Duration 4 Days 24 CPD hours This course is intended for This course is for IT Professionals with expertise in designing and implementing solutions running on Microsoft Azure. They should have broad knowledge of IT operations, including networking, virtualization, identity, security, business continuity, disaster recovery, data platform, budgeting, and governance. Azure Solution Architects use the Azure Portal and as they become more adept they use the Command Line Interface. Candidates must have expert-level skills in Azure administration and have experience with Azure development processes and DevOps processes. Overview Recommend solutions to minimize costs Recommend a solution for Conditional Access, including multi-factor authentication Recommend a solution for a hybrid identity including Azure AD Connect and Azure AD Connect Recommend a solution for using Azure Policy Recommend a solution that includes KeyVault Recommend a solution that includes Azure AD Managed Identities Recommend a storage access solution Design an Azure Site Recovery solution Recommend a solution for autoscaling Recommend a solution for containers Recommend a solution for network security Recommend a solution for migrating applications and VMs Recommend a solution for migration of databases This course teaches Solutions Architects how to translate business requirements into secure, scalable, and reliable solutions. Lessons include design considerations related to logging, cost analysis, authentication and authorization, governance, security, storage, high availability, and migration. This role requires decisions in multiple areas that affect an overall design solution. Design a Compute Solution Recommend a Solution for Compute Provisioning Determine Appropriate Compute Technologies Recommend a Solution for Containers Recommend a Solution for Automating Compute Management Design a Network Solution Recommend a Solution for Network Addressing and Name Resolution Recommend a Solution for Network Provisioning Recommend a Solution for Network Security Recommend a Solution for iInternete Connectivity and On-Premises Networks Recommend a Solution for Automating Network Management Recommend a Solution for Load Balancing and Rraffic Routing Design for Migration Assess and On-Premises Servers and Applications for Migration Recommend a Solution for Migrating Applications and VMs Recommend a Solution for Migration of Databases Design Authentication and Authorization Tips for Identity and Access Management Recommend a Solution for Multi-Factor Authentication Five Steps for Securing Identity Infrastructure Recommend a Solution for Single-Sign On (SSO) Recommend a Solution for a Hybrid Identity Recommend a Solution for B2B Integration Recommend a Hierarchical Structure for Management Groups Design Governance Recommend a Solution for using Azure Policy Recommend a Solution for using Azure Blueprint Design a Solution for Databases Select an Appropriate Data Platform Based on Requirements Overview of Azure Data Storage Recommend Database Service Tier Sizing Dynamically Scale Azure SQL Database and Azure SQL Managed Instances Recommend a Solution for Encrypting Data at Rest, Transmission, and In Use Select an Appropriate Storage Account Understanding Storage Tiers Recommend a Storage Access Solution Recommend Storage Management Tools Design Data Integration Recommend a Data Flow Recommend a Solution for Data Integration Design a Solution for Logging and Monitoring Azure Monitoring Services Azure Monitor Design a Solution for Backup and Recovery Recommend a Recovery Solution for Hybrid and On-Premises Workloads Design and Azure Site Recovery Solution Recommend a Solution for Recovery in Different Regions Recommend a Solution for Azure Backup Management Design a Solution for Data Archiving and Retention Design for High Availability Recommend a Solution for Application and Workload Redundancy Recommend a Solution for Autoscaling Identify Resources that Require High Availability Identify Storage Tpes for High Availability Recommend a Solution for Geo-Redundancy of Workloads Design for Cost Optimization Recommend Solutions for Cost Management Recommended Viewpoints for Minimizing Costs Design an Application Architecture Recommend a Microservices Architecture Recommend an Orchestration Solution for Deployment of Applications Recommend a Solution for API Integration Design Security for Applications Security for Applications and Services Recommend a Solution using Key Vault Recommend Solutions using Azure AD Managed Identities
A webinar focusing on how to keep active. Do you have Huntington's disease and would like to be able to keep as active as possible? Or do you care for someone who has Huntington's disease and are interested in encouraging activity? A new resource 'Keeping Active with Huntington's Disease' has been developed with carers and has tips and hints on planning activities with lots of examples of suitable exercises. Dr Una Jones from Cardiff University will take you through how to use the resource and answer any questions on keeping active. This FREE webinar will be suitable for family members and professionals. For more information on what information we collect and how we use it when booking onto one of our events, please see our privacy policy on our website.
Duration 5 Days 30 CPD hours This course is intended for Penetration Testers Microsoft Administrator Security Administrators Active Directory Administrators Anyone looking to learn more about security Overview The person who carries this certification should be able to analyze an organization's existing systems then plan and create an incident handling system that will prevent, detect, and respond to cyber attacks The Certified Incident Handling Engineer course, C)IHE, is designed to help Incident Handlers, System Administrators, and Security Engineers understand how to plan, create and utilize their systems. Prevent, detect and respond to attacks through the use of hands-on labs in our exclusive Cyber Range. With this in-depth training, you will learn to develop start to finish processes for establishing your Incident Handling team, strategizing for each type of attack, recovering from attacks and much more. Course Outline Incident Handling Explained Incident Response Policy, Plan and Procedure Creation Incident Response Team Structure Incident Response Team Services Incident Response Recommendations Preparation Detection and Analysis Containment, Eradication and Recovery GRR Rapid Response Request Tracker for Incident Response Post Incident Activity Incident Handling Checklist Incident Handling Recommendations Coordination and Information Sharing
How can the Huntington's Disease Association help you? Join us to find out about the support we can offer. Finding the right help at the right time can be daunting for those affected by Huntington's disease....and we're here to help. This webinar is for anyone who would like to find out more about support available from the Huntington's Disease Association. It is open to family members, friends, health and social care staff and anyone else keen to learn about what we do. By the end of the session you will understand the work of our advisory service and youth engagement teams, our education programme, how to access information, local support and much more. For more information on what information we collect and how we use it when booking onto one of our events, please see our privacy policy on our website.
A key-worker role is to provide the best individual care for people they support and carry out effective assessment and support planning. Staff need to know how to motivate individuals to achieve their personal goals and understand how to advocate on their behalf. Staff also need to know how to improve communication between colleagues, individuals, other professionals, and contribute to service improvement.
Duration 1 Days 6 CPD hours This course is intended for This course is intended for IT Asset Managers and other professionals involved in Asset Management, strategic planning, security programs and those affected or influenced by ITAM and security initiatives. The mission of IAITAM?s CAMSE course is to maximize the contribution of IT Asset Management professionals to the information security and physical security of the organization by bridging the gap between ITAM and IT security processes while incorporating security strategies throughout the ITAM policies, processes and procedures so that ITAM enhances the security program and improves the applicable governance. This course includes the comprehensive online examination necessary for achieving CAMSE Certification. Course Outline Scope of IT Security & ITAM Threat Prevention vs. Threat Protection Decentralized vs. Centralized Security The IT Security Plan ITAM?s Role in Risk Management The 12 KPAs & Security Program Management & Security Communication & Education Management & Security Policy Management & Security Acquisition Management & Security Asset Identification Management & Security Disposal Management & Security Project Management & Security Documentation Management & Security Financial Management & Security Legislation Management & Security Compliance Management & Security Vendor Management & Security Assessing Asset Risk Level Program Issues by Asset Type ITAM Program Assessment for Security
Duration 2 Days 12 CPD hours This course is intended for This course is intended for SQL Server administrators who work in a Windows network environment. At least one year of experience administering SQL Servers and using PowerShell is recommended. Overview After completing this course, students will be able to: •Install and Configure SQL Server and all its components using PowerShell •Manage day-to-day SQL Server Administration with PowerShell •Maintain the SQL Server environment using PowerShell scripting and programming options This course provides candidates with the knowledge and skills needed to use PowerShell for SQL Server administration. Students will learn how to manage day-to-day and scheduled maintenance tasks. Install and Configure SQL Server with PowerShell Install SQL Server Configure Database Settings Configure SQL Server Settings Configure SQL Server Policy-Based Management Lab 1: Configuring SQL Server with PowerShell Administering SQL Servers with PowerShell Managing Users and Roles Managing Database Performance Managing Database Availability Managing SQL Server Features Lab 1: Administering SQL Servers with PowerShell Maintaining SQL Server with PowerShell Managing Backups and Restores Maintaining Database Integrity and Performance Monitoring and Auditing Task Automation Generating Reports Lab 1: Maintaining SQL Servers with PowerShell
Duration 3 Days 18 CPD hours This course is intended for This course is ideal for developers and engineers including: Cloud administrators Cloud solution architects Customer sales engineers DevOps engineers Sales engineers Systems engineers Technical solutions architects Overview After completing the course, you should be able to: Explain business and technical challenges of going to the cloud Understand benefits of an application-centric hybrid cloud multicloud management platform Navigate Cisco CloudCenter Suite architecture Understand Cisco CloudCenter Suite administrative capabilities including cloud management, multitenancy, governance, and policy enforcement Describe application lifecycle management and provisioning in cloud Describe how to use Cisco CloudCenter Suite to manage the workloads in multicloud The course, Mulitcloud Management with Cisco© CloudCenter Suite (CLDCCS) v1.0 is an intensive training course that teaches you to securely design, automate, and deploy applications across multiple clouds while optimizing cost and compliance with comprehensive reporting, visibility, and policy-enforcement. Through a combination of lessons with hands-on lab exercises, you will learn to simplify the lifecycle management of multicloud applications, workflows, and their infrastructure Understanding Cloud Transitions Overview of Traditional IT Introducing Cisco CloudCenter Suite Cisco CloudCenter Suite Definition Setting Up Cisco CloudCenter Workload Manager Artifact Repository Overview and Configuration Understanding User Administration and Multitenancy in Cisco CloudCenter Suite Cisco CloudCenter Suite User Roles Grasping Application Modeling in Cisco CloudCenter Workload Manager Model an Application Identifying Resource Placement Callouts and Lifecycle Actions in Cisco CloudCenter Workload Manager Resource Placement and Validation Callout Understanding Application Deployment Framework in Cisco CloudCenter Workload Manager Workload Manager Application Parameters Exploring Application Services in Cisco CloudCenter Workload Manager Application Services Framework Integrating Cisco CloudCenter Workload Manager with Cisco Application-Centric Infrastructure Configure CloudCenter Workload Manager for Cisco ACI Introducing Application Management in Cisco CloudCenter Workload Manager Cisco CloudCenter Workload Manager Actions Library Exploring Advanced Features in CloudCenter Workload Manager Scheduling an Application in Cisco CloudCenter Workload Manager Comprehending Policies and Tagless Governance in CloudCenter Workload Manager Cisco CloudCenter Workload Manager Policies Introducing Action Orchestrator and Cost Optimizer in Cisco CloudCenter Suite Action Orchestrator in Cisco CloudCenter Suite Lab outline Explore Cisco CloudCenter Suite Admin GUI Discover Cisco CloudCenter Workload Manager GUI Create Cisco CloudCenter Workload Manager Repository Design Deployment Environments in Cisco CloudCenter Workload Manager Create Images in Cisco CloudCenter Workload Manager Form Cost Bundles and Usage Plans in Cisco CloudCenter Workload Manager Explore Multitenancy in Cisco CloudCenter Suite Model and Deploy Two-Tier Application Model and Deploy Multitier Application Perfect and Arrange Multitier Application on Docker Model and Deploy Application on Kubernetes Cloud Deploy Application in Hybrid Cloud Arrange Application Using Automated Resource Placement Perform Lifecycle Actions on Deployed Applications Create User-Defined Parameters and Explore Macros Understand Application Services in Cisco CloudCenter Workload Manage Benchmark, Schedule, and Share Applications in Cisco CloudCenter Workload Manager Continuous Integration/Continuous Delivery (CI/CD) Project Board Manage Policies in Cisco CloudCenter Workload Manager Manage System Tags and Governance in Cisco CloudCenter Workload Manager Explore Action Orchestrator Explore Cost Optimizer Additional course details: Nexus Humans Cisco Multicloud Management with Cisco CloudCenter Suite (CLDCCS) v1.0 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Multicloud Management with Cisco CloudCenter Suite (CLDCCS) v1.0 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Learn the Art and Science of EFT (Emotional Freedom Techniques or “The Tapping Technique”) in this EFT workshop and join millions worldwide who are learning this life-changing technique. EFT, commonly referred to as Tapping, has gained rapid popularity because it has been demonstrated to quickly and effectively resolve dysfunctional feelings, thoughts, behaviors and beliefs which can lead to challenges in relationships, health, work and more. Basically, if there are negative emotions and stress involved, EFT may well be able to resolve those aspects that can lead to significant relief and ease in one’s life. Learn to implement this powerful mind-body approach which is supported by peer-reviewed research, drawing from the fields of interpersonal neurobiology, neuroplasticity models and the field of epigenetics. If you are ready to transform your health, your relationships and your vision of who you truly are, then come join us to learn EFT Tapping techniques. If your life is grounded in being of service to others, then EFT will quickly become your tool of choice. Whether you are curious about EFT for self-help or you are in the healing/helping professions, this training will give you confidence in the art of its delivery. From the professional working with clients to the laymen looking for self-application, everyone walks away having the skills to succeed with this extraordinary healing modality. This online format did not at all hinder the delivery of the content and technique whatsoever and we were able to do everything that we could have done in person. Alina and Craig created a very safe space, gave us plenty of demos, lots of practice time and welcomed all of our questions. They also broke up the day with ample breaks and Eden energy exercises to help avoid screen fatigue. Alina and Craig are experts in their field and top-notch EFT instructors. I highly recommend their online courses.— CARSON HILL EFT LEVEL 1 The Basics The preparation for the EFT Level 1 includes approximately 3 hours of advance work, including watching several short online videos and the reading of 2 articles that explore both the history of EFT and the scientific premises for how EFT works. Note that last minute signups will not be allowed without contacting us due to this requirement. EFT Level 1, The Basics, is the foundation of any EFT training. It covers the core aspects of EFT with a focus on how you can use tapping as a self help tool and how to teach your clients how to apply it as a self-regulating technique. Learn how to apply EFT for issues related to physical symptoms, for cravings and addictions and more. See below for an outline of materials covered. An outline of subject matter covered in this first day include: The Science Behind EFT Understanding Shifting Aspects The Importance of Being Specific Psychological Reversal & Secondary Gain Cognitive Belief Shifts How Traumatic Events Imprint on the Brain Finding the Right Words to Use An introduction to both Tell the Story and the Movie Techniques for working with traumatic events The Movie Technique Working with Pain and Physical Symptoms EFT for Cravings and Aspects of Addictions Participants who take this program will be issued a Certificate of Attendance that they have completed EFT Level 1. This is the first step along the path to obtain Certified EFT Practitioner through EFT International, but should not be put forth as a certification in itself. I wholeheartedly recommend training in EFT with Craig and Alina. I recently took their EFT level 1 and 2 live online training and it was a fantastic experience. The virtual environment in Zoom was great and everything worked perfectly, and I learned so many things. I appreciate the way they break down important concepts and share their many years of experience, and the emphasis they put on generating and maintaining safety and rapport with the client at all times.— BRUNO SADE, PSYCHOLOGIST EFT LEVEL 2 Foundational Skills The two-day EFT Level 2 workshop is designed for those practitioners who have taken the pre-requisite EFT Level 1 and are either in practice or preparing to be and will be able to apply EFT when working with clients. This may include but not be limited to social workers, counselors, therapists, health care practitioners, life coaches and those who may be wishing to pursue EFT certification. It reviews and expands upon the basic aspects of the Art and Science of EFT taught in the EFT 1 course. Additional techniques are taught to expand your repertoire and offer skillful and effective ways of working with different client populations and expanding your ability to work with deeper issues. Of course, as in all EFT Tapping Training workshops, new material is presented using a variety of learning styles including partnered teaching methods, demonstrations, paired and small group experiential applications, video examples and more to ensure that no one walks away without fully understanding everything that is taught. Most importantly, this EFT Level 2 workshop will hone your practice skills. Greater attention and time will be spent on personal observation to assist you in mastering the techniques learned. Enhanced instruction on asking key questions for uncovering core issues will be provided. The following subject matter will be taught in Level 2 with an emphasis on personal practice of techniques learned with direct observation and support from the trainers: The Gentle Techniques for Intense Issues including Sneaking Up on the problem, Tearless Trauma and the somato-emotional process of Chasing the Pain (Sensation) Understanding the Nature of and working with Traumatic Events Clearing Limiting Beliefs Questions for Uncovering Core Issues Core Issues and Physical Symptoms Working over the Telephone or Internet EFT in Groups Using EFT with Children Scope of Practice, Informed Consent and the EFT Ethics Code Participants who take this program will be issued a Certificate of Attendance that they have completed EFT Level 2. This is the second instructional step along the certification path for EFT International Accredited Certified EFT Practitioner, but should not be put forth as a certification in itself. Read about EFT and course descriptions Presenting Certified Trainers Alina Frank and Craig Weiner, DC Cost For the combination three day Level 1 and 2 combined training, the tuition is $799 ($749 early bird special if purchased 30 days prior to the workshop start date). Both EFT Levels 1 and 2 are pre-requisites for EFT International EFT certification. Location Online Hours Both EFT Level 1 and 2 training courses begin promptly at 9 am with registration beginning at 8:30 am Seattle/Los Angeles time zone. A 15 minute break is provided in the morning and afternoon. A 90 minute lunch break is offered beginning at approximately 12:30 pm. The class ends each day at 6 pm. EFT International Certification Process Attendance and completion of this training in no way constitutes “certification” and no attendee should consider themselves or promote themselves as a Certified EFT Practitioner based solely upon attendance of this training. All the requirements for completing certification will be discussed during the workshop and can be found on our EFT Certification page. Alina Frank and Dr Craig Weiner have taught and mentored thousands of individuals and professionals throughout the North America and Europe and are sought after speakers and presenters in the field of EFT instruction and EFT practice development and are EFT International Accredited Master Trainers and EFT International Supervising Mentors. CEUs, Certificates & Letters of Completion Approved Continuing Education Hours 24 CEUs have been pre-approved for NY LMHCs and may be available through 716CEU, LLC which is recognized by the New York State Education Department’s State Board for Mental Health Practitioners as an approved provider of continuing education for licensed mental health counselors. #MHC-0241. Please inquire for further details regarding whether this specific training will have CEs offered and any requirements and costs involved for receiving CEs. 24 CE hours for NY Social Workers have been pre-approved and may be available through Tree of Hope Counseling, an approved NYS Continuing Education Contact Hours (CEU) provider for Social Workers (#SW0322). Please inquire for further details regarding whether this specific training will have CEs offered and any requirements and costs involved for receiving CEs. The EFT Tapping Training Institute, with Craig Weiner and Alina Frank as trainers, have been pre-approved for 24 continuing education credit hours for online Emotional Freedom Techniques Level 1-2 training for the Canadian Counselling and Psychotherapy Association. Members of CCPA will receive transcripts at no cost listing all attended events assessed as Continuing Education Credit. Non‐members must attach a cheque for $30.00 payable to CCPA to have CEC’s recorded and to have a transcript issued. Every person who fully attends the workshop training will receive a completion certificate with the course hours listed. Certificates of Completion Official Letters of Completion are available upon request for courses. They are signed by our Trainers, has the attendees name, date of completion and the number of educational hours. The letter will be sent to the course participant as a PDF email attachment. It is the responsibility of each participant to submit the letter to the appropriate certifying board in order to determine if they will receive any type of credit. Certificates of Completion for Courses Participants of the following courses offered by the EFT Tapping Training Institute may receive a Certificate of Completion upon graduation (provided in a PDF format and sent via email): EFT Levels 1-2 EFT Level 3 Matrix Reimprinting Foundational Training Other courses may be able to provide either a Certificate of Completion or a Letter of Completion upon graduation. BIPOC Scholarship Program Please visit our Scholarship Guidelines & Application page for details. Cancellation Policy A complete refund, minus $150 administration fee, is given up to 3 weeks (21 days) prior to workshop’s start date. If cancellation occurs for any reason within the 3 weeks prior to the event, the student may apply the tuition paid towards any future EFT or Matrix Reimprinting workshops offered by us. AS THERE IS MATERIAL TO REVIEW PRIOR TO THE FIRST DAY OF TRAINING, REGISTRATION CLOSES 24 HOURS BEFORE THE START OF THE TRAINING SO THAT YOU CAN REVIEW THE MATERIALS IN ADVANCE. IF YOU DO NOT RECEIVE THE LINK OF THIS MATERIAL VIA EMAIL WITHIN 24 HOURS OF REGISTERING, PLEASE CONTACT US IMMEDIATELY.
Duration 2 Days 12 CPD hours This course is intended for Security professionals, System engineers, channel partners, service partners, and end users with at least one year of experience in implementing IT security technologies (Network, Applications, and Systems). Overview This course will enable students to configure, monitor, manage, and optimize the SonicWall Network Security firewall appliances running the new SonicOS 7 to effectively defend against limitless network and cyberthreats and implement SonicWall Boundless Cybersecurity safeguards for seamless protection. Upon completion of the course, students will be able to configure the SonicWall firewall for Secure and Remote Connectivity, Network Optimization, and Advanced Threat Protection. The SonicWall Network Security Administrator (SNSA) for SonicOS 7.0curriculum provides students the required background, knowledge, and hands-on experience to begin designing, implementing, and troubleshooting SonicWall Network Security products. SonicOS 7 is SonicWall?s brand new and most advanced security operating system and is at the core of its latest physical and virtual firewalls, including models from the TZ, NSv, NSa and NSsp Series. SonicOS 7.0 features advanced security, simplified policy management, and critical networking and management capabilities for distributed enterprises and small- to medium-sized businesses with SD-branch support. Course Outline Setting up Basic Firewall Components Unified Threat Management Secure Access Deep Packet Inspection for SSL (DPI-SSL) Content Filtering Services Application Control Scalability and Reliability SD-WAN High Availability Troubleshooting Tools