Duration 1 Days 6 CPD hours This course is intended for This course is designed for students wishing to gain intermediate-level skills or individuals whose job responsibilities include constructing relational databases and developing tables, queries, forms, and reports in Microsoft Access for Microsoft 365. Overview In this course, you will optimize an Access database. You will: Provide input validation features to promote the entry of quality data into a database. Organize a database for efficiency and performance, and to maintain data integrity. Improve the usability of Access tables. Create advanced queries to join and summarize data. Use advanced formatting and controls to improve form presentation. Use advanced formatting and calculated fields to improve reports. Your training and experience using Microsoft© Access© has given you basic database management skills, such as creating tables, designing forms and reports, and building queries. In this course, you will expand your knowledge of relational database design; promote quality input from users; improve database efficiency and promote data integrity; and implement advanced features in tables, queries, forms, and reports. Extending your knowledge of Access will result in a robust, functional database for your users.This course is the second part of a three-course series that covers the skills needed to perform database design and development in Access.Microsoft© Access© for Office 365?: Part 1 : Focuses on the design and construction of an Access database?viewing, navigating, searching, and entering data in a database, as well as basic relational database design and creating simple tables, queries, forms, and reports.Microsoft© Access© for Office 365?: Part 2 (this course): Focuses on optimization of an Access database, including optimizing performance and normalizing data; data validation; usability; and advanced queries, forms, and reports.Microsoft© Access© for Office 365?: Part 3 : Focuses on managing the database and supporting complex database designs, including import and export of data; using action queries to manage data; creating complex forms and reports; macros and Visual Basic for Applications (VBA); and tools and strategies to manage, distribute, and secure a database.This course may be a useful component in your preparation for the Microsoft Access Expert (Microsoft 365 Apps and Office 2019): Exam MO-500 certification exam. Lesson 1: Promoting Quality Data Input Topic A: Restrict Data Input Through Field Validation Topic B: Restrict Data Input Through Forms and Record Validation Lesson 2: Improving Efficiency and Data Integrity Topic A: Data Normalization Topic B: Associate Unrelated Tables Topic C: Enforce Referential Integrity Lesson 3: Improving Table Usability Topic A: Create Lookups Within a Table Topic B: Work with Subdatasheets Lesson 4: Creating Advanced Queries Topic A: Create Query Joins Topic B: Create Subqueries Topic C: Summarize Data Lesson 5: Improving Form Presentation Topic A: Apply Conditional Formatting Topic B: Create Tab Pages with Subforms and Other Controls Lesson 6: Creating Advanced Reports Topic A: Apply Advanced Formatting to a Report Topic B: Add a Calculated Field to a Report Topic C: Control Pagination and Print Quality Topic D: Add a Chart to a Report
Duration 2 Days 12 CPD hours This course is intended for Executives, Project Managers, Business Analysts, Business and IT stakeholders working with analysts, Quality and process engineers, technicians, corrective action coordinators or managers; supervisors, team leaders, and process operators; anyone who wants to improve their ability to solve recurring problems. Overview At the completion of this course, you should be able to: Identify the different types of tools and techniques available Apply change management successfully Review what to look for when applying business case thinking to Root Cause Analysis Develop a process to systematically approach problems Business success is dependent on effective resolution of the problems that present themselves every day. Often the same or similar problems continue causing repeated losses in time or money and your staff become experts at fixing rather than preventing the problems. Learn to find and fix root causes and develop corrective actions that will effectively eliminate or control these problems. Section 1: RCA Foundation Concepts and Objectives Section Learning Objectives Discuss Definitions ? IT Perspective Discuss What is a problem and why do they exist? What is Root Cause? RCA Benefits and Approaches Event and Casual Analysis Event and Causal Analysis: Exercise 1c Worksheet RCA Tools for each approach Section Summary and Conclusions Section 2: Enhance use of RCA tools Why use a Particular Method Tool: Change Analysis Change Analysis Examples Tool: How to Resolve Conflict Tool: 5 Why?s Example Learning Management Problem Tool: Cause and Effect Tool: Fault Tree Analysis Why do we use Fault Tree Analysis? How does it work? Fault Tree Diagram Symbols Example #1 of FTA: Car Hits Object Tool: Failure Modes and Effects Analysis (FMEA) Example: Failure Modes and Effects Analysis Tool: Design / Application Review Section 3: Problem Resolution and Prevention Section Objectives The Secret of Solving Problems: -A Note about Statistical Control -A Note about Fire Fighting Technique: Business Process Mapping Example: IGOE Technique: Lean Six Sigma and DMAIC Lean Six Sigma Benefits Importance of Understanding the Business Process The Business Process Mandate Technique: Process Modeling Graphical Notation Standard (BPMN): -What is Business Process Modeling Notation (BPMN)? -Benefits of BPMN -Basic Components of BPMN Technique: Business Process Maturity Model Five Levels of Maturity Section 4: Capability Improvement for RCA Steps in Disciplined Problem Solving RCA as a RCA Process Key RCA Role Considerations Sustainable RCA Improvement Organizational Units Process Area Goals, Practices Specific and General Practices Specific Practice Examples Software Maturity Survey SWOT Analysis Worksheet Recognize the importance of the Change Management component in your RCA implementation Using the ADKAR Model to Communicate Change Review ADKAR© Model ? -Awareness of the need for change -Desire to participate and support the change -Knowledge on how to change -Ability to implement required skills and behaviors -Reinforcement to sustain the change The ADKAR Model: Reinforcement Section 5: Course Summary and Conclusions Plan the Proposal and Business Case Example: 1 Page Business Case Resource Guide Questions
Duration 1 Days 6 CPD hours This course is intended for This course is intended for: Solutions architects, security DevOps, and security engineers Overview In this course, you will learn to: Establish a landing zone with AWS Control Tower Configure AWS Organizations to create a multi-account environment Implement identity management using AWS Single Sign-On users and groups Federate access using AWS SSO Enforce policies using prepackaged guardrails Centralize logging using AWS CloudTrail and AWS Config Enable cross-account security audits using AWS Identity and Access Management (IAM) Define workflows for provisioning accounts using AWS Service Catalog and AWS Security Hub Security is foundational to AWS. Governance at scale is a new concept for automating cloud governance that can help companies retire manual processes in account management, budget enforcement, and security and compliance. By automating common challenges, companies can scale without inhibiting agility, speed, or innovation. In addition, they can provide decision makers with the visibility, control, and governance necessary to protect sensitive data and systems.In this course, you will learn how to facilitate developer speed and agility, and incorporate preventive and detective controls. By the end of this course, you will be able to apply governance best practices. Course Introduction Instructor introduction Learning objectives Course structure and objectives Course logistics and agenda Module 1: Governance at Scale Governance at scale focal points Business and Technical Challenges Module 2: Governance Automation Multi-account strategies, guidance, and architecture Environments for agility and governance at scale Governance with AWS Control Tower Use cases for governance at scale Module 3: Preventive Controls Enterprise environment challenges for developers AWS Service Catalog Resource creation Workflows for provisioning accounts Preventive cost and security governance Self-service with existing IT service management (ITSM) tools Module 4: Detective Controls Operations aspect of governance at scale Resource monitoring Configuration rules for auditing Operational insights Remediation Clean up accounts Module 5: Resources Explore additional resources for security governance at scale Additional course details: Nexus Humans AWS Security Governance at Scale training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AWS Security Governance at Scale course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This course is intended for system and network administrators responsible for installation, setup, configuration, and administration of the BIG-IP LTM system. This course gives network professionals a functional understanding of BIG-IP Local Traffic Manager, introducing students to both commonly used and advanced BIG-IP LTM features and functionality. Incorporating lecture, extensive hands-on labs, and classroom discussion, the course helps students build the well-rounded skill set needed to manage BIG-IP LTM systems as part of a flexible and high performance application delivery network. Module 1: Setting Up the BIG-IP System Introducing the BIG-IP System Initially Setting Up the BIG-IP System Archiving the BIG-IP Configuration Leveraging F5 Support Resources and Tools Module 2: Reviewing Local Traffic Configuration Reviewing Nodes, Pools, and Virtual Servers Reviewing Address Translation Reviewing Routing Assumptions Reviewing Application Health Monitoring Reviewing Traffic Behavior Modification with Profiles Reviewing the TMOS Shell (TMSH) Reviewing Managing BIG-IP Configuration Data Module 3: Load Balancing Traffic with LTM Exploring Load Balancing Options Using Priority Group Activation and Fallback Host Comparing Member and Node Load Balancing Module 4: Modifying Traffic Behavior with Persistence Reviewing Persistence Introducing SSL Persistence Introducing SIP Persistence Introducing Universal Persistence Introducing Destination Address Affinity Persistence Using Match Across Options for Persistence Module 5: Monitoring Application Health Differentiating Monitor Types Customizing the HTTP Monitor Monitoring an Alias Address and Port Monitoring a Path vs. Monitoring a Device Managing Multiple Monitors Using Application Check Monitors Using Manual Resume and Advanced Monitor Timer Settings Module 6: Processing Traffic with Virtual Servers Understanding the Need for Other Virtual Server Types Forwarding Traffic with a Virtual Server Understanding Virtual Server Order of Precedence Path Load Balancing Module 7: Processing Traffic with SNATs Overview of SNATs Using SNAT Pools SNATs as Listeners SNAT Specificity VIP Bounceback Additional SNAT Options Network Packet Processing Module 8: Modifying Traffic Behavior with Profiles Profiles Overview TCP Express Optimization TCP Profiles Overview HTTP Profile Options OneConnect Offloading HTTP Compression to BIG-IP HTTP Caching Stream Profiles F5 Acceleration Technologies Module 9: Selected Topics VLAN, VLAN Tagging, and Trunking Restricting Network Access SNMP Features Segmenting Network Traffic with Route Domains Module 10: Deploying Application Services with iApps Simplifying Application Deployment with iApps Using iApps Templates Deploying an Application Service Leveraging the iApps Ecosystem on DevCentral Module 11: Customizing Application Delivery with iRules and Local Traffic Policies Getting Started with iRules Configuring and Managing Policy Rules Module 12: Securing Application Delivery with LTM Understanding Today?s Threat Landscape Integrating LTM Into Your Security Strategy Defending Your Environment Against SYN Flood Attacks Defending Your Environment Against Other Volumetric Attacks Addressing Application Vulnerabilities with iRules and Local Traffic Policies Detecting and Mitigating Other Common HTTP Threats Module 13: Final Lab Project About the Final Lab Project
Duration 1 Days 6 CPD hours This course is intended for This course is intended for organizations that would like to improve the team productivity of their employees and individuals, who take the role of Project Managers, Business Analysts, Team Leaders, Scrum Masters, Product Owners, Managers, and any team members. Overview The key to the success of an IT organization is its employees. The more highly productive the people in the organization are, the greater the business goals the organization can achieve. By completing this course, the IT organization gains: trained employees who know the main characteristics of high-performance teams and already have ideas about what to change in their work and behavior to contribute to greater productivity of the team as a whole; a quantum leap in business results thanks to increased employee motivation, customer satisfaction, and improved communication in teams; long-term benefit expressed in the transfer of knowledge that the people of the trained team can share with other members of the organization. A skill that almost every organization looks for in a new job candidate is the ability to work in a team. If an individual is an expert in a certain field and is invited to work on a large project that includes other experts, it is very important to know how to work successfully in this team. By completing this course the individual will: learn the differences between an ordinary team and a high-performing one; know how to increase your personal productivity; be able to determine problems that prevent the team from achieving outstanding results. This course represents highly effective training on developing teamwork skills and teaches students how to interact effectively with other team members. Also, students will learn how to increase their work productivity and resolve and/or avoid conflict situations. Course Outline What is a team and are we really a team? How to improve team performance? The importance of trust and psychological security. How to approach disagreements and conflicts in the team? How to encourage initiative and commitment in the team? How are self-organized teams created and what are their specifics? How to focus on the results we want to achieve? Each topic includes discussions and exercises. Additional course details: Nexus Humans High-Performing Teams training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the High-Performing Teams course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for Built for experienced IT Professionals familiar with Citrix Virtual Apps and Desktops 7 in an on-premises environment or Citrix Cloud looking to expand their Citrix Virtual Apps and Desktops skills to an advanced level. Potential students include administrators or engineers responsible for the Citrix Apps and Desktop 7 Site. Overview After completing this course you should be able to: Configure Workspace Environment Management to improve the end user environment and virtual resource consumption Implement App Layering skills, for example how to create and administer OS, platform, application, elastic and user layers Migrate to Workspace Environment Management Students will learn to build and combine App Layers to optimize management of your app and desktop images and to implement Workspace Environment Management to improve log-on times, centralize user settings management, and optimize the performance of machines. Students will leave this course with a good understanding of how to manage more complex solutions and features in their Citrix Virtual Apps and Desktop 7 site. Introduction to App Layering App Layering Introduction Architecture and How it Works The OS Layer Creating an OS Layer The Platform Layer Creating a Platform Layer The App Layers Creating App Layers Creating Elastic App and User Layers Elastic App Layering User Layers Deploying a Layered Image using Citrix Virtual Apps and Desktops Using Templates in App Layering Using Layered Images in a Citrix Virtual Apps and Desktops Site Exploring Layer Priority Layer Priority Maintaining an App Layering Environment Updating Layers Maintaining and Updating the App Layering Environment Common App Layering Considerations and Additional Resources Introduction to Workspace Environment Management (WEM) Workspace Environment Management (WEM) Introduction WEM Administration Using WEM to Centralize Environment Management Managing User Resources with WEM Managing Profiles with WEM Managing Endpoints with the WEM Transformer Feature Using WEM for Performance Optimizing Machine Performance with WEM Optimizing User Experience with WEM Using WEM to Secure Environments WEM Security Features Migrating and Upgrading WEM Migrating to WEM Upgrading a WEM Deployment WEM Multi-Location Considerations Additional course details: Nexus Humans CWS-314 Citrix App Layering and WEM Administration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CWS-314 Citrix App Layering and WEM Administration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This course is most suited for IT professionals who have a need to understand the current requirements and core competences for managing IT in mission-critical environments. Overview After completion of the course the participant will be able to: 1. Provide guidance and implementation for IT strategy as set by senior IT and business management 2. Select and manage staff, implement training programs, career plan development and job rotation programs 3. Select, evaluate and negotiate vendors using RFI, RFP and selection criteria 4. Provide guidance for developing, testing and implementing business applications 5. Manage and/or assist in IT project management 6. Design and implement service management processes for incident, problem and change management 7. Understand the need for business continuity and design the business continuity plan 8. Review and implement information security practices and controls 9. Assist and initiate risk management practices 10. Understand and select new technologies such as cloud computing, big data, Internet of Things and social media to support business change demands 11. Select strategies for information management 12. Measure and improve quality of IT services CITS is designed to teach the skills, knowledge and competencies required of the modern IT specialist working at the senior professional, team-leader, supervisor or management level in IT management. IT Strategy The need for Information Technology Enterprise architecture Service catalogue Service level management Sustainable development IT Organisation Personnel need Roles and responsibilities Sourcing Selection process Hiring staff Managing staff Career planning Training / job rotation Performance appraisal Staff departures Vendor Selection / Management The importance of vendors Vendor selection Request For Information (RFI) Request For Proposal (RFP) Proposal evaluation Vendor reference checks Contract negotiation Contract management Vendor management Re-compete vendors Project Management Methodologies Project organisation Starting up / initiating Planning / initiation a project Risk Quality Scope Work / Product Breakdown Structure PERT diagram / Gantt chart Cost Communication Application Management Software Development Life Cycle (SDLC) Software Quality Assurance (SQA) Requirements Development Testing Adoption (implementation) Maintenance Service Management Incident management Problem management Change management Business Continuity Management Standards and guidelines Objectives Context Interested parties Scope Roles and responsibilities Resources and competences Awareness and communication Documentation Business Impact Analysis Risk Management Guidelines Context establishment Identification Analysis Evaluation Treatment Communication Monitoring and control Information Security Management Standards Confidentiality Integrity Availability Controls types Guideline for controls selection Control categories Information security awareness Security incident response Information and Knowledge Management Information management Data management Information management - technologies Business intelligence Data management - technologies Best practices in data governance Pitfalls in data governance Business Change Management Business change Frameworks, models and techniques Needs identification Cloud computing Social media / digital marketing Big data Internet of Things (IoT) Quality Management Standards, guidelines and frameworks Objectives Activities Services review Customer feedback Customer survey Key Performance Indicators (KPI) Metrics Scorecards and reports Quality register Exam Actual course outline may vary depending on offering center. Contact your sales representative for more information.
Duration 2 Days 12 CPD hours This course is intended for People working in an organization aiming to improve performance, especially in response to digital transformation or disruption. Any roles involved in the creation and delivery of products or services: Leadership and CXO, especially CIO, CTO, CPO, and CVO Transformation and evolution leads and change agents Value stream architects, managers, engineers Scrum Masters, agile and DevOps coaches and facilitators Portfolio, product and project managers, and owners Business analysts Architects, developers, and engineers Release and environment managers IT Ops, service and support desk workers Customer experience and success professionals Overview After completing this course, students will be able to: Describe the origins of value stream management and key concepts such as flow, value, and delivery Describe what value stream management is, why it's needed and the business benefits of its practice Describe how lean, agile, DevOps, and ITSM principles contribute to value stream management Identify and describe value streams, where they start and end, and how they interconnect Identify value stream roles and responsibilities Express value streams visually using mapping techniques, define current and target states and hypothesis backlog Write value stream flow and realization optimization hypotheses and experiments Apply metrics such as touch/processing time, wait/idle time, and cycle time to value streams Understand flow metrics and how to access the data to support data-driven conversations and decisions Examine value realization metrics and aligning to business outcomes, and how to sense and respond to them (outcomes versus outputs) Architect a DevOps toolchain alongside a value stream and data connection points Design a continuous inspection and adaptation approach for organizational evolution The Value Stream Management Foundation course from Value Stream Management Consortium, and offered in partnership with DevOps Institute, is an introductory course taking learners through a value stream management implementation journey. It considers the human, process, and technology aspects of this way of working and explores how optimizing value streams for flow and realization positively impacts organizational performance. History and Evolution of Value Stream Management and its Application Value stream management?s origins Definitions of value stream management Flow Lean and systems thinking and practices Agile, DevOps and other frameworks Research and analysis Identifying Value Streams What is a value stream? Identifying value streams Choosing a value stream Digital value streams Value stream thinking Mapping Value Streams Types of maps Value stream mapping The fuzzy front end Artifacts 10 steps to value stream mapping Mapping and management VSM investment case Limitations of value stream mapping Connecting DevOps Toolchains CICD and the DevOps toolchain Value stream management processes Value stream management platforms DevOps tool categories Building an end-to-end DevOps toolchain Common data model and tools integrations Value Stream Metrics The duality of VSM Downtime in technology Lean, DORA and Flow metrics Definition of Done Value metrics Benefits hypotheses Value streams as profit centers KPIs and OKRs Inspecting the Value Stream 3 Pillars of Empiricism Organizational performance Visibility When to inspect Data and discovery Insights and trends Organizing as Value Streams Value stream alignment Team types and topologies Project to product Hierarchy to autonomy Target Operating Model Value stream people Value stream roles Value stream funding Evolving Value Streams Why now? Transitions VSM capability matrix VSM culture iceberg Learning Making local discoveries global improvements Managing value stream interdependencies
Duration 2 Days 12 CPD hours This course is intended for This is an introductory-level course for Administrators who are new to Jira (this is NOT for experienced Jira admin or users). Students should have a background in basic administration. Overview This course is approximately 50% hands-on, combining expert lecture, real-world demonstrations and group discussions with machine-based practical labs and exercises. Working in a hands-on learning environment, exploring several practical use cases that provide context as to where and when to use Jira, students will learn about: user management global and project permissions project roles schemes configuration of issue types, workflows, and screens Tracking issues is a critical component of any project management strategy. JIRA provides a web based single repository for creating, tracking and reporting on feature requests, bugs reported, or managing workflow. Geared for administrators new to Jira, JumpStart to Jira for Administrators | Jira Administration is a two-day, hands-on course that explores the most important tasks required to set up Jira, providing students with ample hands-on experience using common administration tasks. This hands-on course enables the Student to administer a JIRA instance and ?learn by doing?. The focus of this course is on Best Practices, and practical skills. Getting started with JIRA Administration JIRA conceptual review Core concepts Terminology Infrastructure JIRA roles Groups vs Roles Overview Project roles Creating a role Project scaling JIRA User management Project Resolution Project status Resolved status Resolution date Schemes Overview Project scope schemes Adding users to schemes Issue type schemes Notification schemes Permission schemes Issue security schemes working with schemes JIRA as a Platform Overview What can be configured Basic JIRA project setup Advanced project setup Workflows Overview Designing a workflow Defining a workflow Implementing a workflow Deploying workflows Workflow events Transitions and sub-tasks Custom Fields Overview Field types Field context Limiting contexts Adding contexts Screens and field configuration Best practices for custom fields User Lifecycle Overview Adding users Adding third-party users Modifying users Deactivating users Remote JIRA Access Overview Emails SQL REST Webhooks XML and RSS Command Line Interface Integrating JIRA with other applications Migrating Data into JIRA Overview Migration steps The CSV importer JIRA cloud migration Summary and Best Practices Looking back at the ?Big Picture? Optional - Jira Certification Prep Review Additional course details: Nexus Humans JumpStart to Jira for Administrators | Jira Administration (TTDV7540) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the JumpStart to Jira for Administrators | Jira Administration (TTDV7540) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours This course is intended for This course is intended for the person who has responsibility for daily system operations. Overview Send, display, and respond to messages Use the online help and reference materials Monitor and control job queues, active jobs, and output queues Create and change user profiles Use authorization lists and group profiles Start and stop Power Systems with IBM i Manage system devices, user display stations, and printers Save and restore objects and libraries Monitor job and history logs Diagnose a system problem Order, receive, and install PTFs This course enables a new system operator to develop basic to intermediate level skills needed for day-to-day operations of the Power System with IBM i Power Systems and IBM i concepts and overview . Reference material and support . Overview of 5250 emulation and help . Overview of System i Navigator . Overview of IBM Navigator for i . Messaging concepts . Messaging with 5250 emulation . Messaging with System i Navigator . Messaging with IBM Navigator for i . CL command concepts . CL commands with 5250 emulation . Concepts: Object, library, and the IFS . Object management with 5250 emulation . Object management with System i Navigator . Object management with IBM Navigator for i . Introduction to work management . Work management with 5250 emulation . Job control with 5250 emulation . Job control with System i Navigator . Job control with IBM Navigator for i . Print concepts . Print control with 5250 emulation . Print control with System i Navigator . Print control with IBM Navigator for i . Starting and stopping the system . System security concepts . System security with 5250 emulation . System security with System i Navigator . System security with IBM Navigator for i . System configuration overview . Configuration with 5250 emulation . Configuration with System i Navigator . Configuration with IBM Navigator for i . Save concepts . Save with 5250 emulation . Save with System i Navigator . Save with IBM Navigator for i . Restore concepts and overview . Problem determination with 5250 emulation . Problem determination with System i Navigator . Overview of the PTF process . PTFs with 5250 Emulation . Class summary . Additional course details: Nexus Humans AS24 IBM System Operator Workshop for IBM i training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AS24 IBM System Operator Workshop for IBM i course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.