Setting your status message Controlling the general user settings Controlling your privacy settings Controlling your personal notification settings Controlling your device settings (headphones and microphone) Controlling your call settings Setting your Voicemail message Controlling your app permissions Meetings and Calls Accessing your calendar Calendar views Create a Teams meeting Meeting options Meeting requests and RSVP options Join a Teams meeting Copy join information Create a meeting from Outlook Using the Meet Now option Sharing your screen Changing your background image Adding more people to a meeting Meetings menu Download meeting attendees End meetings for everyone (Organizer only) Accessing your Contacts Accessing your Voicemail Accessing your call history Additional course details: Nexus Humans Microsoft Teams for the Remote Business User training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Microsoft Teams for the Remote Business User course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This course is designed for project managers, Scrum masters, business analysts, and team leaders looking to effectively manage their development projects using Team Foundation Server 2017. Overview The course also demonstrates how TFS facilitates the use of storyboards to prototype experiences, request stakeholder feedback, foster team collaboration, and generate reports. The final two modules of the course provide an overview of how testers and developers can work effectively using appropriate tools in the Visual Studio family. In this course, attendees will plan a new software development project and go through the steps to initiate the project using Visual Studio 2017. This includes recording requirements, creating a product backlog, and estimating effort for backlog items. Introducing the Microsoft Visual Studio 2017 Family What?s new in Visual Studio 2017 Overview of the Visual Studio 2017 family Overview of product features Project workflow across the Visual Studio 2017 suite of products Initiating a New Project Organizing projects in TFS Understanding process templates Creating a new team project Setting team project properties Switching between team projects Work Item Primer Overview of work items Traceability between work items Searching and creating custom queries Work item charting and pinning charts Work item tagging Configuring project notifications Creating our Product Backlog Examining requirement types Creating backlog items Creating requirement hierarchies using features The importance of acceptance criteria Agile Estimation Introduction to estimation Using story points Planning Poker and other popular estimation techniques Adding your estimates to TFS work items Working from the Product Backlog Introducing the Kanban board Entering and editing details on the Kanban board Customizing columns, including using split columns and limiting WIP Recording our Definition of Done (DoD) Understanding the Cumulative Flow Diagram Working in Sprints Specifying your sprint schedule and your team capacity Selecting items for the sprint backlog using forecasting Decomposing requirements into tasks Using burndown charts to track progress Monitoring work using the task board Working with unparented work items Retrospectives The importance of retrospectives Conducting an efficient sprint retrospective What you should avoid in your retrospective Working with TFS Teams Configuring teams in our team project Managing work from a master backlog Allocating work to our teams Configuring iterations for TFS teams Enhancing Requirements Using Storyboards Overview of storyboarding capabilities Creating a storyboard to illustrate a requirement Linking a storyboard to a work item Getting Stakeholder Feedback Introducing the Microsoft Feedback Client Using the Microsoft Feedback Client to provide rich feedback to the team Adding continuous feedback into your workflow Fostering Team Collaboration An overview of the various clients The use of email in sharing information Choosing the appropriate client tool Creating and Customizing Reports Overview of reporting architecture Reviewing the out of the box reports Adding new reports Creating ad hoc reports using Excel Overview of Agile Testing The role of the tester in a sprint planning meeting A lap around web-based test management Creating a test plan Creating manual test cases from requirements Overview of Agile Development Using My Work to select tasks from the sprint backlog Understanding the value of linking changesets to work items The importance of unit testing Creating a continuous integration build Additional course details: Nexus Humans Managing Agile Projects Using TFS 2017 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Managing Agile Projects Using TFS 2017 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 1 Days 6 CPD hours This course is intended for Technical leaders Overview This course provides general overview of Blockchain technology and is specifically designed to answer the following questions:What is Blockchain? (What exactly is it?)Non-Technical Technology Overview (How does it work?)Benefits of Blockchain (Why should anyone consider this?)Use Cases (Where and for what apps is it appropriate?)Adoption (Who is using it and for what?)Implementation (How do I get started?)Future of Blockchain (What is its future?) This instructor-led 1 day Blockchain Architecture training is for technical leaders who need to make decisions about architecture, environment, and development platforms. What is Blockchain? A record keeping system Trust Decentralization Trustless environment How does Blockchain work? Announcements Blocks Nodes Chaining Verification Consensus Scalability Privacy Crypto Hashing Digital Fingerprinting PoW vs PoS Types of Blockchains Public vs Private Open vs closed Smart Contracts Blockchain as History Tokens / Coins Gas How is Blockchain different from what we have today? Decentralized Peer-to-peer architecture Software vs Firmware Database vs Blockchain Distributed database or other technology? Data Sovereignty Group Consensus What are Use Cases for Blockchain? Use Case Examples Currency Banking Services Voting Medical Records Supply Chain / Value Chain Content Distribution Verification of Software Updates (cars, planes, trains, etc) Law Enforcement Title and Ownership Records Social Media and Online Credibility Fractional asset ownership Cable Television billing High fault tolerance DDoS-proof Public or Private Blockchain? Who are the participants? What does a Blockchain app look like? DApp Resembles typical full stack web application Any internal state changes and all transactions are written to the blockchain Node.js IDE Public Blockchain visibility Private Blockchain solutions Oracles How do I design a Blockchain app? What does this solution need to let users do? Will the proposed solution reduce or remove the problems and pain points currently felt by users? What should this solution prevent users from doing? Do you need a solution ready for heavy use on day 1? Is your solution idea enhanced by the use of Blockchain? Does the use of Blockchain create a better end-user experience? If so, how? Has your business developed custom software solutions before? What level of support are you going to need? How big is the developer community? Does your vision of the future align with the project or platform's vision of the future? Does the platform aim to make new and significant contributions to the development space, or is it an efficiency / cost play? Should the solution be a public or private Blockchain? Should the solution be an open or closed Blockchain? Create a plan for contract updates and changes! Hybrid solutions Monetary exchanges? How do I develop a Blockchain app? AGILE approach pre-release Define guiding principles up front Software vs Firmware Announcements, not transactions! Classes, not contracts Link contracts to share functions Use calling contracts to keep contract address the same Hyperledger vs Ethereum CONSIDER No of Users * Avg No of Transactions (state changes) per User Should a Blockless solution be applied? Performance Security Anonymity Security Monolithic vs Modular Sandwich complexity model How do I test a Blockchain app? Recommend 5x to 10x traditional application testing time Security Networks Additional course details: Nexus Humans Blockchain - An Overview for Business Professionals training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Blockchain - An Overview for Business Professionals course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.