• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

126 Privacy courses in Liverpool delivered Live Online

Cybersecurity Maturity Model Certification (CMMC): Certified Professional

By Nexus Human

Duration 4.375 Days 26.25 CPD hours This course is intended for This course provides a jump start on learning material that relates to the CMMC program, and to the planned Certified Professional (CP) certification in particular. It discusses the CMMC program, the current CMMC Model, and other CMMC materials as they exist today. The course may be of interest to individuals who wish to pursue the CMMC-CP certification when it is released. It may also be useful to stakeholders in organizations who will be involved in CMMC assessments, and who wish to gain a general understanding of the program and its requirements for their business planning purposes Overview In this course, you will examine the current CMMC model (Version 1.02), framework, context, and application within the DoD, as well as the expectations and requirements that will be imposed upon organizations that do business with the DoD. It will also help you to identify threats to cybersecurity and privacy within an IoT ecosystem and implement appropriate countermeasures. You will gain the skills to: · Identify risks within the defense supply chain and the established standards for managing them. · Describe how the CMMC model ensures compliance with federal acquisition regulations. · Identify responsibilities of the CMMC Certified Professional, including appropriate ethics and behavior. · Identify regulated information and establish the Certification and Assessment scope boundaries for evaluating the systems that protect that regulated information. · Evaluate OSC readiness and determine the objective evidence you intend to present to the assessor. · Use the NIST 800-171A and CMMC Assessment Guide to assess objective evidence for processes and practices. · Implement and evaluate practices required to meet CMMC maturity level 1. · Implement and evaluate processes and practices required to meet CMMC maturity level 2. · Implement and evaluate processes and practices required to meet CMMC maturity level 3. · Identify processes and practices required to meet CMMC maturity levels 4 and 5. · Work through the logistics of a CMMC assessment, including planning for and conducting the assessment, as well as any follow-up processes, such as remediation and adjudication. The Cybersecurity Maturity Model Certification (CMMC), managed by the CMMC Accreditation Body (CMMC-AB), is a program through which an organization's cybersecurity program is measured by their initial and ongoing compliance with applicable cybersecurity practices as well as their integration of corresponding policies and plans into their overall business operations. By Fiscal Year 2026, all organizations providing products or services to the United States Department of Defense (DoD) must obtain at least a Maturity Level 1 certification under this program. Managing Risk within the Defense Supply Chain Topic A: Identify Threats to the Defense Supply Chain Topic B: Identify Regulatory Responses Against Threats Ensuring Compliance through CMMC Topic A: Identify Limitations of Self-Certification Topic B: Identify Benefits of CMMC Topic C: Describe the CMMC Model Architecture Performing the General Responsibilities of a CMMC CP Topic A: Identify Responsibilities of the CMMC CP Topic B: Demonstrate Appropriate Ethics and Behavior Identifying and Scoping Regulated Information Topic A: Identify Regulated Information Topic B: Establish the Certification and Assessment Scope Boundaries Initiating the Assessment Process Topic A: Evaluate Readiness Topic B: Determine Objective Evidence Assessing Objective Evidence Topic A: Assess the Practices Using the CMMC Assessment Guides Topic B: Assess the Processes Using the CMMC Assessment Guide Level 3 Implementing and Evaluating CMMC Level 1 TTopic A: Maturity Level 1 Domains and Practices Topic B: Determine Scope Boundaries at Maturity Level 1 Topic C: Perform a Maturity Level 1 Gap Analysis Topic D: Perform a Maturity Level 1 Evidence Validation Implementing and Evaluating CMMC Levels 2 and 3 Topic A: Process Maturity Requirements for CMMC Levels 2 and 3 Topic B: Maturity Level 2 Practices Topic C: Maturity Level 3 Practices Identifying CMMC Levels 4 and 5 Topic A: Maturity Level 4 Processes and Practices Topic B: Maturity Level 5 Processes and Practices Working Through a CMMC Assessment Topic A: Define the Assessment Logistics Topic B: Resolve Assessment Related Issues Appendix A: Additional Documentation the CP Should Study

Cybersecurity Maturity Model Certification (CMMC): Certified Professional
Delivered OnlineFlexible Dates
Price on Enquiry

Know Your Customer (KYC)

By NextGen Learning

Know Your Customer (KYC) Course Overview: The "Know Your Customer (KYC)" course is designed to provide learners with a comprehensive understanding of KYC processes, their relevance in financial services, and the associated regulatory requirements. Covering vital topics such as customer identification, anti-money laundering (AML) strategies, and the protection of data privacy, this course equips learners with the knowledge needed to navigate the complex landscape of KYC compliance. By the end of the course, learners will be able to apply these concepts in their daily professional roles, ensuring adherence to industry regulations and maintaining robust compliance standards. Course Description: This course delves deeper into the principles of KYC, focusing on customer due diligence, risk management, and anti-money laundering (AML) practices that safeguard organisations against financial crimes. Learners will explore the relevant regulations governing KYC in the UK and the methods used to conduct thorough customer verification. Additionally, the course provides insights into data privacy requirements, helping businesses mitigate risks and comply with industry standards. With interactive learning modules and assessments, this course ensures that participants gain practical knowledge, enhance their professional skills, and build a strong foundation in KYC and AML compliance. Know Your Customer (KYC) Curriculum: Module 01: Introduction to KYC Module 02: Customer Due Diligence Module 03: AML (Anti-Money Laundering) Module 04: KYC, AML, and Data Privacy Regulations for Business Operations in the United Kingdom Module 05: Regulations to be Complied by Industries Module 06: Methods for Carrying Out KYC and AML and the Future of KYC Compliance (See full curriculum) Who is this course for? Individuals seeking to understand KYC compliance Professionals aiming to enhance their knowledge of financial regulations Beginners with an interest in finance and regulatory compliance Anyone looking to advance their career in risk management or compliance Career Path Compliance Officer Anti-Money Laundering (AML) Specialist Risk Management Consultant KYC Analyst Financial Compliance Advisor

Know Your Customer (KYC)
Delivered OnlineFlexible Dates
£7.99

KYC, AML, & GDPR Training

By NextGen Learning

KYC, AML, & GDPR Training Course Overview This KYC, AML, and GDPR Training course offers a comprehensive introduction to the regulatory frameworks governing financial institutions and businesses. Learners will gain in-depth knowledge of Know Your Customer (KYC) protocols, Anti-Money Laundering (AML) procedures, and GDPR compliance, understanding their importance in maintaining legal and ethical business operations. The course equips professionals with the necessary skills to navigate the regulatory landscape, safeguard businesses against financial crime, and ensure compliance with data privacy laws. By the end of the course, learners will be well-prepared to apply their knowledge in real-world business environments, contributing to secure and compliant operations. Course Description This course delves into the key principles of KYC, AML, and GDPR, exploring their relevance across different industries. Learners will understand the processes involved in customer due diligence, how to identify and prevent money laundering, and how businesses must comply with data privacy regulations. The course provides a structured learning experience, focusing on the practical application of compliance measures, exploring case studies, and providing insights into current and future trends in the industry. Upon completion, participants will possess the expertise to implement these regulations within their organisations, mitigate risks, and contribute to a culture of compliance. KYC, AML, & GDPR Training Curriculum Module 01: Introduction to KYC Module 02: Customer Due Diligence Module 03: AML (Anti-Money Laundering) Module 04: KYC, AML, and Data Privacy Regulations for Business Operations in the United Kingdom Module 05: Regulations to be Complied by Industries Module 06: Methods for Carrying out KYC and AML and the Future of KYC Compliance (See full curriculum) Who is this course for? Individuals seeking to understand financial regulations and compliance. Professionals aiming to develop their knowledge of KYC, AML, and GDPR in their career. Beginners with an interest in the financial services or regulatory compliance industry. Business owners or managers who want to ensure their organisation’s compliance. Career Path Compliance Officer Anti-Money Laundering Specialist KYC Analyst Data Protection Officer Regulatory Compliance Consultant Risk Management Professional

KYC, AML, & GDPR Training
Delivered OnlineFlexible Dates
£7.99

Microsoft Teams for the Remote Business User

By Nexus Human

Duration 0.5 Days 3 CPD hours This course is intended for This course is intended for people who have made the transition to remote working and now wish to fully leverage Microsoft Teams for their day to day business needs. Done in a show and Tell style, this course is designed to give business users a thorough understanding of how to use Teams features from an organizational perspective. Features such as: how to manage communications, file sharing for collaboration, calendar events, conference calling, search functions and other daily tasks. Prerequisites: To ensure your success in this course, you should have end-user skills with any current version of Windows, including being able to open and close applications, navigate basic file structures, and manage files and folders. Overview Overview of Teams Permissions, Access & Restrictions Team Management (Power Users) Team Management (End Users) Communication and Collaboration Searching and Activity Sharing Files Customizing your settings Meetings and Calls Done in a show and Tell style, this course is designed to give business users a thorough understanding of how to use Teams features from an organizational perspective. Overview What is Microsoft Teams? How to Access Microsoft Teams Etiquette for using teams Integration and Storage Capabilities Interface Permissions, Access & Restrictions Owner, Member & Guest Team restrictions Channel restrictions Call Restrictions Team Management (Power Users) Create a Team Access administrator settings Add/delete members to a Team Add/delete a guest user Create and manage Channels Create and manage Private channels Customize Channel tabs Creating Tags Team Management (End Users) Getting your Channel email address Integration with Outlook Leave a Team or Channel Communication and Collaboration Team Conversations Using the New Conversation panel Replying to a conversation Using the interactive options Deleting and editing a conversation Turn off notifications for a conversation Using Mentions and Tags Saving messages Accessing your saved messages Accessing recent chats Create a new Chat for one-2-one Create a new chat for group chats Read Receipts Pop out Chats Searching and Activity Use the search tool to find Specific messages Files People Accessing your Activity Accessing your Feed Filtering your feed and activity Sharing Files Uploading files Viewing files Attaching files to a conversation Sharing a link to a file Edit and Collaborate on files Create files Open files in Teams Online Desktop SharePoint Add a file to a tab Share file outside your organization Customizing your settings Filter Teams Hide channels Channel notifications Channel analytics Changing your Status Setting your status message Controlling the general user settings Controlling your privacy settings Controlling your personal notification settings Controlling your device settings (headphones and microphone) Controlling your call settings Setting your Voicemail message Controlling your app permissions Meetings and Calls Accessing your calendar Calendar views Create a Teams meeting Meeting options Meeting requests and RSVP options Join a Teams meeting Copy join information Create a meeting from Outlook Using the Meet Now option Sharing your screen Changing your background image Adding more people to a meeting Meetings menu Download meeting attendees End meetings for everyone (Organizer only) Accessing your Contacts Accessing your Voicemail Accessing your call history Additional course details: Nexus Humans Microsoft Teams for the Remote Business User training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Microsoft Teams for the Remote Business User course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Microsoft Teams for the Remote Business User
Delivered OnlineFlexible Dates
Price on Enquiry

Hyperledger Training - Developing on Hyperledger Fabric

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Developers Administrators Overview Understand why Blockchain is needed and where Explore the major components of Blockchain Learn about Hyperledger Fabric v1.1 and the structure of the Hyperledger Architecture Lean the features of the Fabric model including chaincode, SDKs, Ledger, Security and Membership Services Perform comprehensive labs on writing chaincode Explore the architecture of Hyperledger Fabric v1.1 Understand and perform in depth labs on Bootstrapping the Network Gain a detailed understanding of the benefits, components and architecture of Hyperledger Composer Learn Hyperledger Explorer and Hyperledger Composer Playground Perform comprehensive labs to integrate/develop an application with Hyperledger Fabric running a smart contract Build applications on Hyperledger Fabric v1.1 This instructor-led Hyperledger training course is designed for developers and administrators who want to take a comprehensive deep dive on Hyperledger Fabric and Hyperledger Composer. This Hyperledger training course has several comprehensive labs, giving you real world experience.In 3 days, you will learn the need for blockchain applications, where blockchain is used, and about Hyperledger Fabric, the open source framework for developing blockchain applications and solutions with a modular architecture. Introduction to Blockchain Introduction to Blockchain What is Blockchain Types of network Public network Permissioned network Private network Need for Blockchain Components of Blockchain Consensus Provenance Immutability Finality Where can Blockchain be used Example on Blockchain How Blockchain Works How Blockchain Works Structure of Blockchain Block Hash Blockchain Distributed Lifecycle of Blockchain Smart Contract Consensus Algorithm Proof of Work Proof of Stake Practical Byzantine Fault Tolerance Actors of Blockchain Blockchain developer Blockchain operator Blockchain regulator Blockchain user Membership service provider Building A Small Blockchain Application Introduction to Hyperledger Fabric v1.1 Introduction to Hyperledger What is Hyperledger Why Hyperledger Where can Hyperledger be used Hyperledger Architecture Membership Blockchain Transaction Chaincode Hyperledger Fabric Features of Hyperledger Fabric Installation of prerequisite Getting Started With Fabric Model The Fabric Model Features of Fabric Model Chaincode SDKs Ledger Privacy through channels Security and Membership services Assets Consensus Components of Fabric Model Peer Orderer Certificate Authority Building your network Chaincode Chaincode Chaincode API How to write a Chaincode Lab Work Architecture of Hyperledger Fabric v1.1 Architecture of Hyperledger Fabric Transaction Ledger Nodes Peer Endorser Ordering Nodes Channels Certificate Authority Transaction Flow Lab Work Bootstrapping Bootstrapping the Network Introduction Lab Work Task 1 - Generate the crypto material for the various participants. Task 2 - Generate the genesis block for the Orderer node and start ordering service (solo node). Task 3 - Generated the configuration transaction block to create a new channel. Task 4 - Sign the configuration block and create the new channel. Task 5 - Make peers of all the organizations join the channel that we created in Task 4 Introdcution to Hyperledger Explorer Introduction To Hyperledger Explorer Block Details Peer List Chaincode List Transaction Details Installation of Hyperledger Explorer Starting the Explorer App Introduction to Hyperledger Composer Introduction Components of Hyperledger Composer Benefits of Hyperledger Composer Key Concepts Hyperledger Composer Solution Installation Hyperledger Composer Playground Hyperledger Composer Playground Introduction Playground Overview Lab Work Additional course details: Nexus Humans Hyperledger Training - Developing on Hyperledger Fabric training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Hyperledger Training - Developing on Hyperledger Fabric course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Hyperledger Training - Developing on Hyperledger Fabric
Delivered OnlineFlexible Dates
Price on Enquiry

Blockchain - An Overview for Business Professionals

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for Technical leaders Overview This course provides general overview of Blockchain technology and is specifically designed to answer the following questions:What is Blockchain? (What exactly is it?)Non-Technical Technology Overview (How does it work?)Benefits of Blockchain (Why should anyone consider this?)Use Cases (Where and for what apps is it appropriate?)Adoption (Who is using it and for what?)Implementation (How do I get started?)Future of Blockchain (What is its future?) This instructor-led 1 day Blockchain Architecture training is for technical leaders who need to make decisions about architecture, environment, and development platforms. What is Blockchain? A record keeping system Trust Decentralization Trustless environment How does Blockchain work? Announcements Blocks Nodes Chaining Verification Consensus Scalability Privacy Crypto Hashing Digital Fingerprinting PoW vs PoS Types of Blockchains Public vs Private Open vs closed Smart Contracts Blockchain as History Tokens / Coins Gas How is Blockchain different from what we have today? Decentralized Peer-to-peer architecture Software vs Firmware Database vs Blockchain Distributed database or other technology? Data Sovereignty Group Consensus What are Use Cases for Blockchain? Use Case Examples Currency Banking Services Voting Medical Records Supply Chain / Value Chain Content Distribution Verification of Software Updates (cars, planes, trains, etc) Law Enforcement Title and Ownership Records Social Media and Online Credibility Fractional asset ownership Cable Television billing High fault tolerance DDoS-proof Public or Private Blockchain? Who are the participants? What does a Blockchain app look like? DApp Resembles typical full stack web application Any internal state changes and all transactions are written to the blockchain Node.js IDE Public Blockchain visibility Private Blockchain solutions Oracles How do I design a Blockchain app? What does this solution need to let users do? Will the proposed solution reduce or remove the problems and pain points currently felt by users? What should this solution prevent users from doing? Do you need a solution ready for heavy use on day 1? Is your solution idea enhanced by the use of Blockchain? Does the use of Blockchain create a better end-user experience? If so, how? Has your business developed custom software solutions before? What level of support are you going to need? How big is the developer community? Does your vision of the future align with the project or platform's vision of the future? Does the platform aim to make new and significant contributions to the development space, or is it an efficiency / cost play? Should the solution be a public or private Blockchain? Should the solution be an open or closed Blockchain? Create a plan for contract updates and changes! Hybrid solutions Monetary exchanges? How do I develop a Blockchain app? AGILE approach pre-release Define guiding principles up front Software vs Firmware Announcements, not transactions! Classes, not contracts Link contracts to share functions Use calling contracts to keep contract address the same Hyperledger vs Ethereum CONSIDER No of Users * Avg No of Transactions (state changes) per User Should a Blockless solution be applied? Performance Security Anonymity Security Monolithic vs Modular Sandwich complexity model How do I test a Blockchain app? Recommend 5x to 10x traditional application testing time Security Networks Additional course details: Nexus Humans Blockchain - An Overview for Business Professionals training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Blockchain - An Overview for Business Professionals course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Blockchain - An Overview for Business Professionals
Delivered OnlineFlexible Dates
Price on Enquiry

Security in Google Cloud

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This class is intended for the following job roles: [Cloud] information security analysts, architects, and engineers Information security/cybersecurity specialists Cloud infrastructure architects Additionally, the course is intended for Google and partner field personnel who work with customers in those job roles. The course should also be useful to developers of cloud applications Overview This course teaches participants the following skills: Understanding the Google approach to security Managing administrative identities using Cloud Identity. Implementing least privilege administrative access using Google Cloud Resource Manager, Cloud IAM. Implementing IP traffic controls using VPC firewalls and Cloud Armor Implementing Identity Aware Proxy Analyzing changes to the configuration or metadata of resources with GCP audit logs Scanning for and redact sensitive data with the Data Loss Prevention API Scanning a GCP deployment with Forseti Remediating important types of vulnerabilities, especially in public access to data and VMs This course gives participants broad study of security controls and techniques on Google Cloud Platform. Through lectures, demonstrations, and hands-on labs, participants explore and deploy the components of a secure Google Cloud solution. Participants also learn mitigation techniques for attacks at many points in a Google Cloud-based infrastructure, including Distributed Denial-of-Service attacks, phishing attacks, and threats involving content classification and use. Foundations of GCP Security Google Cloud's approach to security The shared security responsibility model Threats mitigated by Google and by GCP Access Transparency Cloud Identity Cloud Identity Syncing with Microsoft Active Directory Choosing between Google authentication and SAML-based SSO GCP best practices Identity and Access Management GCP Resource Manager: projects, folders, and organizations GCP IAM roles, including custom roles GCP IAM policies, including organization policies GCP IAM best practices Configuring Google Virtual Private Cloud for Isolation and Security Configuring VPC firewalls (both ingress and egress rules) Load balancing and SSL policies Private Google API access SSL proxy use Best practices for structuring VPC networks Best security practices for VPNs Security considerations for interconnect and peering options Available security products from partners Monitoring, Logging, Auditing, and Scanning Stackdriver monitoring and logging VPC flow logs Cloud audit logging Deploying and Using Forseti Securing Compute Engine: techniques and best practices Compute Engine service accounts, default and customer-defined IAM roles for VMs API scopes for VMs Managing SSH keys for Linux VMs Managing RDP logins for Windows VMs Organization policy controls: trusted images, public IP address, disabling serial port Encrypting VM images with customer-managed encryption keys and with customer-supplied encryption keys Finding and remediating public access to VMs VM best practices Encrypting VM disks with customer-supplied encryption keys Securing cloud data: techniques and best practices Cloud Storage and IAM permissions Cloud Storage and ACLs Auditing cloud data, including finding and remediating publicly accessible data Signed Cloud Storage URLs Signed policy documents Encrypting Cloud Storage objects with customer-managed encryption keys and with customer-supplied encryption keys Best practices, including deleting archived versions of objects after key rotation BigQuery authorized views BigQuery IAM roles Best practices, including preferring IAM permissions over ACLs Protecting against Distributed Denial of Service Attacks: techniques and best practices How DDoS attacks work Mitigations: GCLB, Cloud CDN, autoscaling, VPC ingress and egress firewalls, Cloud Armor Types of complementary partner products Application Security: techniques and best practices Types of application security vulnerabilities DoS protections in App Engine and Cloud Functions Cloud Security Scanner Threat: Identity and Oauth phishing Identity Aware Proxy Content-related vulnerabilities: techniques and best practices Threat: Ransomware Mitigations: Backups, IAM, Data Loss Prevention API Threats: Data misuse, privacy violations, sensitive/restricted/unacceptable content Mitigations: Classifying content using Cloud ML APIs; scanning and redacting data using Data Loss Prevention API Additional course details: Nexus Humans Security in Google Cloud training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Security in Google Cloud course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Security in Google Cloud
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Administering Cisco Unified Communications Manager v12 (ACUCM)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for The primary audience for this course is as follows: Phone Network Administrators Phone Network Engineers Data System Administrators Entry-level Network Engineers Channel Partners/Resellers, Customers, Employees Overview Describe the Cisco Unified Communications Manager network, service, and features Understand the importance of and configuration of redundancy and high availability in the enterprise network Describe user configuration and the user web interface Explain basic phone options and the use of BAT Explain the route plan and on-net/off-net calling Describe the various media resources, including conferencing and MOH Describe the basic phone features and use of hunt groups Administering Cisco Unified Communications Manager (ACUCM) v12.0 is a 3-day training program that provides system administrators and networking professionals with an understanding of the Cisco Unified Communications Manager System. The Cisco IT training course teaches the concepts of IP telephony based in system administration, including its function, features, and configuration. This is an entry-level IP telephony course that begins with the basic concepts of IP telephony and very quickly moves the learner forward into an understanding of system concepts: clustering, creation of phones and users, route plans, digit manipulation, media resources, and phone features, which are all important to supporting IP telephony in the enterprise network. The course focuses on Cisco Unified Communications Manager version v12.x.The course is geared to individuals that will be using and managing the system and performing administration for Level 1 and Level 2 support. Level 1 support is geared toward supporting phone users and making moves, adds, and changes to the desktop phone environment. Level 2 support is oriented to supporting changes in the organization, such as opening new office locations or relocating departments. The Cisco training course does not cover issues of initial deployment, new cluster deployment or international deployments. Also, the course does not cover issues with the underlying network that involves routers, switches, or Cisco IOS software configuration. Exploring IP Telephone Traditional Voice versus IP Telephony Clustering Overview Intracluster Communications Cisco Unified Communications Manager Clusters Clustering Options Platform Requirements Describing Deployment Models Single-Site Deployment Centralized Call-Processing Deployment Distributed Call-Processing Deployment Distributed Single-Cluster Call-Processing Deployment Hybrid Call-Processing Deployment New Advanced Multicluster Options Understanding Advanced Multisite Features Need for CAC Deploying AAR Survivable Remote Site Telephony SRST Failover Logging in to Cisco Unified Communications Manager Logging In to Cisco Unified CM Administration and Cisco Unified Serviceability Logging In to Cisco Unified Operating System Administration and the DRS Navigation Menu Command-Line Interface Examining Basic Server Configuration Server Configuration?Eliminating DNS Reliance Configuring Enterprise Parameters Describing Multilevel Administration Configuring Multilevel Administration Creating End Users Creating Roles Creating User Groups Assigning Users to User Groups Configuring DRS Backup and Restore Procedures DRS Backup Procedures DRS Restore Procedures Understanding User Configuration Understanding User Management Configuring Users Using the User Web Pages Understanding the User Web Pages Using the User Web Pages Configuring System Parameter Cisco Unified CM Configuration Cisco Unified Communications Manager Group Configuration Phone NTP Configuration Date/Time Group Codecs and Regions Location Configuration Device Pool Configuration DHCP Service Configuration Device Defaults Configuration Clusterwide Parameters Licensing Supporting Cisco Unified IP Phones Cisco Unified IP Phones Overview Specialized Cisco Unified IP 7900 Series Phones Phone Button Templates Softkey Templates Exploring Phone Registration and IP Phone Communications Cisco Unified IP Phone Registration Cisco Unified IP Phone Configuration Utilizing the Bulk Administration Tool (BAT) Overview of Cisco Unified Communications Manager BAT Cisco Unified Communications Manager TAPS Implementing Dial Plan Connectivity Organizational Dial Plan Trunks Gateways Creating Route Plans Dial Plan Overview Route Pattern Overview Digit Collection Call Routing Configuring Transition Patterns and Route Filters Translation Patterns The 9.@ Pattern Route Filters Implementing Digit Manipulation Discard Digits Instruction Transformation Masks Route Plan Report Defining Class of Control Overview of Class of Control Partitions CSS Configuration PLAR Application Using Class of Control Features Call Restriction Time of Day Routing Traditional vs. Line/Device Approach Defining Media Resources Overview of Media Resources Conference Bridge Media Termination Points Transcoder Music on Hold Annunciator Exploring Media Resource Management MRG Management Configuring MRGs Configuring MRGLs Describing Basic Features Call Park Call Pickup Cisco Call Back Shared Lines with Barge and Privacy Exploring Hunt Groups Hunt Group Overview Line Group Configuration Hunt List Configuration Hunt Pilot Configuration Final Forwarding Describing Phone Services Cisco IP Phone Services Cisco Phone Services Configuration

Cisco Administering Cisco Unified Communications Manager v12 (ACUCM)
Delivered OnlineFlexible Dates
Price on Enquiry

MS-080T00: Employee Experience Platform Specialist

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for Learners taking this course are interested in employee experiences or Microsoft Viva and want to learn how to assess, plan, strategize, design, and manage digital employee experiences that use Microsoft Viva, Microsoft Teams, SharePoint, and Power Platform. A learner in this role will collaborate with multiple teams to scope, design, and implement new digital employee experiences, such as onboarding, career and skill development, rewards and recognition, employee wellbeing, and employee retention. Learners should have a foundational understanding of Microsoft technologies, including Microsoft 365, Teams, SharePoint, and a deep understanding of Microsoft Viva features and capabilities. They may have experience in one or more of the following disciplines: human resources, people development, change management, information technology, or culture development. Overview By the end of this module, you'll be able to: Evaluate existing systems and identify requirements Identify stakeholders and users Recommend employee experience solutions and strategies Describe the four experience areas of Connection, Growth, Purpose, and Insights supported by Viva. Explain what Microsoft Viva apps are. Identify resources needed to set up each Viva app. Create an adoption plan to use Viva to solve business scenarios for the four employee experience areas of Connection, Insight, Purpose, and Growth. Describe the main features of Viva Connections List technical requirements/prerequisites for Viva Connections implementation Explain the differences between desktop and mobile experiences Identify 2-3 business use cases for Viva Connections Identify key stakeholders for the deployment of Viva Connections Align and prioritize scenarios for Viva Connections Plan and design for the Dashboard, the Feed, and Resources by scenarios and audiences Consider how your organization will scale adoption Assess your organization's existing learning experiences. Plan and strategize for Viva Learning. Coordinate the implementation of Viva Learning. Recommend an adoption strategy for Viva Learning. In this course, you'll learn how to bring people together to create an optimal employee experience that enables your organization to improve productivity, develop empathetic leadership, and transform how employees feel about their work. In your organization today, are people being treated well, or are their needs neglected? Are your teams aligned on goals with a sense of purpose? Are you driving the business outcomes that you need? The Microsoft Viva employee experience platform provides the infrastructure to create the culture of trust, collaboration, well-being, and active listening that you envision. This training course will provide Microsoft Employee Experience Platform Specialists with a comprehensive overview of Microsoft Viva, as well as Microsoft 365, Teams, and SharePoint. It will cover how to identify requirements for designing experiences for employee onboarding, career and skill development, rewards and recognition, compensation and benefits, employee wellbeing, and employee retention. It will also cover how to design solutions to meet these requirements, and how to collaborate with senior executive leadership, human resources, IT, adoption and change management, and learning and organizational development departments. Finally, it will cover how to continuously improve employee experiences based on data-driven insights and feedback. Design digital employee experiences Introduction Case study - Tailwind Traders Evaluate current employee experiences Consider employee privacy and data requirements Assemble business stakeholders and define goals Explore Viva experience areas Understand Viva licensing Knowledge check Summary and resources Introduction to the Microsoft Viva suite Introduction to Microsoft Viva Understand Viva apps Get started with Microsoft Viva Use Viva to keep everyone informed, included, and inspired Use Viva to get actionable insights to foster well-being and productivity Use Viva to align people's work to team and organization goals Use Viva to help employees learn, grow, and succeed Knowledge check Summary Introduction to Viva Connections Introduction What do users experience? When to use Viva Connections? What technical requirements must be met to deploy Viva Connections? Knowledge check Summary Plan for Viva Connections Introduction Build your team and meet requirements Analyze tasks and scenarios for Viva Connections Plan for Viva Connections Dashboard, Feed and Resources Plan to announce, launch, and scale adoption Knowledge check Summary Design skilling and growth experiences with Viva Learning Introduction Case study - Tailwind Traders Plan for Viva Learning Assemble Viva Learning admins and stakeholders Understand content sources with Viva Learning Coordinate setup and configuration of Viva Learning Develop adoption strategies for Viva Learning Develop an org-wide learning culture Knowledge check Summary and resources Additional course details: Nexus Humans MS-080T00: Employee Experience Platform Specialist training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the MS-080T00: Employee Experience Platform Specialist course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

MS-080T00: Employee Experience Platform Specialist
Delivered OnlineFlexible Dates
Price on Enquiry

Care Certificate (15 Standards)

By NextGen Learning

Course Overview The Care Certificate (15 Standards) course offers a foundational introduction to essential standards for individuals working in health and social care roles across the UK. Covering all 15 standards required by the Care Quality Commission (CQC), this course is designed to ensure learners understand their responsibilities, safeguarding protocols, and person-centred care approaches. It supports individuals in developing the knowledge needed to meet industry expectations in line with the Skills for Care guidelines. Upon completion, learners will be able to demonstrate a firm grasp of care values, communication techniques, infection control, and equality and diversity awareness, helping them integrate confidently into care settings. The Care Certificate provides an excellent starting point for those new to care roles or seeking to align their current practices with professional benchmarks. Course Description This course comprehensively covers the 15 core standards of the Care Certificate, including duty of care, communication, privacy and dignity, safeguarding adults and children, and health and safety. It provides detailed theoretical understanding to help learners develop a values-based approach aligned with UK care sector expectations. The course is structured to improve understanding of policies, legal frameworks, and workplace responsibilities in social care environments. Learners will explore topics such as person-centred support, infection prevention, mental health awareness, and handling information in care settings. The course supports learners in enhancing their understanding of the principles and frameworks that underpin professional conduct in care roles, helping them demonstrate competency across a wide range of subject areas relevant to both domiciliary and residential care roles. Course Modules: Module 01: Understand Your Role Module 02: Your Personal Development Module 03: Duty of Care Module 04: Equality and Diversity Module 05: Work in a Person-Centred Way Module 06: Communication Module 07: Privacy and Dignity Module 08: Fluids and Nutrition Module 09: Awareness of Mental Health, Dementia and Learning Disabilities Module 10: Safeguarding Adults Module 11: Safeguarding Children Module 12: Basic Life Support Module 13: Health and Safety Module 14: Handling Information Module 15: Infection Prevention and Control (See full curriculum) Who is this course for? Individuals seeking to start a career in health and social care. Professionals aiming to meet mandatory training requirements for care roles. Beginners with an interest in understanding care standards and regulations. Volunteers or support workers looking to formalise their knowledge in care settings. Career Path Care Assistant Support Worker Domiciliary Carer Healthcare Assistant Residential Care Worker Adult Social Care Professional

Care Certificate (15 Standards)
Delivered OnlineFlexible Dates
£9.99