The market for professional services is becoming increasingly competitive, with some firms and individuals becoming very effective at winning new work, leaving others lagging way behind. Given the choice between spending time on client work and business development work, we all tend to choose that which we feel to be easier, more attractive and more aligned with our image of ourselves. We stay within our comfort zones, we focus on client work, and we only resort to business development work when we have to, which can also lead to 'feast or famine' syndrome. The programme will help participants: Understand the professional business development approach and the style that is appropriate for their business and their clients Follow a process to guide their conversations and business development meetings Prepare thoroughly for a business development meeting/contact with a client to ensure they use their time efficiently and maximise results Create a great first impression and professional opening to a conversation Ask open questions and listen effectively in order to spot opportunities, understand needs and progress the opportunity Identify and understand buying and decision-making processes and criteria Skilfully and confidently handle questions and objections Sell the benefits of their services and approach over those of their competitors Progress the sale by agreeing next steps and gaining commitment appropriately 1 Introduction Aims and objectives of the programme Personal introductions and objectives Workshop overview 2 An introduction to business development and selling for professionals What is selling? Who are you selling to? The buying experience What clients want The four-step business development process The business development cycle and pipeline management Upselling and cross-selling as well as winning new clients 3 Networking and generating leads What is networking? Networking objectives It's not what you know but who you know Asking for referrals and introductions Making appointments from networking activity 4 Opening the sales relationship/sales meeting What potential customers are thinking Judging first impressions Creating positive first impressions Building rapport and creating interest and impact Earning the right 5 Core communication skills for professional selling Overcoming barriers to listening The art of listening Questioning refresher Types of questions Questioning funnel 6 Understanding and identifying needs and opportunities Identifying the questions to ask to identify needs and opportunities Questions to move us through the buying and selling process Understanding their buying processes Asking questions that position you as a 'trusted adviser' The questions that give you a competitive advantage Knowing when you have asked enough questions 7 Introducing solutions Tailoring your 'pitch' to the client Speaking the client's language Using features and benefits Applying the benefit cycle 8 Handling objections and concerns Identifying the typical objections and concerns Understanding why clients raise objections and concerns Following a structure for handling objections Handling the price objection 9 Gaining commitment Knowing when to close The art of checking Recognising buying signals Small c and big C 10 Putting it all together Personal learning summary and action plans
NPORS Cat And Genny Training or Cable Avoidance Training Prioritising the safety of underground utilities in construction and excavation projects is essential, necessitating comprehensive Cat and Genny training. In these sessions, workers receive education on operating Cable Avoidance Tools (CAT) and Signal Generators (Genny), Cat and Genny. The Cat and Genny use electromagnetic signals to detect buried cables and pipes before digging commences. Through comprehensive Cat and Genny training, workers become proficient in using CAT and Genny equipment, enabling them to accurately map out the locations of underground infrastructure. This proactive approach not only enhances on-site safety but also contributes to efficient project management by minimising the risk of accidental damage and costly delays. The aim of the NPORS Cat & Genny Training is to Provide training in Cable Avoidance and Service Location (Cat and Genny).The Cat and Genny Course is designed for any person working on the roads, setting out before a build, surveying and any others who may be excavating an area where pipes or cables may be buried underground. Price Match Promise Book with Confidence at Vally Plant Training At Vally Plant Training, we guarantee unbeatable value with our Price Match Promise. When you choose us for your Cat and Genny Course, you can book with confidence, knowing that we will not be beaten on price. If you find a lower price for the same NPORS Cat And Genny Course, we’ll match it—ensuring you receive top-quality training at the best possible rate. Your skills, our commitment—always at the best price. CAT & GENNY Training is designed for construction professionals and workers involved in excavation who need to operate Cable Avoidance Tools and Signal Generators. This training is ideal for individuals who have prior experience in excavation but require formal instruction on the safe and effective use of these specific tools to prevent accidental damage to underground services. Participants should have a basic understanding of excavation work, and if unsure of their eligibility for this advanced training, are encouraged to contact our training coordinators for more information. The CAT & GENNY training program is divided into two main sections: a theoretical module and a practical application module. The theory part covers the principles of operation, safety procedures, and risk assessment associated with underground utility detection. The practical module provides hands-on experience with both the Cable Avoidance Tool and Signal Generator, emphasising field techniques and problem-solving. Upon completion of the Cat And Genny course, participants will receive comprehensive revision materials to reinforce key concepts covered during the training. Introduction to CAT and Genny Training CAT and Genny , also referred to as CAT & Genny or CAT and Genny Training, are essential tools used in the construction and utility sectors to help locate and avoid underground cables and pipes during excavation works. CAT, which stands for Cable Avoidance Tool, is designed to detect signals naturally emitted by metallic services like electrical cables. Meanwhile, the Genny, short for Signal Generator, is used alongside the CAT to apply a signal to underground utilities that do not naturally emit detectable signals, such as telecoms or fibre . Understanding how to operate these tools is crucial for anyone involved in excavation. Proper use of CAT and Genny can prevent costly and dangerous errors, such as accidentally cutting through power lines or water pipes. The training not only focuses on how to use these devices effectively but also covers the best practices for scanning different types of terrain and interpreting the signals received. This ensures that workers can conduct their tasks safely and efficiently, minimising the risk of disruption and damage to underground services. What Is CAT and Genny Training? CAT and Genny Training provides comprehensive instruction on using Cable Avoidance Tools (CAT) and Signal Generators (Genny) to locate underground utilities safely. This training is critical to reduce the risk of accidentally striking underground assets during excavation, which can lead to severe safety hazards and financial losses. What Does Our CAT and Genny Training Course Cover? Our CAT and Genny Training Course covers: Basics of operating CAT and Genny equipment: Understanding the device controls, functions, and proper handling. Detection techniques: Learning how to detect different types of services, including electric, gas, and water. Practical applications: Hands-on training with both simulated and live environments to practice safe scanning and detection. Safety protocols: Emphasising safety procedures to prevent injuries and accidents. Legal compliance: Overview of health and safety regulations related to excavation work. Who Needs CAT and Genny Training? CAT and Genny Training is essential for anyone involved in excavation and groundworks. This includes utility workers, construction workers, civil engineers, site managers, and anyone else who may need to locate underground utilities as part of their job. The Cat And Genny Course is crucial for preventing damage to underground infrastructure like gas, water, telecoms and electrical lines, which can result in costly repairs and dangerous accidents. Do You Need to Be Trained to Use a CAT Scanner? Yes, training is highly recommended to use a CAT scanner effectively and safely. While not legally mandatory, proper training ensures that operators can accurately interpret the scanner’s signals and avoid potential hazards when working near underground utilities. Specialised Genny Tool Training Course Overview: The Genny Course is designed specifically to train users on the effective operation of the Genny tool, a crucial component of the CAT and Genny system used for detecting underground utilities. Key Learning Outcomes: → Understanding Genny Signals: Participants will learn how different signals can be applied and traced using the Genny, improving their ability to detect non-metallic utilities such as plastic water pipes. → Optimising Signal Strength: Training includes adjusting the Genny’s signal strength to suit various soil conditions and utility types, ensuring clearer and more accurate detections. Practical Applications: → Hands-on Practice: Extensive field practice sessions are included to give participants real-world experience in using the Genny effectively. →Troubleshooting Common Issues: Learners will be taught how to troubleshoot common operational issues to minimise downtime and enhance field productivity. Advanced Techniques: → Using Genny with CAT4: Instructions on how to integrate Genny use with the CAT4 detector for enhanced detection capabilities. → Interpreting and Mapping: Skills in interpreting the Genny’s output and using integrated mapping tools for accurate utility mapping. Safety Protocols: → Safe Operation Practices: Emphasis on safety measures to prevent accidents during the use of high-frequency signals. → Maintenance and Daily Checks: Training on regular maintenance routines and daily checks to keep the Genny in optimal working condition. Certification: → Qualification and Certification: Upon completion of the course, participants receive a certification that validates their proficiency in using the Genny tool according to industry standards. Scanning Techniques with CAT and Genny General Scanning Techniques: → Sweeping Motion: Always use a slow, steady sweeping motion with the CAT device. Begin scanning at least a few meters away from the expected area of the utilities to avoid missing any signals. → Directional Scans: Perform scans in multiple directions — both parallel and perpendicular to the expected direction of the utility lines to ensure thorough coverage. → Depth Perception: Adjust the depth settings based on preliminary scans to get an accurate depth estimate of buried utilities. Specific Use of Genny: → Direct Connection: When available, use the direct connection method with the Genny to induce a precise signal into a specific utility line. This is particularly useful in crowded areas with multiple utility lines. → Induction Mode: Use the Genny’s induction mode when direct connections are not possible. Ensure the Genny is placed on the ground vertically for optimal signal transmission. How to Use the CAT and Genny to Find Hidden Wires and Pipes Getting Ready: Check the Tools: Make sure the CAT and Genny are ready to use and have full batteries. Set Up the Genny: Pick the right sound for the Genny to use so it can find wires or pipes under the ground. If you can, connect the Genny to the pipe or wire with a special wire. Using the Genny: Stand it on the Ground: Put the Genny on the ground where you think there might be something hidden. Turn it on to send a beep into the ground. Connect it for Better Finding: Sometimes, you connect the Genny to something like a pipe for a clearer beep. Using the CAT: Start with Power Mode: Turn on the CAT and use the power mode to find beeps from wires that are on. Try Radio Mode: Next, switch to radio mode to hear beeps from metal things like pipes. Finally, Use Genny Signal Mode: Use this mode to hear the special beeps from your Genny to find hidden stuff like plastic pipes. How to Look Properly: Move Slowly: Walk slowly with the CAT over the area. If you move too fast, you might miss some beeps. Check in a Cross Pattern: First walk in one direction and then the other direction to make sure you cover all the area. Understanding What You Hear: Listen to the Beeps: A loud beep means you are close to a wire or pipe. If the beep sounds the same as you move, it probably means you found a wire or pipe. Staying Safe: Look Before You Dig: Always check by looking in the hole to make sure what the CAT and Genny found before you start digging. Keep the Tools Working Well: Make sure your tools are working right by checking them often. 500 mm from utilities; Always use insulated digging tools when close to underground utilities Frequently Asked Questions On Cat & Genny Training What is CAT and Genny training? CAT and Genny training provides instruction on how to use Cable Avoidance Tools (CAT) and Signal Generators (Genny) effectively to detect underground utilities and avoid accidental strikes during excavation. The training covers operational techniques, safety procedures, and the correct interpretation of the equipment’s signals. Why is CAT and Genny training important for construction workers? This Cat And Genny Course is crucial for safety and efficiency on construction sites. It helps workers avoid costly damages to underground utilities such as water pipes, electricity cables, and communication lines, which can lead to severe consequences including service outages, legal liabilities, and endangerment of worker and public safety. 3. How Long Is the Certification Valid? The certification received after completing CAT and Genny Training is generally valid for three to five years. After this period, a refresher course is recommended to keep up with new technologies and changing safety regulations. 4. Is CAT and Genny training required by law in the UK? While not specifically mandated by law, CAT and Genny training is strongly recommended under the UK Health and Safety Executive guidelines (HSE) to meet the legal duties under the Health and Safety at Work Act. It is considered best practice for anyone involved in excavation works. Cat & Genny Training Available 7 days a week to suit your business requirements. VPT have a team of friendly and approachable instructors, who have a wealth of knowledge of cable avoidance and the construction industry We have our own training centre conveniently located close to the M5 junction 9, In Tewkesbury. With its own purpose-built practical training area to simulate an actual working environment for the cat & genny course. Our Cable Avoidance training and test packages are priced to be competitive. Discounts are available for multiple bookings We can send a fully qualified NPORS cat & genny Tester to your site nationwide, to reduce the amount of time away from work Our more courses: Polish your abilities with our dedicated Lift Supervision Training, Slinger Signaller Training, Telehandler Training, Cat & Genny Training, Plant Loader Securer, Ride-On Road Roller, Abrasive Wheel Training, Lorry Loader Training and Scissor Lift Training sessions. Learn the safe and effective operation of these vital machines, crucial for construction and maintenance tasks. Elevate your skills and career prospects by enrolling in our comprehensive courses today.
360 Excavator Training Courses From The objective of the NPORS 360 Excavator Training courses is to deliver comprehensive theoretical and practical training, ensuring the safe utilisation of excavators. This course covers the proficient operation of both wheeled or tracked excavators, catering to potential Digger operators. Upon successfully completing the NPORS Excavator Training Course, participants will be awarded the red trained operator card or the NPORS Traditional card, signifying their competence in completing the 360 excavator courses. Book direct with Vally Plant Training Today. This Novice 360 Excavator courses span five days and provides personalised 1 on 1 training, offering participants a focused and tailored learning experience to enhance their skills in excavator operation. Our price is structured to 1 on 1 training helping you to gain the Digger Driver Ticket 360 Excavator courses or testing can be carried out on your site Nationwide or our site in Gloucestershire NPORS Excavator Test Book with Confidence at Vally Plant Training At Vally Plant Training, we guarantee unbeatable value with our Excavator Experienced Test Price Match Promise. When you choose us, you can book with confidence, knowing that we will not be beaten on price. If you find a lower price for the same NPORS Excavator Experienced Worker Test, we’ll match it—ensuring you receive top-quality training at the best possible rate. Click for our terms and conditions Your skills, our commitment—always at the best price. NPORS Excavator Test is for operators who have been using the excavators in the workplace for a few years or that they have had some form of in-formal training in the past. If you are unsure if you qualify to go down the test route please contact our team to discuss this in more detail. If you book this route with us you will receive revision notes for the 25 questions. Discounts are available for multiple bookings NPORS Lifting Operations, Excavator As A Crane is an add on to the excavator operator card to enable the operator to safely pick and carry underslung loads, you can add the excavator as a crane at the same time as your 360 Excavator Training Turn your Excavator red card to blue with our hassle free Excavator NVQ, for more information EXCAVATOR NVQ 360 Excavator Training Course: Mastering Operation, Safety, and Maintenance 360 Excavators are versatile and powerful pieces of machinery widely used in the construction industry for various tasks, from digging trenches to lifting heavy loads with the use of Quick Hitches and Tilt Rotators. However, operating an excavator requires more than just basic knowledge of its controls; it demands proficiency, safety consciousness, and a comprehensive understanding of its capabilities. In this detailed course outline, Vally Plant Training will delve into the essential content covered in an 360 Excavator training course, designed to equip participants with the skills and knowledge needed to operate, maintain, and safely manoeuvre excavators on construction sites. If you’re keen on mastering the art of manoeuvring those heavy-duty machines, the 360 digger training at Vally Plant Training is just what you need. This course is designed to transform you into a pro at operating 360-degree excavators, making you adept at a variety of tasks, from digging to precision handling. The program is tailored to cater to both beginners and experienced operators, ensuring that everyone walks away with valuable skills. For newcomers, there’s an extensive 5-day hands-on 360 digger training where you’ll be immersed in learning the ins and outs of these massive machines, ensuring you get ample time to practice and perfect your technique. The 360 excavator courses for a Novice are 1 on 1 training, this will give you 100% of available time on the excavator learning more than the basics to enable you to pass the NPORS 360 excavator training course first time. Introduction to 360 Excavator Training All Health and safety legislations covered Overview of excavator types and configurations Components and anatomy of an excavator Understanding hydraulic systems and controls 360 Excavator courses Safety Procedures Importance of safety in excavator operation Pre-operation inspection checklist Safe entry and exit procedures Personal protective equipment (PPE) requirements Emergency shutdown procedures 360 Excavator Operation Basics Starting and shutting down procedures Familiarisation with controls: joysticks, pedals, and switches Basic manoeuvres: moving forward, backward, turning, and slewing Operating the boom, arm, and bucket controls Operate Quick Hitches and Tilt Rotators if fitted Understanding machine stability and centre of gravity Excavation Techniques Digging trenches and excavating foundations Sloping and benching techniques for safe excavation Loading dumper trucks and stockpiling materials Precision excavation for utilities and pipelines Lifting and Rigging: Excavator as a crane Overview of Excavator lifting capacities and load charts Selecting appropriate lifting attachments Rigging techniques: using hooks, slings, and chains Safe lifting practices and procedures Excavator Maintenance Importance of regular maintenance for optimal performance Daily, weekly, and monthly maintenance checks Lubrication and greasing points Troubleshooting common issues and repairs Site Safety and Hazard Awareness Identifying and mitigating hazards on construction sites Understanding underground utilities and potential hazards Working safely near power lines and other overhead obstructions Site-specific safety protocols and regulations Practical Hands-On Training Practical exercises in operating an excavator under supervision Manoeuvring in various terrain conditions Excavation tasks: digging trenches, loading trucks, etc. Lifting and rigging exercises with simulated loads NPORS Assessment and Certification Written examination to assess theoretical knowledge Practical assessment of excavator operation skills Certification upon successful completion of the Excavator Course Excavator Variations Micro Excavator up to 1Tons: Excavator Below 10T Excavator above and below 10T Wheeled Or Tracked 180 excavator (3CX) Lifting Operations (additional) Quick Hitch Training Frequently Asked Questions 1. What is 360 excavator operator training, and why is it necessary? 360 Excavator training provides individuals with the skills and knowledge needed to safely and efficiently operate excavators, heavy machinery used in construction, mining, and other industries. It’s essential for ensuring the safety of operators, preventing accidents, and maximising productivity on job sites. All Vally Plant Trainings Excavator Novice courses are 1 on 1 training helping you to gain the digger driver ticket 2. Who should undergo 360 excavator operator training? Anyone who operates or intends to operate excavators should undergo proper excavator training. This includes construction workers, heavy equipment operators, site supervisors, and contractors. Training is also valuable for individuals seeking employment in industries where excavators are commonly used. 3. What topics are covered in excavator 360 course programs? Excavator training programs typically cover a range of topics, including equipment familiarisation, safety procedures, pre-operation inspection, proper operation techniques, trenching and excavation techniques, site hazards identification, and emergency procedures. Our Training programs include hands-on practical training. 4. How long does excavator 360 course take? The duration of excavator training programs can vary depending on factors such as the level of experience of the participants and the depth of the curriculum. Basic training courses may last anywhere from a few days to 2 weeks. Vally Plant Training can also offer shorter refresher courses for experienced Excavator operators. Contact Vally Plant Training For more information 5. Is 360 excavator training Courses mandatory? While excavator training may not be legally mandated,, many employers require operators to undergo 360 Excavator Training as part of their occupational health and safety policies. Additionally, regulatory bodies and industry associations often recommend or require training certification for operating heavy machinery like excavators on site. 6. Where can I find reputable excavator training courses? Reputable 360 excavator training courses are offered by a variety of sources, including vocational schools, community colleges, private training providers, and equipment manufacturers. It’s important to choose a program that is accredited, led by experienced instructors, and covers relevant industry standards and regulations. Additionally, employers may offer in-house training or provide recommendations for external training providers. Call Vally Plant Training for all reputable training including 360 excavator training. How much does a 360 excavator driver earn?A 360 excavator driver earns Approximately between £24,000 and £40,000 pa. This will depend on things like competence, qualifications, skills, and the amount of work you have completed over the years. holding the NPORS Excavator Operator card will give you a better chance of work.How To Apply For 360 Excavator TrainingIf you want to apply for the 360 excavator Training courses in Gloucestershire then please use our contact form to enquire about our excavator courses. Contact us to find more about the other courses that we offer, and any special offers we have running each month. Please give us as much information as possible about the course, like, is this the first time on the machine or have you had previous certification on the plant.. 360 Excavator Training Courses Available 7 days a week to suit your business requirements. VPT have a team of friendly and approachable instructors, who have a wealth of knowledge of the excavator and the Construction & Agricultural industry We have our own training centre conveniently located close to the M5 junction 9, In Tewkesbury. With its own purpose-built Excavator practical training area to simulate an actual working environment. Our 360 Excavator Training Courses and test packages are priced to be competitive. Discounts are available for multiple bookings We can send a fully qualified NPORS Excavator assessor to your site nationwide, to reduce the amount of time away from work to complete the 360 Excavator Training or travel to Vally Plant Training’s Facility in Gloucestershire. Our more courses: Polish your abilities with our dedicated Lift Supervision Training, Slinger Signaller Training, Telehandler Training, Cat & Genny Training, Plant Loader Securer, Ride-On Road Roller, Abrasive Wheel Training, Lorry Loader Training and Scissor Lift Training sessions. Learn the safe and effective operation of these vital machines, crucial for construction and maintenance tasks. Elevate your skills and career prospects by enrolling in our comprehensive courses today. Ever wondered what it feels like to take control of a 13-tonne excavator? Now’s your chance to find out with this thrilling 13T Excavator Digger Driving Experience. For a full two hours, you’ll be in the driver’s seat, operating one of these colossal machines just like the professionals you’ve seen on motorways and construction sites across the country. Under the expert guidance of the UK’s Number 1 accredited training organisation, you’ll learn how to manoeuvre this massive piece of machinery with skill and precision. From loading dumpers and moving dirt around to digging impressive holes, you’ll experience the raw power and versatility of a 13-tonne excavator first-hand. For those looking for a “NPORS Excavator Training near me,” our widespread operations make it convenient for you to access Vally Plant Trainings top-quality training no matter where you are in the UK
This Renewables Technical Surveying training short two day course is specifically designed for individuals and companies that want to train themselves and their staff on exactly how to carry out Renewables Technical Site Surveying prior to any renewables installation measures, this includes for heating systems, solar systems and EV Charge point installations. The course is primarily aimed at Energy Suppliers, Equipment Manufacturers, Renewable Installers, Domestic Energy Assessors, Retrofit Assessors, Retrofit Co-ordinators, Renewables sales staff and suitable individuals with a basic level of knowledge in varying building structures, heating systems and varying renewable technologies.
Network DevOps course description This course is not a soft skills course covering the concepts of DevOps but instead concentrates on the technical side of tools and languages for network DevOps. Particular technologies focussed on are ansible, git and Python enabling delegates to leave the course ready to starting automating their network. Hands on sessions follow all major sections. More detailed courses on individual aspects of this course are available. What will you learn Evaluate network automation tools. Automate tasks with ansible. Use git for version control. Use Python to manage network devices. Use Python libraries for network devices. Network DevOps course details Who will benefit: Administrators automating tasks. Prerequisites: TCP/IP Foundation Duration 5 days Network DevOps course contents What is DevOps Programming and automating networks, networks and clouds, AWS, OpenStack, SDN, DevOps for network operations. Initial configuration Configuring SSH, ZTP, POAP. Hands on Initial lab configuration. Getting started with ansible The language, the engine, the framework. Uses of ansible, orchestration. The architecture, Controlling machines, nodes, Agentless, SSH, modules. Configuration management, inventories, playbooks, modules, roles. Hands on Installing ansible, running ad hoc commands. Ansible playbooks ansible-playbook, YAML, plays, tasks, handlers, modules. Playbook variables. Register module, debug module. Hands on Running playbooks. Ansible Inventories /etc/ansible/hosts, hosts, groups, static inventories, dynamic inventories. Inventory variables, external variables. Limiting hosts. Hands on Static inventories, variables in inventory files. Ansible modules for networking Built in modules, custom modules, return values. Core modules for network operations. Cisco and/or Juniper modules. ansible_connection. Ansible 2.6 CLI. Hands on Using modules. Ansible templating and roles aConfiguration management, full configurations, partial configurations. The template module, the assemble module, connection: local, Jinja2 templates, variables, if, for, roles. Hands on Generating multiple configurations from a template. Network programming and modules Why use Python? Why use ansible? alternatives, ansible tower, Linux network devices. Programming with Python Python programming Functions. Classes, objects and instances, modules, libraries, packages. Python strings, Python file handling, pip list, pip instal. Hands on Python programming with pyping. More Python programming Functions. Classes, objects and instances, modules, libraries, packages. Python strings, Python file handling, pip list, pip install. Hands on Python programming with pyping. Git Distributed version control, repositories, Git and GitHub, Alternatives to GitHub, Installing git, git workflows, creating repositories, adding and editing files, branching and merging, merge conflicts. Hands on working with Git. Python and networking APIs, Sockets, Telnetlib, pysnmp, ncclient, ciscoconfparse. Paramiko SSH and Netmiko Integrating Python and network devices using SSH. Netmiko, Netmiko methods. Hands on Netmiko. NAPALM What is NAPALM, NAPALM operations, getters, Replace, merge, compare, commit, discard. Hands on Configuration with NAPALM. Integrating ansible and NAPALM. Python and REST REST APIs, enabling the REST API. Accessing the REST API with a browser, cURL, Python and REST, the request library. Hands on Using a REST API with network devices.
Duration 5 Days 30 CPD hours This course is intended for This course is designed for persons aspiring to the Microsoft 365 Administrator role and have completed at least one of the Microsoft 365 role-based administrator certification paths. This course covers the following key elements of Microsoft 365 administration: Microsoft 365 tenant management, Microsoft 365 identity synchronization, and Microsoft 365 security and compliance. In Microsoft 365 tenant management, you learn how to configure your Microsoft 365 tenant, including your organizational profile, tenant subscription options, component services, user accounts and licenses, security groups, and administrative roles. You then transition to configuring Microsoft 365, with a primary focus on configuring Office client connectivity. Finally, you explore how to manage user-driven client installations of Microsoft 365 Apps for enterprise deployments. The course then transitions to an in-depth examination of Microsoft 365 identity synchronization, with a focus on Microsoft Entra Connect and Connect Cloud Sync. You learn how to plan for and implement each of these directory synchronization options, how to manage synchronized identities, and how to implement password management in Microsoft 365 using multifactor authentication and self-service password management. In Microsoft 365 security management, you begin examining the common types of threat vectors and data breaches facing organizations today. You then learn how Microsoft 365?s security solutions address each of these threats. You are introduced to the Microsoft Secure Score, as well as to Microsoft Entra ID Protection. You then learn how to manage the Microsoft 365 security services, including Exchange Online Protection, Safe Attachments, and Safe Links. Finally, you are introduced to the various reports that monitor an organization?s security health. You then transition from security services to threat intelligence; specifically, using Microsoft 365 Defender, Microsoft Defender for Cloud Apps, and Microsoft Defender for Endpoint. Once you have this understanding of Microsoft 365?s security suite, you then examine the key components of Microsoft 365 compliance management. This begins with an overview of all key aspects of data governance, including data archiving and retention, Microsoft Purview message encryption, and data loss prevention (DLP). You then delve deeper into archiving and retention, paying particular attention to Microsoft Purview insider risk management, information barriers, and DLP policies. You then examine how to implement these compliance features by using data classification and sensitivity labels. Prerequisites Completed a role-based administrator course such as Messaging, Teamwork, Security, Compliance, or Collaboration. A proficient understanding of DNS and basic functional experience with Microsoft 365 services. A proficient understanding of general IT practices. A working knowledge of PowerShell. 1 - Configure your Microsoft 365 experience Explore your Microsoft 365 cloud environment Configure your Microsoft 365 organizational profile Manage your tenant subscriptions in Microsoft 365 Integrate Microsoft 365 with customer engagement apps Complete your tenant configuration in Microsoft 365 2 - Manage users, licenses, and mail contacts in Microsoft 365 Determine the user identity model for your organization Create user accounts in Microsoft 365 Manage user account settings in Microsoft 365 Manage user licenses in Microsoft 365 Recover deleted user accounts in Microsoft 365 Perform bulk user maintenance in Microsoft Entra ID Create and manage guest users Create and manage mail contacts 3 - Manage groups in Microsoft 365 Examine groups in Microsoft 365 Create and manage groups in Microsoft 365 Create dynamic groups using Azure rule builder Create a Microsoft 365 group naming policy Create groups in Exchange Online and SharePoint Online 4 - Add a custom domain in Microsoft 365 Plan a custom domain for your Microsoft 365 deployment Plan the DNS zones for a custom domain Plan the DNS record requirements for a custom domain Create a custom domain in Microsoft 365 5 - Configure client connectivity to Microsoft 365 Examine how automatic client configuration works Explore the DNS records required for client configuration Configure Outlook clients Troubleshoot client connectivity 6 - Configure administrative roles in Microsoft 365 Explore the Microsoft 365 permission model Explore the Microsoft 365 admin roles Assign admin roles to users in Microsoft 365 Delegate admin roles to partners Manage permissions using administrative units in Microsoft Entra ID Elevate privileges using Microsoft Entra Privileged Identity Management Examine best practices when configuring administrative roles 7 - Manage tenant health and services in Microsoft 365 Monitor the health of your Microsoft 365 services Monitor tenant health using Microsoft 365 Adoption Score Monitor tenant health using Microsoft 365 usage analytics Develop an incident response plan Request assistance from Microsoft 8 - Deploy Microsoft 365 Apps for enterprise Explore Microsoft 365 Apps for enterprise functionality Explore your app compatibility by using the Readiness Toolkit Complete a self-service installation of Microsoft 365 Apps for enterprise Deploy Microsoft 365 Apps for enterprise with Microsoft Configuration Manager Deploy Microsoft 365 Apps for enterprise from the cloud Deploy Microsoft 365 Apps for enterprise from a local source Manage updates to Microsoft 365 Apps for enterprise Explore the update channels for Microsoft 365 Apps for enterprise Manage your cloud apps using the Microsoft 365 Apps admin center 9 - Analyze your Microsoft 365 workplace data using Microsoft Viva Insights Examine the analytical features of Microsoft Viva Insights Explore Personal insights Explore Team insights Explore Organization insights Explore Advanced insights 10 - Explore identity synchronization Examine identity models for Microsoft 365 Examine authentication options for the hybrid identity model Explore directory synchronization 11 - Prepare for identity synchronization to Microsoft 365 Plan your Microsoft Entra deployment Prepare for directory synchronization Choose your directory synchronization tool Plan for directory synchronization using Microsoft Entra Connect Plan for directory synchronization using Microsoft Entra Connect cloud sync 12 - Implement directory synchronization tools Configure Microsoft Entra Connect prerequisites Configure Microsoft Entra Connect Monitor synchronization services using Microsoft Entra Connect Health Configure Microsoft Entra Connect cloud sync prerequisites Configure Microsoft Entra Connect cloud sync 13 - Manage synchronized identities Manage users with directory synchronization Manage groups with directory synchronization Use Microsoft Entra Connect Sync Security Groups to help maintain directory synchronization Configure object filters for directory synchronization Explore Microsoft Identity Manager Troubleshoot directory synchronization 14 - Manage secure user access in Microsoft 365 Manage user passwords Enable pass-through authentication Enable multifactor authentication Enable passwordless sign-in with Microsoft Authenticator Explore self-service password management Explore Windows Hello for Business Implement Microsoft Entra Smart Lockout Implement conditional access policies Explore Security Defaults in Microsoft Entra ID Investigate authentication issues using sign-in logs 15 - Examine threat vectors and data breaches Explore today's work and threat landscape Examine how phishing retrieves sensitive information Examine how spoofing deceives users and compromises data security Compare spam and malware Examine account breaches Examine elevation of privilege attacks Examine how data exfiltration moves data out of your tenant Examine how attackers delete data from your tenant Examine how data spillage exposes data outside your tenant Examine other types of attacks 16 - Explore the Zero Trust security model Examine the principles and components of the Zero Trust model Plan for a Zero Trust security model in your organization Examine Microsoft's strategy for Zero Trust networking Adopt a Zero Trust approach 17 - Explore security solutions in Microsoft 365 Defender Enhance your email security using Exchange Online Protection and Microsoft Defender for Office 365 Protect your organization's identities using Microsoft Defender for Identity Protect your enterprise network against advanced threats using Microsoft Defender for Endpoint Protect against cyber attacks using Microsoft 365 Threat Intelligence Provide insight into suspicious activity using Microsoft Cloud App Security Review the security reports in Microsoft 365 Defender 18 - Examine Microsoft Secure Score Explore Microsoft Secure Score Assess your security posture with Microsoft Secure Score Improve your secure score Track your Microsoft Secure Score history and meet your goals 19 - Examine Privileged Identity Management Explore Privileged Identity Management in Microsoft Entra ID Configure Privileged Identity Management Audit Privileged Identity Management Control privileged admin tasks using Privileged Access Management 20 - Examine Azure Identity Protection Explore Azure Identity Protection Enable the default protection policies in Azure Identity Protection Explore the vulnerabilities and risk events detected by Azure Identity Protection Plan your identity investigation 21 - Examine Exchange Online Protection Examine the anti-malware pipeline Detect messages with spam or malware using Zero-hour auto purge Explore anti-spoofing protection provided by Exchange Online Protection Explore other anti-spoofing protection Examine outbound spam filtering 22 - Examine Microsoft Defender for Office 365 Climb the security ladder from EOP to Microsoft Defender for Office 365 Expand EOP protections by using Safe Attachments and Safe Links Manage spoofed intelligence Configure outbound spam filtering policies Unblock users from sending email 23 - Manage Safe Attachments Protect users from malicious attachments by using Safe Attachments Create Safe Attachment policies using Microsoft Defender for Office 365 Create Safe Attachments policies using PowerShell Modify an existing Safe Attachments policy Create a transport rule to bypass a Safe Attachments policy Examine the end-user experience with Safe Attachments 24 - Manage Safe Links Protect users from malicious URLs by using Safe Links Create Safe Links policies using Microsoft 365 Defender Create Safe Links policies using PowerShell Modify an existing Safe Links policy Create a transport rule to bypass a Safe Links policy Examine the end-user experience with Safe Links 25 - Explore threat intelligence in Microsoft 365 Defender Explore Microsoft Intelligent Security Graph Explore alert policies in Microsoft 365 Run automated investigations and responses Explore threat hunting with Microsoft Threat Protection Explore advanced threat hunting in Microsoft 365 Defender Explore threat analytics in Microsoft 365 Identify threat issues using Microsoft Defender reports 26 - Implement app protection by using Microsoft Defender for Cloud Apps Explore Microsoft Defender Cloud Apps Deploy Microsoft Defender for Cloud Apps Configure file policies in Microsoft Defender for Cloud Apps Manage and respond to alerts in Microsoft Defender for Cloud Apps Configure Cloud Discovery in Microsoft Defender for Cloud Apps Troubleshoot Cloud Discovery in Microsoft Defender for Cloud Apps 27 - Implement endpoint protection by using Microsoft Defender for Endpoint Explore Microsoft Defender for Endpoint Configure Microsoft Defender for Endpoint in Microsoft Intune Onboard devices in Microsoft Defender for Endpoint Manage endpoint vulnerabilities with Microsoft Defender Vulnerability Management Manage device discovery and vulnerability assessment Reduce your threat and vulnerability exposure 28 - Implement threat protection by using Microsoft Defender for Office 365 Explore the Microsoft Defender for Office 365 protection stack Investigate security attacks by using Threat Explorer Identify cybersecurity issues by using Threat Trackers Prepare for attacks with Attack simulation training 29 - Examine data governance solutions in Microsoft Purview Explore data governance and compliance in Microsoft Purview Protect sensitive data with Microsoft Purview Information Protection Govern organizational data using Microsoft Purview Data Lifecycle Management Minimize internal risks with Microsoft Purview Insider Risk Management Explore Microsoft Purview eDiscovery solutions 30 - Explore archiving and records management in Microsoft 365 Explore archive mailboxes in Microsoft 365 Enable archive mailboxes in Microsoft 365 Explore Microsoft Purview Records Management Implement Microsoft Purview Records Management Restore deleted data in Exchange Online Restore deleted data in SharePoint Online 31 - Explore retention in Microsoft 365 Explore retention by using retention policies and retention labels Compare capabilities in retention policies and retention labels Define the scope of a retention policy Examine the principles of retention Implement retention using retention policies, retention labels, and eDiscovery holds Restrict retention changes by using Preservation Lock 32 - Explore Microsoft Purview Message Encryption Examine Microsoft Purview Message Encryption Configure Microsoft Purview Message Encryption Define mail flow rules to encrypt email messages Add organizational branding to encrypted email messages Explore Microsoft Purview Advanced Message Encryption 33 - Explore compliance in Microsoft 365 Plan for security and compliance in Microsoft 365 Plan your beginning compliance tasks in Microsoft Purview Manage your compliance requirements with Compliance Manager Examine the Compliance Manager dashboard Analyze the Microsoft Compliance score 34 - Implement Microsoft Purview Insider Risk Management Explore insider risk management Plan for insider risk management Explore insider risk management policies Create insider risk management policies Investigate insider risk management activities and alerts Explore insider risk management cases 35 - Implement Microsoft Purview Information Barriers Explore Microsoft Purview Information Barriers Configure information barriers in Microsoft Purview Examine information barriers in Microsoft Teams Examine information barriers in OneDrive Examine information barriers in SharePoint 36 - Explore Microsoft Purview Data Loss Prevention Examine Data Loss Prevention Explore Endpoint data loss prevention Examine DLP policies View DLP policy results Explore DLP reports 37 - Implement Microsoft Purview Data Loss Prevention Plan to implement Microsoft Purview Data Loss Protection Implement Microsoft Purview's default DLP policies Design a custom DLP policy Create a custom DLP policy from a template Configure email notifications for DLP policies Configure policy tips for DLP policies 38 - Implement data classification of sensitive information Explore data classification Implement data classification in Microsoft 365 Explore trainable classifiers Create and retrain a trainable classifier View sensitive data using Content explorer and Activity explorer Detect sensitive information documents using Document Fingerprinting 39 - Explore sensitivity labels Manage data protection using sensitivity labels Explore what sensitivity labels can do Determine a sensitivity label's scope Apply sensitivity labels automatically Explore sensitivity label policies 40 - Implement sensitivity labels Plan your deployment strategy for sensitivity labels Examine the requirements to create a sensitivity label Create sensitivity labels Publish sensitivity labels Remove and delete sensitivity labels Additional course details: Nexus Humans MS-102T00: Microsoft 365 Administrator training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the MS-102T00: Microsoft 365 Administrator course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This course is intended for IT Professionals who are already experienced in general Windows Server, Windows client, Azure, and Microsoft 365 administration, and who want to learn more about using Windows PowerShell for administration. No prior experience with any version of PowerShell or any scripting language is assumed. This course is also suitable for IT Professionals already experienced in server administration, including Microsoft Exchange Server, Microsoft SharePoint Server, and Microsoft SQL Server. This course provides students with the fundamental knowledge and skills to use PowerShell for administering and automating administration of Windows servers. This course provides students the skills to identify and build the command they require to perform a specific task. In addition, students learn how to build scripts to accomplish advanced tasks such as automating repetitive tasks and generating reports. This course provides prerequisite skills supporting a broad range of Microsoft products, including Windows Server, Windows Client, Microsoft Azure, and Microsoft 365. In keeping with that goal, this course will not focus on any one of those products, although Windows Server, which is the common platform for all of those products, will serve as the example for the techniques this course teaches. Prerequisites Before attending this course, students must have: -Experience with Windows networking technologies and implementation. - Experience with Windows Server administration, maintenance, and troubleshooting. 1 - Review Windows PowerShell Learn about Windows PowerShell Get familiar with Windows PowerShell applications Identify factors to install and use Windows PowerShell Configure the Windows PowerShell console Configure the Windows PowerShell Integrated Scripting Environment (ISE) Use Visual Studio Code with PowerShell 2 - Understand the command syntax in Windows PowerShell Discover the structure of PowerShell cmdlets Discover the parameters for using PowerShell cmdlets Review the tab completion feature in PowerShell Display the About files content in PowerShell 3 - Find commands and Get-Help in Windows PowerShell Define modules in PowerShell Find cmdlets in PowerShell Use command aliases in PowerShell Use Show-Command and Get-Help in PowerShell Interpret the help file contents and update the local help content in PowerShell 4 - Manage Active Directory Domain Services using PowerShell cmdlets Manage user accounts in PowerShell Manage groups and group memberships in PowerShell Manage computer accounts in PowerShell Manage organizational units and Active Directory objects in PowerShell 5 - Manage network service settings for Windows devices using PowerShell cmdlets Manage IP addresses in PowerShell Manage IP routing in PowerShell Manage DNS clients in PowerShell Manage Windows Firewall settings in PowerShell 6 - Manage Windows Server settings using PowerShell cmdlets Automate management tasks using the Group Policy management cmdlets Manage server roles and services using PowerShell cmdlets Manage Hyper-V Virtual Machines using PowerShell cmdlets Manage Internet Information Services using PowerShell cmdlets 7 - Manage settings for a local Windows machine using PowerShell cmdlets Manage Windows 10 using PowerShell Manage permissions with PowerShell 8 - Understand the Windows PowerShell pipeline Review Windows PowerShell pipeline and its output Discover object members in PowerShell Control the formatting of pipeline output 9 - Select, sort, and measure objects using the pipeline Sort and group objects by property in the pipeline Measure objects in the pipeline Select a set of objects in the pipeline Select object properties in the pipeline Create and format calculated properties in the pipeline 10 - Filter objects out of the pipeline Learn about the comparison operators in PowerShell Review basic filter syntax in the pipeline Review advanced filter syntax in the pipeline Optimize the filter performance in the pipeline 11 - Enumerate objects in the pipeline Learn about enumerations in the pipeline Review basic syntax to enumerate objects in the pipeline Review advanced syntax to enumerate objects in the pipeline 12 - Send and pass data as output from the pipeline Write pipeline data to a file Convert pipeline objects to other forms of data representation in PowerShell Control additional output options in PowerShell 13 - Pass pipeline objects Pipeline parameter binding Identify ByValue parameters Pass data by using ByValue Pass data by using ByPropertyName Identify ByPropertyName parameters Use manual parameters to override the pipeline Use parenthetical commands Expand property values 14 - Connect with data stores using PowerShell providers Define Windows PowerShell providers Review the built-in providers in PowerShell Access provider help in PowerShell 15 - Use PowerShell drives in PowerShell Explain PowerShell drives in PowerShell Use PowerShell drive cmdlets in PowerShell Manage the file system in PowerShell Manage the registry in PowerShell Work with certificates in PowerShell Work with other PowerShell drives in PowerShell 16 - Review CIM and WMI Review architecture of CIM and WMI Review repositories in CIM and WMI Locate online class documentation by using CIM and WMI cmdlets 17 - Query configuration information by using CIM and WMI List local repository namespaces and classes by using CIM and WMI Query instances by using commands and WMI Query Language Connect to remote computers by using CIM and WMI cmdlets Query repository classes from remote computers by using CIMSession objects 18 - Query and manipulate repository objects by using CIM and WMI methods Discover methods of repository objects by using CIM and WMI Locate class methods and documentation by using CIM and WMI Invoke methods of repository objects by using CIM and WMI 19 - Manage variables in Windows PowerShell scripts Define variables in Windows PowerShell scripts Create variable names in Windows PowerShell scripts Assign values and types to variables in Windows PowerShell scripts Identify the methods and properties of variables in Windows PowerShell scripts Use string variables and methods in Windows PowerShell scripts Use date variables and methods in Windows PowerShell scripts 20 - Work with arrays and hash tables in Windows PowerShell scripts Define an array in Windows PowerShell scripts Work with array lists in Windows PowerShell scripts Define hash tables in Windows PowerShell Scripts Work with hash tables in Windows PowerShell scripts 21 - Create and run scripts by using Windows PowerShell Review Windows PowerShell scripts Modify scripts in the PowerShell Gallery Create scripts using Windows PowerShell Review the PowerShellGet module in Windows PowerShell Run scripts and set the execution policy in Windows PowerShell Review Windows PowerShell and AppLocker Sign the scripts digitally in Windows PowerShell 22 - Work with scripting constructs in Windows PowerShell Review and use the ForEach loop in Windows PowerShell scripts Review and use the If construct in Windows PowerShell scripts Review and use the Switch construct in Windows PowerShell scripts Review the For construct in Windows PowerShell scripts Review other loop constructs in Windows PowerShell scripts Review Break and Continue in Windows PowerShell scripts 23 - Import data in different formats for use in scripts by using Windows PowerShell cmdlets Use the Get-Content command in Windows PowerShell scripts Use the Import-Csv cmdlet in Windows PowerShell scripts Use the Import-Clixml cmdlet in Windows PowerShell scripts Use the ConvertFrom-Json cmdlet in Windows PowerShell scripts 24 - Use methods to accept user inputs in Windows PowerShell scripts Identify values that might change in Windows PowerShell scripts Use the Read-Host cmdlet in Windows PowerShell scripts Use the Get-Credential cmdlet in Windows PowerShell scripts Use the Out-GridView cmdlet in Windows PowerShell scripts Pass parameters to a Windows PowerShell script 25 - Troubleshoot scripts and handle errors in Windows PowerShell Interpret error messages generated for Windows PowerShell commands Add output to Windows PowerShell scripts Use breakpoints in Windows PowerShell scripts Interpret error actions for Windows PowerShell commands 26 - Use functions and modules in Windows PowerShell scripts Review functions in Windows PowerShell scripts Use variable scope in Windows PowerShell scripts Create modules in Windows PowerShell scripts Use the dot sourcing feature in Windows PowerShell 27 - Manage single and multiple computers by using Windows PowerShell remoting Review the remoting feature of Windows PowerShell Compare remoting with remote connectivity Review the remoting security feature of Windows PowerShell Enable remoting by using Windows PowerShell Use one-to-one remoting by using Windows PowerShell Use one-to-many remoting by using Windows PowerShell Compare remoting output with local output 28 - Use advanced Windows PowerShell remoting techniques Review common remoting techniques of Windows PowerShell Send parameters to remote computers in Windows PowerShell Set access protection to variables, aliases, and functions by using the scope modifier Enable multi-hop remoting in Windows PowerShell 29 - Manage persistent connections to remote computers by using Windows PowerShell sessions Review persistent connections in Windows PowerShell Create and manage persistent PSSessions by using Windows PowerShell Disconnect PSSessions by using Windows PowerShell Review the feature of implicit remoting in Windows PowerShell 30 - Review Azure PowerShell module Review Azure PowerShell Review the benefits of the Azure PowerShell module Install the Azure PowerShell module Migrate Azure PowerShell from AzureRM to Azure Review Microsoft Azure Active Directory module for Windows PowerShell and Azure Active Directory PowerShell for Graph modules 31 - Review the features and tools for Azure Cloud Shell Review the characteristics of Azure Cloud Shell Review the features and tools of Azure Cloud Shell Configure and experiment with Azure Cloud Shell 32 - Manage Azure resources with Windows PowerShell Create a new Azure virtual machine by using Windows PowerShell commands Manage Azure virtual machines by using Windows PowerShell commands Manage Azure related storage by using Azure PowerShell Manage Azure subscriptions by using Azure PowerShell 33 - Manage users, groups, and licenses in Microsoft Entra ID by using Windows PowerShell Review benefits to manage Microsoft 365 services by using Windows PowerShell Connect to the Microsoft 365 tenant by using Windows PowerShell Manage users in Microsoft 365 by using Windows PowerShell Manage groups in Microsoft 365 by using Windows PowerShell Manage roles in Microsoft 365 by using Windows PowerShell Manage licenses in Microsoft 365 by using Windows PowerShell 34 - Manage Exchange Online by using Windows PowerShell Connect to Exchange Online by using Windows PowerShell Manage mailboxes in Exchange Online by using Windows PowerShell Manage resources in Exchange Online by using Windows PowerShell Manage admin roles in Exchange Online by using Windows PowerShell 35 - Manage SharePoint Online by using Windows PowerShell Install and connect to SharePoint Online Management Shell by using Windows PowerShell Manage SharePoint Online users and groups by using Windows PowerShell Manage SharePoint sites by using Windows PowerShell Manage SharePoint Online external user sharing by using Windows PowerShell 36 - Manage Microsoft Teams by using Windows PowerShell Review Microsoft Teams PowerShell module Install the Microsoft Teams PowerShell module Manage teams with Microsoft Teams PowerShell module 37 - Create and manage background jobs using Windows PowerShell Define the types of background jobs in Windows PowerShell Start remote jobs and CIM/WMI jobs in Windows PowerShell Monitor jobs in Windows PowerShell Retrieve results for running jobs in Windows PowerShell 38 - Create and manage scheduled jobs using Windows PowerShell Create and run Windows PowerShell scripts as scheduled tasks Define scheduled jobs in Windows PowerShell Create job option and job trigger objects in Windows PowerShell Create and register a scheduled job in Windows PowerShell Retrieve the results from a scheduled job in Windows PowerShell
Duration 1 Days 6 CPD hours This course is intended for The primary audience for this course is data professionals who are familiar with data modeling, extraction, and analytics. It is designed for professionals who are interested in gaining knowledge about Lakehouse architecture, the Microsoft Fabric platform, and how to enable end-to-end analytics using these technologies. Job role: Data Analyst, Data Engineer, Data Scientist Overview Describe end-to-end analytics in Microsoft Fabric Describe core features and capabilities of lakehouses in Microsoft Fabric Create a lakehouse Ingest data into files and tables in a lakehouse Query lakehouse tables with SQL Configure Spark in a Microsoft Fabric workspace Identify suitable scenarios for Spark notebooks and Spark jobs Use Spark dataframes to analyze and transform data Use Spark SQL to query data in tables and views Visualize data in a Spark notebook Understand Delta Lake and delta tables in Microsoft Fabric Create and manage delta tables using Spark Use Spark to query and transform data in delta tables Use delta tables with Spark structured streaming Describe Dataflow (Gen2) capabilities in Microsoft Fabric Create Dataflow (Gen2) solutions to ingest and transform data Include a Dataflow (Gen2) in a pipeline This course is designed to build your foundational skills in data engineering on Microsoft Fabric, focusing on the Lakehouse concept. This course will explore the powerful capabilities of Apache Spark for distributed data processing and the essential techniques for efficient data management, versioning, and reliability by working with Delta Lake tables. This course will also explore data ingestion and orchestration using Dataflows Gen2 and Data Factory pipelines. This course includes a combination of lectures and hands-on exercises that will prepare you to work with lakehouses in Microsoft Fabric. Introduction to end-to-end analytics using Microsoft Fabric Explore end-to-end analytics with Microsoft Fabric Data teams and Microsoft Fabric Enable and use Microsoft Fabric Knowledge Check Get started with lakehouses in Microsoft Fabric Explore the Microsoft Fabric Lakehouse Work with Microsoft Fabric Lakehouses Exercise - Create and ingest data with a Microsoft Fabric Lakehouse Use Apache Spark in Microsoft Fabric Prepare to use Apache Spark Run Spark code Work with data in a Spark dataframe Work with data using Spark SQL Visualize data in a Spark notebook Exercise - Analyze data with Apache Spark Work with Delta Lake Tables in Microsoft Fabric Understand Delta Lake Create delta tables Work with delta tables in Spark Use delta tables with streaming data Exercise - Use delta tables in Apache Spark Ingest Data with DataFlows Gen2 in Microsoft Fabric Understand Dataflows (Gen2) in Microsoft Fabric Explore Dataflows (Gen2) in Microsoft Fabric Integrate Dataflows (Gen2) and Pipelines in Microsoft Fabric Exercise - Create and use a Dataflow (Gen2) in Microsoft Fabric
This Renewables Technical Surveying training short two day course is specifically designed for individuals and companies that want to train themselves and their staff on exactly how to carry out Renewables Technical Site Surveying prior to any renewables installation measures, this includes for heating systems, solar systems and EV Charge point installations. The course is primarily aimed at Energy Suppliers, Equipment Manufacturers, Renewable Installers, Domestic Energy Assessors, Retrofit Assessors, Retrofit Co-ordinators, Renewables sales staff and suitable individuals with a basic level of knowledge in varying building structures, heating systems and varying renewable technologies.
Network automation course description This course is not a soft skills course covering the concepts of DevOps but instead concentrates on the technical side of tools and languages for network DevOps. Particular technologies focussed on are ansible, git and Python enabling delegates to leave the course ready to starting automating their network. Hands on sessions follow all major sections. More detailed courses on individual aspects of this course are available. What will you learn Evaluate network automation tools. Automate tasks with ansible. Use git for version control. Use Python to manage network devices. Use Python libraries for network devices. Network automation course details Who will benefit: Network engineers. Prerequisites: TCP/IP foundation for engineers. Duration 5 days Network automation course contents What is DevOps Programming and automating networks, networks and clouds, AWS, OpenStack, SDN, DevOps for network operations. Initial configuration Configuring SSH, ZTP, POAP. Hands on Initial lab configuration. Getting started with ansible The language, the engine, the framework. Uses of ansible, orchestration. The architecture, Controlling machines, nodes, Agentless, SSH, modules. Configuration management, inventories, playbooks, modules, roles. Hands on Installing ansible, running ad hoc commands. Ansible playbooks ansible-playbook, YAML, plays, tasks, handlers, modules. Playbook variables. Register module, debug module. Hands on Running playbooks. Ansible Inventories /etc/ansible/hosts, hosts, groups, static inventories, dynamic inventories. Inventory variables, external variables. Limiting hosts. Hands on Static inventories, variables in inventory files. Ansible modules for networking Built in modules, custom modules, return values. Core modules for network operations. Cisco and/ or Juniper modules. ansible_connection. Ansible 2.6 CLI. Hands on Using modules. Ansible templating and roles Configuration management, full configurations, partial configurations. The template module, the assemble module, connection: local, Jinja2 templates, variables, if, for, roles. Hands on Generating multiple configurations from a template. Network programming and modules Why use Python? Why use ansible? alternatives, ansible tower, Linux network devices. Programming with Python Scripting versus application development, Python interactive mode, Python scripts, Python 2.7 vs Python 3. A simple Python script. Variables, loops, control statements, operators. PEP style guide. Python IDEs. Hands on Simple Python programs. More Python programming Functions. Classes, objects and instances, modules, libraries, packages. Python strings, Python file handling, pip list, pip install, Hands on Python programming with pyping. Git Distributed version control, repositories, Git and GitHub, Alternatives to GitHub, Installing git, git workflows, creating repositories, adding and editing files, branching and merging, merge conflicts. Hands on working with Git. Python and networking APIs, Sockets, Telnetlib, pysnmp, ncclient, ciscoconfparse. Paramiko SSH and Netmiko Integrating Python and network devices using SSH. Netmiko, Netmiko methods. Hands on Netmiko. PyEZ Juniper, NETCONF, installing PyEZ, a first pyEZ script, pyEZ configuration management. Hands on Juniper configuration management with pyEZ. NAPALM What is NAPALM, NAPALM operations, getters, Replace, merge, compare, commit, discard. Hands on Configuration with NAPALM. Integrating ansible and NAPALM. Python and REST REST APIs, enabling the REST API. Accessing the REST API with a browser, cURL, Python and REST, the request library. Hands on Using a REST API with network devices.
Python training course description This Python course focusses on teaching Python for use in network automation and network DevOps. We focus on getting delegates up and running with Python and network automation as quickly as possible rather than making them great programmers. In other words we concentrate on enabling delegates to use network automation libraries such as netmiko, NAPALM and Nornir, and APIs such as NETCONF and RESTCONF rather than enabling delegates to produce object oriented programs. Hands on sessions use Cisco and Juniper devices. What will you learn Run Python programs. Read Python programs. Write Python programs. Debug Python programs. Automate network tasks with Python programs. Configure network devices with Python. Collect data from network devices with Python. Python training course details Who will benefit: Network engineers. Prerequisites: TCP/IP Foundation Duration 5 days Python training course contents What is Python? Programming languages, Why Python? Python in interactive mode, Python scripts, ipython, Python version 2 versus version 3. A simple Python script. Comments. Hands on Installing Python, Hello world. A network example On box vs off box Python. telnet, ssh, NETCONF, HTTP, APIs, manufacturers and API support, analysis of a simple telnetlib program. Hands on Using Python to retrieve the configuration from a network device. Using wireshark to analyse the actions. Python basics I/O, operators, variables and assignment, types, indentation, loops and conditionals. Hands on Modifying the telnet program, changing configurations on a network devices. Functions, classes and methods What are functions, calling functions, builtin functions, useful builtin functions, file handling, classes, objects, creating instances. Hands on Storing configurations in files, configuring devices from files, using an inventory file to work on multiple devices. Libraries and modules Modules, files and packages, import, from-import, Python standard library, other packages, pip install, executing other programs. Managing python libraries. Hands on Using pip, installing and using ipaddress, subprocess to access netsnmp. For the more advanced, using the sockets library. Paramiko and netmiko SSH, enabling SSH on devices, keys. Paramiko versus netmiko, example scripts. pexpect. Hands on Configuring VLANs from Python. pySNMP Gathering facts using previous methods, SNMP review, pySNMP GET, pySNMP and SNMPv3. easySNMP library. Hands on Walking a MIB from Python. NETCONF What is NETCONF? Enabling NETCONF on devices, A first ncclient script, device handlers, get_config, edit_config, copy_config, delete_config, commit, validate, pyEZ, utils_config, utils.sw. Hands on Configuration using ncclient and PyEZ. This session is expanded for those interesting in JunOS automation. Manipulating configuration files Builtin functions, string handling. Unicode. Sequences, strings, lists, tuples. Dictionaries. TextFSM. Regular expressions. JSON, YAML, XML, YANG, Jinja2, templates. Hands on Jinja2 templating with Python to configure network devices. NAPALM Getters, configuration operations, supported devices, NAPALM transport, Config-replace, Config-merge, Compare config, Atomic changes, rollback. Example NAPLAM scripts. Hands on Using NAPALM to gather facts, Using NAPALM for configuration management REST and RESTCONF What is REST, HTTP methods, GET, POST, cURL, Postman, Python requests library. RESTCONF, a RESTCONF example. Hands on Modifying a configuration using RESTCONF. Scapy What is scapy, Scapy in interactive mode, Scapy as a module. Hands on Packet crafting from Python. Warning Errors and exceptions, Exception handling, try, except. Memory management. Garbage collection. Context management, With. Hands on Improving Python code. Nornir What is Nornir? A network automation framework, inventories, connection management and parallelization. Nornir architecture and other libraires. Hands on Setting up nornir, nornir fact gathering, nornir tasks. Optional Writing your own functions, Writing your own classes. pyntc. Hands on Writing reusable code.
Duration 3 Days 18 CPD hours This course is intended for The primary audience for this course is an IT, facilities or data centre operations professional working in and around the data centre and having the responsibility to achieve and improve high-availability and manageability of the data centre. Overview After completion of the course the participant will be able to:? Understand the design life cycle of data centres and the stages involved? Discuss the data centre requirements in great level of detail with vendors, suppliers and contractors to ensure that these requirements are met? Validate design plans, quotes and offers proposed by vendors/contractors? Understand redundancy levels for both the data centre design/setup and maintenance? Understand the various building considerations such as bullet proofing, mitigation of seismic activity, fire ratings and thermal stability? Understand how to install a raised floor that meets requirements, avoiding misalignment, level differences and leakage? Understand how to read a Single Line Electrical Diagram to identify and avoid the most common design issues? Choose the correct UPS and parallel configuration, learn and avoid classic parallel installation mistakes? Understand how to calculate battery banks, validate offered configurations to ensure they meet requirements? Understand what distance to keep to avoid EMF issues for human safety and equipment disturbances? Understand the fundamental cooling setup, CFM, Delta-T and other important factors? Understand contamination factors and limitations? Understand full details of fire suppression options, how to calculate gas content and verify installations? Understand how to measure data centre energy efficiency and how to improve it The course will bring participants to the level of a suitable sparring partner with suppliers. They will be able to verify offers provided by vendors for correctness, effectiveness and efficiency. Data Centre Design/Life Cycle Overview Overview of the phases of a data centre life cycle Planning, re-alignment and continuous improvement Standards and Rating Level Definitions Rating level history Difference between Uptime and TIA-942 Rating level definitions Redundancy options (N+1), 2N, 2(N+1) Concurrent Maintainability/Compartmentalisation Example configurations Substation and feed requirements Maintenance options Operational processes guidelines/standards Skill development Building Considerations Building location considerations Floor and hanging loads requirements Fire rating for walls and glass Blast protection Bullet proofing Forced entry protection Advanced Raised Floor & Suspended Ceiling Raised floor installation guidelines Techniques to install a proper and leveled raised access floor Common mistakes Choosing the right tiles and their locations Seismic-mitigating floor constructions Choosing the correct suspended ceiling Advanced Power Power infrastructure layout; Formulas which you should know for the data centre Single Line Electrical diagrams; how to read to ensure key components are present for protection Over current protection devices (MCB/MCCB/VCB/ACB/Fuses) definitions and what to use where Earth Leakage devices (RCB/RCD/ELCB/GFCI/ALCI/RCBO), definitions and what to use where Sizing of protective components Lightning strikes and surge protection devices (TVSS/SPD), how they operate, where to use and how to install Power cabling and cable run considerations PDU/DB setup and minimum requirements Generators; Generator types: Standy/Prime/Continuous Component make up and functions Fuel storage and calculation Paralleling of gen-sets Generator room/area requirements UPS Systems; Required specifications for UPS systems How to read data sheets and select the correct UPS Requirements for parallel configurations and avoid pitfalls such as single point of failures How parallel installation should be done, classic mistakes made by installers and how to avoid these Harmonic Filters; Active/Passive filters and their application Battery Banks; Battery bank terminology Designing battery banks, how to calculate, and double check the battery bank to be installed Battery charging pitfalls and ensuring the right charger is being installed and used Using parallel battery banks; how to properly install them, limitations and risks when using batteries in parallel How to test batteries correctly and make decisions on cell/block or string replacement Battery casing choices; ABS, V0, V1, V2 Alternative energy storage; flywheel, re-usable cell, compressed air UPS, etc. Advanced Electro Magnetic Fields Sources of EMF Difference between single, three phase and bus-bar EMF Options available to measure EMF and how to interpret the results from single-axes and composite measurements Guidance on safe distance for equipment and humans Calculation of EMF attenuation factor for shielding material permeability and saturation factors Advanced Cooling Important definitions; dry-bulb, wet-bulb, dew-point, RH, sensible and latent heat Psychometric chart and ASHRAE recommendations Environmental class definitions and thermal specifications Temperature/humidity measurements guideline Heat dissipation methods Altitude impact on temperature intake to ICT equipment Floor plan setup for effective cooling Differences in tile surface and supporting structure and the air-flow performance impact Rack door construction and the flow performance impact Equipment Delta-T and its impact Optimising air flow Thermal units conversions Calculations for air volume displacement (CFM/CMH) Cooling capacity calculations Air-conditioning selection De- / humidifying options Air conditioning efficiency SHR impact on cost saving Efficiency indicator New cooling principle and techniques (Submerged, VSD/VRF/ECF/water- and air side economisers) Redundancy guidelines for air-conditioners avoiding classic misconceptions and mistakes for meeting ANSI/TIA-942 compliant designs Installation requirements Connections to fire panel and EPO Commissioning of air conditioners Set points and calibration CFD (Computational Fluid Dynamics) Advanced Fire Protection The fire triangle and elements to stop a fire Detection systems in detail (VESDA, VIEW, smoke sensors) Considerations for installation of sensors Proper testing of smoke sensors Water based systems i.e. deluge, wet-pipe, dry-pipe, pre-action and why most of them don't work and how to detect this Details on Inert and Halocarbon systems and how to select the correct system for your data centre How to calculate the gas content ensuring the appropriate level is installed to suppress the fire including safety considerations Other requirements for gas systems such as release times, hold times, pipe install requirements and other important factors Requirements for the fire detection panel Installation verification, methods, what to check and how New advanced fire suppression technologies Design and Install Scalable Networking Cabling System ANSI/TIA942 cabling structure topology ToR, EoR Design Intelligent patching systems Installation best practice such as routing, bending radius, separation from power, containment fill ratio, fiber link loss calculator, bonding and grounding requirement Standard for telecommunications labeling and administration Environmental Specifications and Contamination Control Acoustic noise effects, regulations, specifications and limits Data centre contaminations and classifications Measurements, standards and limits Preventive measures and avoidance Data Centre Efficiency Business drivers to go Green High-availability or Green? Green guidelines and standards How to measure it and what are acceptable numbers compared to the general industry PUE classes defined by Green Grid and issues with PUE Techniques for saving energy in all parts of the data centre i.e. application/system level, cooling, power distribution Mock ExamEXAM: Certified Data Centre Specialist
Learn how you can develop and deploy Java, Python, NodeJS Lambda Functions and manage them using Python and Boto3!